An attacker could decrypt sensitive data, impersonate legitimate users or devices, and potentially gain access to network resources for lateral attacks.
Exploitability
AV:LAC:LPR:LUI:NScope
S:UImpact
C:HI:LA:N6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:NOther