An attacker can login into a web management interface of an affected system to perform bypass authentication remotely.
Get through updates and upcoming events, and more directly in your inbox