
In the fourth paragraph of the article it states that this is exploitable over the internet if the machine is exposed (as it will be in most circumstances as it will be the user's edge device).
In the fourth paragraph of the article it states that this is exploitable over the internet if the machine is exposed (as it will be in most circumstances as it will be the user's edge device).