A vulnerability in which of the following virtual systems would be of GREATEST concern to the IS auditor?