Adversaries can intercept range data to locate and more accurately target the victim spacecraft. Mitigation from higher level protocols (encryption to assure confidentiality). [1]
Standard/references: [2] [3] [4]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.