CWE-290: Authentication Bypass by Spoofing
low-riskThis attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2022-24112 | 9.8 | 94.4% | Y |
| CVE-2022-24112 | 9.8 | 94.4% | Y |
| CVE-2024-4358 | 9.8 | 94.4% | Y |
| CVE-2024-4358 | 9.8 | 94.4% | Y |
| CVE-2022-23131 | 9.1 | 94.0% | Y |
| CVE-2022-23131 | 9.1 | 94.0% | Y |
| CVE-2021-29441 | 8.6 | 93.9% | — |
| CVE-2021-29441 | 8.6 | 93.9% | — |
| CVE-2024-41107 | 8.1 | 92.0% | — |
| CVE-2021-31195 | 6.5 | 77.6% | — |
7
/ 100
low-risk
Active Threat
6/50 · Minimal
Exploit Availability
1/50 · Minimal