Critical information can be compromised if config files are accessed by anyone.
Config files are used for communication with other systems or services. These files may contain critical information.
Critical information can be compromised if these files are accessed by anyone. This information can be:
It would also be critical if it combines with other weaknesses.
It should be removed or access restriction should be applied.