Name |
Authentication Abuse |
|
Likelyhood of attack |
Typical severity |
Medium |
Medium |
|
Summary |
An attacker obtains unauthorized access to an application, service or device either through knowledge of the inherent weaknesses of an authentication mechanism, or by exploiting a flaw in the authentication scheme's implementation. In such an attack an authentication mechanism is functioning but a carefully controlled sequence of events causes the mechanism to grant access to the attacker. |
Prerequisites |
An authentication mechanism or subsystem implementing some form of authentication such as passwords, digest authentication, security certificates, etc. which is flawed in some way. |
Solutions | |
Related Weaknesses |
CWE ID
|
Description
|
CWE-287 |
Improper Authentication |
CWE-1244 |
Internal Asset Exposed to Unsafe Debug Access Level or State |
|
Taxonomy: ATTACK |
Entry ID
|
Entry Name
|
1548 |
Abuse Elevation Control Mechanism |
|