An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
When opening or browsing PDF files on your desktop or through File Explorer, you may suddenly notice that the icons turn into ...