The node secret in various RSA products was stored using an encryption key and encryption algorithm that is no longer considered effective by RSA standards. An attacker could potentially exploit this to eavesdrop on or modify network communications.
ec2e53ead8f95b16862d03dec8d43560ce99aebd13724101d98dc9ab2a022eba