This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Impact: Bypass Protection MechanismGain Privileges or Assume Identity
This weakness can allow an attacker to access resources which are not otherwise accessible without proper authentication.
javacjavacjavac#