Insufficient verification of data authenticity in Windows App Installer allows an unauthorized attacker to perform spoofing over a network.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Exploitation requires the attacker to first gain the ability to intercept or influence update‑related network communications. This depends on environment‑specific conditions and preparatory actions that are outside the attacker’s direct control, making the exploit difficult to perform reliably.
Zoltan Harmath with Microsoft