Dark Mode

Settings

Capec-485 Detail

Signature Spoofing by Key Recreation

Detailed Software Likelihood: Low Typical Severity: High

Parents: 473

Threats: T59 T263 T271 T292 T307

Description

An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Not present

External ID Source Link Description
CAPEC-485 capec https://capec.mitre.org/data/definitions/485.html
CWE-330 cwe http://cwe.mitre.org/data/definitions/330.html
T1552.004 ATTACK https://attack.mitre.org/wiki/Technique/T1552/004 Unsecure Credentials: Private Keys
REF-419 reference_from_CAPEC P.J. Leadbitter, D. Page, N.P. Smart, Attacking DSA Under a Repeated Bits Assumption, 2004--07, http://www.iacr.org/archive/ches2004/31560428/31560428.pdf
REF-420 reference_from_CAPEC Debian Security, DSA-1571-1 openssl -- predictable random number generator, 2008--05---13, http://www.debian.org/security/2008/dsa-1571

Not present

  1. An authoritative signer is using a weak method of random number generation or weak signing software that causes key leakage or permits key inference.
  2. An authoritative signer is using a signature algorithm with a direct weakness or with poorly chosen parameters that enable the key to be recovered using signatures from that signer.

Not present

High
Ability to create malformed data blobs and know how to present them directly or indirectly to a victim.

Not present

Not present