Authentication Bypass Using an Alternate Path or Channel
A product requires authentication, but the product has an alternate path or channel that does not require authentication. The weakness is introduced during Architecture and Design stage.