CWE-301
Reflection Attack in an Authentication Protocol
BaseDraftLikelihood: Medium
Description
Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.
Hierarchy (View 1000)
Parents
Children
none
Related attack patterns (CAPEC)
CAPEC-90
CVEs mapped to this weakness (0)
No CVEs match the current filter.