Authentication Bypass via IP Spoofing
Variants:
Direct
Vector Type:
Attack
Relevance:
Generic
Layer:
Application-Level
Platforms:
Any
Target Type:
Application
Affected Mechanisms:
Authentication Verification, Secure Design
Invented In:
11/01/1999
Added In:
09/12/2014
Vector Operation Method:
Attackers can spoof the IP address to bypass the security restrictions of applications that rely on the self reported IP address for authentication or authorization enforcement.