Actually there are many ways that an attacker with a tiny foothold on the network could use that foothold to elevate their privileges and gain access to far more resources.
Not a member of The Register?
Create a new account
Remember me on this computer?
The Register Biting the hand that feeds IT
Copyright. All rights reserved © 1998–2023