When considering IoT systems, which of the following represents the GREATEST ongoing risk after a vulnerability has been discovered?