Dark Mode
Capec-485 Detail
Signature Spoofing by Key Recreation
Detailed Software Likelihood: Low Typical Severity: High
Parents: 473
Threats: T59 T263 T271 T292 T307
An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-485 | capec | https://capec.mitre.org/data/definitions/485.html | |
| CWE-330 | cwe | http://cwe.mitre.org/data/definitions/330.html | |
| T1552.004 | ATTACK | https://attack.mitre.org/wiki/Technique/T1552/004 | Unsecure Credentials: Private Keys |
| REF-419 | reference_from_CAPEC | P.J. Leadbitter, D. Page, N.P. Smart, Attacking DSA Under a Repeated Bits Assumption, 2004--07, http://www.iacr.org/archive/ches2004/31560428/31560428.pdf | |
| REF-420 | reference_from_CAPEC | Debian Security, DSA-1571-1 openssl -- predictable random number generator, 2008--05---13, http://www.debian.org/security/2008/dsa-1571 |
Not present
- An authoritative signer is using a weak method of random number generation or weak signing software that causes key leakage or permits key inference.
- An authoritative signer is using a signature algorithm with a direct weakness or with poorly chosen parameters that enable the key to be recovered using signatures from that signer.
Not present
| High |
|---|
| Ability to create malformed data blobs and know how to present them directly or indirectly to a victim. |
Not present
Not present