CAPEC 475 Signature Spoofing by Improper Validation

Draft Detailed Low Risk
Severity High

Description

An adversary exploits a cryptographic weakness in the signature verification algorithm implementation to generate a valid signature without knowing the key.

Mitigations

1

Consequences

Relationships