Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk…