An attacker can use brute force to gain access to a TC channel, to force encryption or to guess the valid commands.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.