5.5 Other Security Considerations

If root is compromised, all network access could also be compromised. For example, if a malicious entity gets root access, it might be able to steal user credentials and authenticate to the network with those credentials.