. . . "Systems, such as workstations and terminal servers, on which the affected software is installed, are primarily at risk from the vulnerability." . .