A simple flow chart or state diagram would show the vulnerability. I'm not saying it was intentional, but I believe the backdoor label can be applied to accidental entrances as well.
The bottom line is that Apple produced a device whose security features could be circumvented.
The bottom line is that Apple produced a device whose security features could be circumvented.