The vulnerability lies in the improper configuration of the SSL context within the Server class, which serves as a base for other web servers in the Keylime application, including the registrar. The __init__ method of the Server class explicitly sets the verify_mode of the SSL context to CERT_OPTIONAL. This setting makes the client certificate optional during the TLS handshake, effectively disabling mandatory mutual TLS (mTLS) authentication. As a result, any client can connect to the registrar's API endpoints without presenting a valid client certificate, leading to a complete bypass of the authentication mechanism. An attacker can then perform unauthorized actions such as listing, retrieving details of, or deleting registered agents. The provided patch directly addresses this issue by removing the line that sets verify_mode to CERT_OPTIONAL, thereby restoring the intended CERT_REQUIRED behavior and enforcing strict mTLS authentication.