In the fourth paragraph of the article it states that this is exploitable over the internet if the machine is exposed (as it will be in most circumstances as it will be the user's edge device).
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register Biting the hand that feeds IT
Copyright. All rights reserved © 1998–2022