Vulnerability that cards can call unauthorized APIs in the FRS process Impact: Successful exploitation of this vulnerability may affect availability.
A product requires authentication, but the product has an alternate path or channel that does not require authentication.