| Zakres | Wpływ | Prawdopodobieństwo |
|---|---|---|
| Access Control | Gain Privileges or Assume Identity Note: An attacker could gain unauthorized access to the system by retrieving legitimate user's authentication credentials. | |
| Availability | DoS: Resource Consumption (Other) Note: An attacker could deny service to legitimate system users by launching a brute force attack on the password recovery mechanism using user ids of legitimate users. | |
| Integrity Other | Other Note: The system's security functionality is turned against the system by the attacker. |
| Odniesienia | Opis |
|---|---|
CVE-2025-1570 | password reset functionality for a WordPress plugin allows a brute force attack of the one-time password |
CVE-2024-9302 | password reset functionality for a WordPress plugin allows a brute force attack of the one-time password |
CVE-2024-5277 | password recovery mechanism for AI developer toolkit does not invalidate the reset password token after it is used, allowing attackers to reuse the token to change passwords of victims |
CVE-2024-38287 | web conference product resets passwords to random 8-digit values, allowing brute force attacks by retrieving the hash |
| CAPEC-ID | Nazwa wzorca ataku |
|---|---|
| CAPEC-50 | Password Recovery Exploitation
An attacker may take advantage of the application feature to help users recover their forgotten passwords in order to gain access into the system with the same privileges as the original user. Generally password recovery schemes tend to be weak and insecure. |
| Nazwa | Organizacja | Data | Data wydania | Version |
|---|---|---|---|---|
| Evgeny Lebanidze | Cigital | Draft 8 |
| Nazwa | Organizacja | Data | Komentarz |
|---|---|---|---|
| CWE Content Team | MITRE | updated Common_Consequences, Description, Maintenance_Notes, Name, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Related_Attack_Patterns | |
| CWE Content Team | MITRE | updated Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated References, Relationships | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Applicable_Platforms, Demonstrative_Examples, Description, Enabling_Factors_for_Exploitation, Modes_of_Introduction, Observed_Examples, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Description | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated Relationships, Weakness_Ordinalities | |
| CWE Content Team | MITRE | updated Observed_Examples |