This vulnerability makes it possible that an encrypted communication is intercepted.