2019-11-22 21:44:22
hp
PUBLISHED
If a local user has been configured and logged in, an unauthenticated attacker with physical access may be able to extract sensitive information onto a local drive.