Dark Mode

Settings

Capec-633 Detail

Token Impersonation

Detailed Software Hardware Typical Severity: Medium

Parents: 194

Threats: T59 T263 T271 T292 T307

Description

An adversary exploits a weakness in authentication to create an access token (or equivalent) that impersonates a different entity, and then associates a process/thread to that that impersonated token. This action causes a downstream user to make a decision or take action that is based on the assumed identity, and not the response that blocks the adversary.

Not present

Not present

  1. This pattern of attack is only applicable when a downstream user leverages tokens to verify identity, and then takes action based on that identity.

Not present

Not present

Integrity
Alter Execution Logic (By faking the source of data or services, an adversary can cause a target to make incorrect decisions about how to proceed.)
Gain Privileges (By impersonating identities that have an increased level of access, an adversary gain privilege that they many not have otherwise had.)
Hide Activities (Faking the source of data or services can be used to create a false trail in logs as the target will associated any actions with the impersonated identity instead of the adversary.)

Not present