Authentication Bypass by Capture-replay

Incomplete Base
Structure: Simple
Description

This vulnerability occurs when an attacker can intercept and record legitimate authentication traffic, then replay it later to gain unauthorized access. The system accepts the replayed data as valid, effectively bypassing normal authentication checks.

Extended Description

Capture-replay attacks are a prevalent network threat where an adversary eavesdrops on a valid communication session, saves the transmitted data (like login requests or session tokens), and later resends that identical or slightly modified data to the server. Because the replayed data appears legitimate, the system grants access without requiring the attacker to know the actual credentials or break any encryption. These attacks are a specific type of network injection that can be challenging to prevent without implementing proper cryptographic defenses. To mitigate this risk, developers need to ensure that each authentication request is unique and cannot be reused, typically by incorporating timestamps, nonces, or sequence numbers that the server can validate.

Common Consequences 1
Scope: Access Control

Impact: Gain Privileges or Assume Identity

Messages sent with a capture-relay attack allow access to resources which are not otherwise accessible without proper authentication.

Potential Mitigations 2
Phase: Architecture and Design
Utilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once.
Phase: Architecture and Design
Since any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content.
Observed Examples 2
CVE-2005-3435product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
CVE-2007-4961Chain: cleartext transmission of the MD5 hash of password (Cleartext Transmission of Sensitive Information) enables attacks against a server that is susceptible to replay (Authentication Bypass by Capture-replay).
References 1
The CLASP Application Security Process
Secure Software, Inc.
2005
ID: REF-18