A cybersecurity expert found issues in the authentication mechanism of a recently launched online platform during a pentest engagement. The existing password can be reset by providing the correct response to the security query, and the submission form lacks protection with a CAPTCHA, potentially enabling a malicious actor to exploit it through a brute force attack. What is the specific name of this vulnerability in the Common Weakness Enumeration?