Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.