The product does not record or display information that would be important for identifying the source or nature of an attack, or determining if an action is safe.
The source of an attack will be difficult or impossible to determine. This can allow attacks to the system to continue without notice.