Vulnerabilities in L2 base/node images