CWE-290: Authentication Bypass by Spoofing

low-risk

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2022-24112 9.8 94.4% Y
CVE-2022-24112 9.8 94.4% Y
CVE-2024-4358 9.8 94.4% Y
CVE-2024-4358 9.8 94.4% Y
CVE-2022-23131 9.1 94.0% Y
CVE-2022-23131 9.1 94.0% Y
CVE-2021-29441 8.6 93.9%
CVE-2021-29441 8.6 93.9%
CVE-2024-41107 8.1 92.0%
CVE-2021-31195 6.5 77.6%
7
/ 100
low-risk
Active Threat 6/50 · Minimal
Exploit Availability 1/50 · Minimal