hardware vulnerabilities