Truncation of Security-relevant Information
The product truncates the display, recording, or processing of security-relevant information in a way that can obscure the source or nature of an attack.
The source of an attack will be difficult or impossible to determine. This can allow attacks to the system to continue without notice.