The vulnerability enables hackers to trick desktop users into installing harmful applications by disguising them as official ones.

When the user installs the malicious package, it’ll plant the malware instead.

Malware Detected Warning Screen with abstract binary code 3d digital concept

Olemedia / Getty Images

illustration of fishing rods harvesting user data online.

sarayut Thaneerat / Getty Images

Wooden trojan horse with a notebook on the table. 3d illustration.

style-photography / Getty Images