NIST 800-53 r5 · Controls catalogue · Family SC
SC-23Session Authenticity
Protect the authenticity of communications sessions.
Last updated: 09 May 2026 03:25 UTC
Implementations targeting this control (0)
- No implementations targeting this control yet.
ATT&CK techniques this control mitigates (20)
- T1071 Application Layer Protocol Command And Control
- T1071.001 Web Protocols Command And Control
- T1071.002 File Transfer Protocols Command And Control
- T1071.003 Mail Protocols Command And Control
- T1071.004 DNS Command And Control
- T1185 Browser Session Hijacking Collection
- T1535 Unused/Unsupported Cloud Regions Stealth
- T1550.004 Web Session Cookie Lateral Movement
- T1557 Adversary-in-the-Middle Credential Access, Collection
- T1557.001 Name Resolution Poisoning and SMB Relay Credential Access, Collection
- T1557.002 ARP Cache Poisoning Credential Access, Collection
- T1557.003 DHCP Spoofing Credential Access, Collection
- T1557.004 Evil Twin Credential Access, Collection
- T1563.001 SSH Hijacking Lateral Movement
- T1573 Encrypted Channel Command And Control
- T1573.001 Symmetric Cryptography Command And Control
- T1573.002 Asymmetric Cryptography Command And Control
- T1622 Debugger Evasion Stealth, Discovery
- T1685 Disable or Modify Tools Defense Impairment
- T1688 Safe Mode Boot Defense Impairment
Weaknesses this control addresses (8)AI
CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.
| CWE | Name | CVEs | Why this control addresses it |
|---|---|---|---|
CWE-319 | Cleartext Transmission of Sensitive Information | 1,042 | Eliminates cleartext exposure of session identifiers or tokens that would allow hijacking. |
CWE-290 | Authentication Bypass by Spoofing | 631 | Requires cryptographic or protocol-level verification that blocks spoofed session establishment or continuation. |
CWE-346 | Origin Validation Error | 548 | Mandates origin validation so that only legitimate endpoints can continue the authenticated session. |
CWE-384 | Session Fixation | 469 | Enforces proper session ID generation and binding, preventing fixation of a known session token. |
CWE-294 | Authentication Bypass by Capture-replay | 264 | Protects against replay of captured session tokens or credentials by requiring authenticated, fresh session channels. |
CWE-300 | Channel Accessible by Non-Endpoint | 53 | Directly prevents non-endpoint access or interception of the session communication path. |
CWE-614 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | 52 | Forces the Secure flag on session cookies, preventing their transmission over unauthenticated HTTP channels. |
CWE-940 | Improper Verification of Source of a Communication Channel | 45 | Requires explicit verification of the communication source, blocking session hijacking via spoofed or alternate channels. |
Top CVEs where this control is the strongest mitigation
| CVE | Risk | CVSS | EPSS | Match |
|---|---|---|---|---|
CVE-2025-23922 | 2.2 | 10.0 | 0.0372 | good |
CVE-2026-27755 | 2.0 | 9.8 | 0.0015 | good |
CVE-2025-63216 | 2.0 | 10.0 | 0.0016 | good |
CVE-2025-25101 | 2.0 | 9.6 | 0.0124 | good |
CVE-2023-53968 | 2.0 | 9.8 | 0.0058 | good |
CVE-2025-25379 | 2.0 | 9.6 | 0.0085 | good |
CVE-2024-13279 | 2.0 | 9.8 | 0.0018 | good |
CVE-2025-63666 | 2.0 | 9.8 | 0.0010 | good |
CVE-2026-30789 | 2.0 | 9.8 | 0.0017 | good |
CVE-2018-25318 | 2.0 | 9.8 | 0.0016 | good |
CVE-2026-35903 | 2.0 | 9.8 | 0.0002 | good |
CVE-2026-25101 | 2.0 | 9.8 | 0.0006 | good |
CVE-2026-3256 | 2.0 | 9.8 | 0.0002 | good |
CVE-2018-25316 | 2.0 | 9.8 | 0.0016 | good |
CVE-2025-40926 | 2.0 | 9.8 | 0.0007 | good |
CVE-2026-30793 | 2.0 | 9.8 | 0.0004 | good |
CVE-2026-24352 | 2.0 | 9.8 | 0.0002 | good |
CVE-2026-23796 | 2.0 | 9.8 | 0.0006 | good |
CVE-2025-67135 | 2.0 | 9.8 | 0.0002 | good |
CVE-2025-52689 | 2.0 | 9.8 | 0.0078 | good |
CVE-2024-51144 | 1.9 | 8.8 | 0.0312 | good |
CVE-2025-25107 | 1.9 | 9.6 | 0.0014 | good |
CVE-2026-39640 | 1.9 | 9.6 | 0.0002 | good |
CVE-2026-40471 | 1.9 | 9.6 | 0.0002 | good |
CVE-2025-25106 | 1.9 | 9.6 | 0.0010 | good |