Dark Mode
Capec-476 Detail
Signature Spoofing by Misrepresentation
Detailed Software Likelihood: Low Typical Severity: High
Parents: 473
Threats: T59 T263 T271 T292 T307
An attacker exploits a weakness in the parsing or display code of the recipient software to generate a data blob containing a supposedly valid signature, but the signer's identity is falsely represented, which can lead to the attacker manipulating the recipient software or its victim user to perform compromising actions.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-476 | capec | https://capec.mitre.org/data/definitions/476.html | |
| CWE-290 | cwe | http://cwe.mitre.org/data/definitions/290.html | |
| REF-414 | reference_from_CAPEC | Eric Johanson, The state of homograph attacks, 2005--02---11, http://www.shmoo.com/idn/homograph.txt |
Not present
- Recipient is using signature verification software that does not clearly indicate potential homographs in the signer identity.Recipient is using signature verification software that contains a parsing vulnerability, or allows control characters in the signer identity field, such that a signature is mistakenly displayed as valid and from a known or authoritative signer.
Not present
| High |
|---|
| Attacker may be required to create malformed data blobs and know how to insert them in a location that the recipient will visit. |
Not present
Not present