The product implements an authentication technique, but it skips a step that weakens the technique.
Extended description
Authentication techniques should follow the algorithms that define them exactly, otherwise authentication can be bypassed or more easily subjected to brute force attacks.