This only works for a Windows 7 machine running in a VM? And once the VM is rebooted the exploit is lost? And they have to have physical access to the host machine to do it (can't be run remotely)?
Who cares? That's a very unlikely scenario to play out anywhere. Plus if the attacker has physical access to the host machine there are larger problems in play.
I'm not exactly worried about this one.