Identifying and Mitigating Security Exposures When Using No Payload Encryption Images with Existing Cryptographic Configuration