The vulnerability could allow a malicious authenticated user to trigger the error through a forced call to the KeBugCheckEx function, which would lead to system instability and denial of service or DoS attacks
The vulnerability could allow a malicious authenticated user to trigger the error through a forced call to the KeBugCheckEx function, which would lead to system instability and denial of service or DoS attacks