Oliver is working with a corporation that has recently experienced an attack by a bad actor against their cloud environment. The bad actor managed to access their account within their public cloud provider of choice. What kind of vulnerability was this?