So, to echo Florian's comments, "local" and "remote" is not sufficient in fully evaluating the severity of a vulnerability in a particular environment.
- Steve
P.S. Credits to Adam Shostack and Scott Blake for initially educating me about the role of authentication in "local" vs. "remote" terminology.