The exploit takes advantage of the way Defender handles high‑privilege tasks.