An attacker could decrypt sensitive data, impersonate legitimate users
or devices, and potentially gain access to network resources for lateral
attacks.
Weakness
The product stores a password in plaintext within resources such as memory or files.
Potential Mitigations
References