An attacker can obtain master or session cryptographic keys or other cryptographic information used for authentication, encryption, etc.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.