CAPEC-475: Signature Spoofing by Improper Validation
An adversary exploits a cryptographic weakness in the signature verification algorithm implementation to generate a valid signature without knowing the key.
Severity
High
Likelihood
Low
3
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
1/50 · Minimal