Description
What is the potential impact of a middleware vulnerability that is
exploited by adversaries? Given the connections between middleware and
other crucial systems, such as email or messaging, an attacker could
move laterally into these systems and send phishing messages or spam. Or
attackers could masquerade as authorized users and abuse trust
relationships between users to gain further access.