CAPEC Details
Name Authentication Bypass
Likelyhood of attack Typical severity
Medium Medium
Summary An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
Prerequisites An authentication mechanism or subsystem implementing some form of authentication such as passwords, digest authentication, security certificates, etc.
Solutions
Related Weaknesses
CWE ID Description
CWE-287 Improper Authentication
Taxonomy: ATTACK
Entry ID Entry Name
1548 Abuse Elevation Control Mechanism