The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or ...