The product opens an alternate channel to communicate with an authorized user, but the channel is accessible to other actors.
This creates a race condition that allows an attacker to access the channel before the authorized user does.
Explore 493 software weaknesses
Search 294,000+ vulnerabilities
Learn from real-world examples
Cybersecurity research & tools
Get in touch for collaboration
Explore more security resources