A weak authentication method was used over an unsecured network, leaving credentials vulnerable to interception and reuse.
Secure the connection using HTTPS or upgrade the authentication mechanism to prevent unauthorized access.