This vulnerability allows attackers to impersonate a trusted host.