This vulnerability exposes encrypted data to a number of attacks whose goal is to recover the plaintext.