This actually reminds me on a somewhat interesting social engineering "vulnerability" a little while back[0].
1. The hacker would call into Amazon and say that the website was acting up and they needed to add a card to the victim's account. It wouldn't take much effort because why would it?
2. The hacker'd call right back and say that "their" email had been compromised and they needed to change it/add a new one and reset the password. You supply the card you just gave (and name/billing address, but those aren't too hard to find)
3. Use that to hop on to the account and grab the last 4 digits of the victim's real card.
You now have the victim's billing address and last 4 of a credit card. A surprising amount of authentication power.
I think the lesson here is if it can be privileged information, it is. Even if it's privileged for someone else.
[0]: https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking...