The affected software stores in plaintext the target-password in process memory and in a file, which is located in VirtualStore folder. The vulnerability should be ignored since an attacker has to obtained high privileged user. By high privilege attackers perspective, there is no reason to evolve attack on the system through exploitation of the vulnerability.
Filter
Materials
Back to top 