Be sure that a concept of separation of obligations is applied and sensible access controls and account lockout/disabling controls are set up. Though a vulnerability won't guarantee that an attacker or hacker will focus on your network, it does make it much easier — and doable — for them https://ieeexplore.ieee.org/document/9941250