Be certain that an idea of separation of responsibilities is executed and reasonable accessibility controls and account lockout/disabling controls are in place. Whilst a vulnerability would not guarantee that an attacker or hacker will focus on your network, it does ensure it is less difficult — and feasible — https://ieeexplore.ieee.org/document/9941250