Logins could have allowed threat actors physical access to the servers. …read more
Source:: techradar.com – Gadgets