Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Authentication Bypass by Assumed-Immutable Data

Identification scheme and realization relies on using of unchangeable data. Despite information is considered to be unaltered, the weakness allows attackers to bypass protection mechanism and gain ability to monitor and change data.
The vulnerability is introduced during Architecture and Design, Implementation stages.