This vulnerability exposes the system to various operational overloads that can lead to either a technical denial of service and/or business disruptions.