This vulnerability occurs when a system trusts a single source of data without verification, making it impossible to detect if that source has been tampered with or compromised by an attacker.
Many systems must inherently trust the data they receive, but relying on just one source creates a single point of failure. To build resilience, you should query multiple independent sources for the same critical information and compare the results. If the responses differ, the system can flag sources providing minority or conflicting data as potentially compromised. If there aren't enough consistent responses to establish a clear consensus, treat all queried sources as suspect. The required number of independent sources should scale with the criticality of the data. For high-stakes operations where incorrect data causes serious harm, increase the number of sources you cross-check. This correlation creates a simple but effective integrity check, moving security from blind trust to verified consensus.
Impact: Read Application DataModify Application DataGain Privileges or Assume Identity
An attacker that may be able to execute a single Person-in-the-Middle attack can subvert a check of an external oracle (e.g. the ACME protocol check for a file on a website), and thus inject an arbitrary reply to the single perspective request to the external oracle.