Unauthorized access if SSH with key based authentication is used.
vulners.com/securityvulns/securityvulns:doc:15409