Authentication Bypass by Assumed-Immutable Data
Identification scheme and realization relies on using of unchangeable data. Despite information is considered to be unaltered, the weakness allows attackers to bypass protection mechanism and gain ability to monitor and change data.
The vulnerability is introduced during Architecture and Design, Implementation stages.
The vulnerability is introduced during Architecture and Design, Implementation stages.