- Joined
- Nov 6, 2016
- Messages
- 8,558
https://www.bleepingcomputer.com/ne...y-details-and-exploit-are-publicly-available/
Exploiting the vulnerability allows an attacker to escape the virtual environment of the guest machine and reach the Ring 3 privilege layer, used for running code from most user programs, with the least privileges.