This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.