CAPEC-633: Token Impersonation

An adversary exploits a weakness in authentication to create an access token (or equivalent) that impersonates a different entity, and then associates a process/thread to that that impersonated token. This action causes a downstream user to make a decision or take action that is based on the assumed identity, and not the response that blocks the adversary.

Severity
Medium
17
/ 100
low-risk
Active Threat 14/50 · Low
Exploit Availability 3/50 · Minimal