Re: Depends entirely on the risk
"
Actually there are many ways that an attacker with a tiny foothold on the network could use that foothold to elevate their privileges and gain access to far more resources.
"
You have "gained a foothold" onto this site by logging in to comment. Explain how that makes it easier for you to elevate your privileges.