Known Vulnerabilities in Configuration Split