In the fourth paragraph of the article it states that this is exploitable over the internet if the machine is exposed (as it will be in most circumstances as it will be the user's edge device).
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register - Independent news and views for the tech community. Part of Situation Publishing
Biting the hand that feeds IT © 1998–2021