CAPEC-554: Functionality Bypass

An adversary attacks a system by bypassing some or all functionality intended to protect it. Often, a system user will think that protection is in place, but the functionality behind those protections has been disabled by the adversary.

Severity
High
Likelihood
Medium
7
/ 100
low-risk
Active Threat 6/50 · Minimal
Exploit Availability 1/50 · Minimal