The critical vulnerability involves uninstalling third-party security products and has been used in cyberattacks.