CWE-301: Reflection Attack in an Authentication Protocol
low-riskSimple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.
Abstraction: Base
Common Consequences
Access Control
→
Gain Privileges or Assume Identity
Real-World Examples (1)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2019-9497 | 8.1 | 9.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal