The root vulnerability