This vulnerability occurs when an application secures its main communication path but leaves a backup or alternative channel with weaker or no protection.
Think of an application that uses strong encryption for its primary web login but sends password reset codes via unencrypted SMS. An attacker can ignore the fortified main door and easily intercept data through this neglected side channel. This creates a false sense of security, as the overall system is only as strong as its weakest point. Developers often focus all their security efforts on the obvious primary path, forgetting that attackers actively seek out these alternate, less-guarded routes. To prevent this, you must perform a thorough threat model that maps all data flows, not just the primary ones. Apply consistent security controls—like encryption, authentication, and integrity checks—across every channel that handles sensitive data or critical commands. Regularly test both primary and alternate paths during security assessments to ensure your defenses are uniform and comprehensive.
Impact: Gain Privileges or Assume IdentityBypass Protection Mechanism
module foo_bar(data_out, data_in, incoming_id, address, clk, rst_n); output [31:0] data_out; input [31:0] data_in, incoming_id, address; input clk, rst_n; wire write_auth, addr_auth; reg [31:0] data_out, acl_oh_allowlist, q; assign write_auth = | (incoming_id & acl_oh_allowlist) ? 1 : 0; always @*
verilogassign addr_auth = (address == 32'hF00) ? 1: 0;
assign addr_auth = (address == 32'hF00 || address == 32'h800F00) ? 1: 0;