The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to application is using weak authentication tokens and salts. A remote attacker can bypass authentication process and gain unauthorized access to the application.