Cryptographically Weak could imply that the system has a vulnerability which could lead to an exploit.
In Cryptography discussions we typically make a Computational Hardness Assumption.