An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device.
An attacker could exhaust the available connection pool of an affected device by opening a sufficient number of connections to the device.