CWE-294
Authentication Bypass by Capture-replay
AI Translation Available
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Status
incomplete
Abstraction
base
Likelihood
high
Affected Platforms
Extended Description
AI Translation
Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.
Technical Details
AI Translation
Common Consequences
access control
Impacts
gain privileges or assume identity
Potential Mitigations
Phases:
architecture and design
Descriptions:
•
Utilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once.
•
Since any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content.