"Exploitability:
Attack
vector would be Local since local access to specialized logs is
required.
Attack
complexity would be High since the attacker would need to work backwards
to create their own version of the Unisys negotiation protocol.
Privileges
Required would be High since the attacker would need administrator
privileges to access internal log files
User
Interaction would be None since no user interaction (other than an
attacker) is required.
Scope
would be Changed since the exploited vulnerability can affect resources
beyond the privileges intended by the vulnerable component.
Impact
metrics:
Confidentiality
loss would be High since resources normally inaccessible would be
exposed to the attacker.
Integrity
Impact would be High because there’d be a loss of integrity via
illegitimate access.
Availability
Impact would be High since a successful attack could result in loss of
access to resources.