Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys
Exploitability
AV:LAC:LAT:NPR:NUI:NVulnerable System
VC:LVI:NVA:NSubsequent System
SC:HSI:HSA:H6.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H