According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.
Salim S.I, Richard Y Lin, Atlas Huang (CTOne/TrendMicro) with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>