Malicious actors could potentially exploit this vulnerability if they gain physical access to a user’s device.
Source: htdarkreading.com
Malicious actors could potentially exploit this vulnerability if they gain physical access to a user’s device.
Source: htdarkreading.com