CWE-290

Authentication Bypass by Spoofing

Weakness Description

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Common Consequences

Access Control
Bypass Protection MechanismGain Privileges or Assume Identity

This weakness can allow an attacker to access resources which are not otherwise accessible without proper authentication.

Advertisement

Related Weaknesses