CWE-290

Authentication Bypass by Spoofing
AI Translation Available

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Status
incomplete
Abstraction
base

Common Consequences

access control
Impacts
bypass protection mechanism gain privileges or assume identity

Potential Mitigations