CAPEC Details
Name Functionality Bypass
Likelyhood of attack Typical severity
Medium High
Summary An adversary attacks a system by bypassing some or all functionality intended to protect it. Often, a system user will think that protection is in place, but the functionality behind those protections has been disabled by the adversary.
Prerequisites
Solutions
Related Weaknesses
CWE ID Description
CWE-424 Improper Protection of Alternate Path