Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Authentication Bypass Using an Alternate Path or Channel

A product requires authentication, but the product has an alternate path or channel that does not require authentication. The weakness is introduced during Architecture and Design stage.