This vulnerability mainly affects the traceability and non-repudiation of the user's actions.
The system must restrict the number of concurrent sessions that a user can establish depending on the system's function.