Statements (18)
| Predicate | Object | 
|---|---|
| gptkbp:instanceOf | gptkb:Common_Weakness_Enumeration | 
| gptkbp:category | Security weakness | 
| gptkbp:citation | https://cwe.mitre.org/data/definitions/288.html | 
| gptkbp:consequence | Unauthorized access Privilege escalation | 
| gptkbp:describes | A situation where authentication is bypassed by using an alternate path or channel | 
| gptkbp:foundIn | Network protocols Web applications | 
| gptkbp:mitigatedBy | Enforce authentication on all access paths Validate all channels for authentication | 
| gptkbp:name | Authentication Bypass Using an Alternate Path or Channel | 
| gptkbp:partOf | gptkb:CWE | 
| gptkbp:relatedTo | Authorization Authentication | 
| gptkbp:vulnerableTo | 288 | 
| gptkbp:bfsParent | gptkb:CVE-2022-1040 | 
| gptkbp:bfsLayer | 7 | 
| https://www.w3.org/2000/01/rdf-schema#label | CWE-288 |