CWE-301: Reflection Attack in an Authentication Protocol

low-risk

Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.

Abstraction: Base

Common Consequences

Access Control Gain Privileges or Assume Identity

Real-World Examples (1)

CVE CVSS EPSS KEV
CVE-2019-9497 8.1 9.1%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal