#3089 Use conventional means to uninstall password-protected applications.
-
Rejected
Reproduction steps:
The specific reproduction process is presented in the form of video.
Unable to provide trace.
Actual result:
The program was successfully uninstalled.
Expected Result:
There is a verification mechanism and the program should not be uninstalled.
System Settings
Operating system: Win 10, x64
System: Intel Core i7 10700k, Samsung 970 EVO Plus
Product: KTS
Product Version: 21.3.6.277
Language: zh-CN
Product Logs: https://pan.huang1111.cn/s/E62Cb
-
-
If you use this method, it seems that it can affect not only the Beta version of the program, but the release version can also be successfully uninstalled by this method. I don’t know if this is a security vulnerability for you, because it seems that only a normal malware can get UAC authorization verification, then it can use this method to end the product, and the product has no corresponding measures in this process.