CAPEC 90 Reflection Attack in Authentication Protocol

Draft Standard High Risk
Severity High

Description

An adversary can abuse an authentication protocol susceptible to reflection attack in order to defeat it. Doing so allows the adversary illegitimate access to the target system, without possessing the requisite credentials. Reflection attacks are of great concern to authentication protocols that rely on a challenge-handshake or similar mechanism. An adversary can impersonate a legitimate user and can gain illegitimate access to the system by successfully mounting a reflection attack during authentication.

Attack Execution Flow

6

Mitigations

3

Consequences

Relationships

Resources Required

1