"The combination of widespread deployment, default insecure configurations, and the severity of the vulnerability creates an ...