Name |
Authentication Bypass |
|
Likelyhood of attack |
Typical severity |
Medium |
Medium |
|
Summary |
An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place. |
Prerequisites |
An authentication mechanism or subsystem implementing some form of authentication such as passwords, digest authentication, security certificates, etc. |
Solutions | |
Related Weaknesses |
CWE ID
|
Description
|
CWE-287 |
Improper Authentication |
|
Taxonomy: ATTACK |
Entry ID
|
Entry Name
|
1548 |
Abuse Elevation Control Mechanism |
|