CAPEC 485 Signature Spoofing by Key Recreation

Draft Detailed Low Risk
Severity High

Description

An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

1