This flaw could allow attackers to read the memory […] Phone Number Data Offer two-factor authentication or encryption