Cyber Posture

CWE · MITRE source

CWE-290Authentication Bypass by Spoofing

Abstraction: Base · CVEs in our corpus: 538

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (11)AI

Showing the 8 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
SC-11Trusted PathSCIsolated trusted path ensures the user interacts only with genuine system components, preventing spoofing of authentication interfaces or prompts.
SC-20Secure Name/Address Resolution Service (Authoritative Source)SCDirectly counters DNS response spoofing by requiring cryptographic origin authentication artifacts from the authoritative source.
SC-21Secure Name/Address Resolution Service (Recursive or Caching Resolver)SCDirectly counters DNS response spoofing by requiring cryptographic origin authentication before trusting resolved names/addresses.
IA-12Identity ProofingIARequiring verifiable identity evidence at appropriate assurance levels makes it substantially harder for attackers to successfully spoof or impersonate users to obtain accounts.
IA-3Device Identification and AuthenticationIAUnique device authentication makes successful spoofing of device identity substantially more difficult to achieve.
IA-8Identification and Authentication (Non-organizational Users)IAUnique identification of non-organizational users reduces the feasibility of authentication bypass by spoofing.
AC-9Previous Logon NotificationACReveals spoofed logon attempts through unexpected previous logon timestamps upon legitimate login.
AT-2Literacy Training and AwarenessATTraining specifically addresses recognizing spoofed communications and phishing that enable authentication bypass.
Show 3 more broadly-applicable controls
SC-23Session AuthenticitySCRequires cryptographic or protocol-level verification that blocks spoofed session establishment or continuation.
SC-40Wireless Link ProtectionSCSignal-parameter protections (e.g., cryptographic authentication, anti-spoofing) directly counter spoofing-based authentication bypass.
IA-9Service Identification and AuthenticationIAUnique identification and authentication of services before communications makes spoofing of service identities substantially harder.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2022-24112 KEV9.69.80.94442022-02-11
CVE-2024-4358 KEV9.69.80.94342024-05-29
CVE-2022-23131 KEV9.59.10.94052022-01-13
CVE-2021-294417.48.60.93922021-04-27
CVE-2024-411077.18.10.92002024-07-19
CVE-2024-54085 KEV6.59.80.42972025-03-11
CVE-2021-311956.16.50.79832021-05-11
CVE-2020-73886.110.00.68802021-07-22
CVE-2022-392276.19.10.71312022-09-23
CVE-2025-490023.59.80.26172025-06-03
CVE-2023-50224 KEV3.46.50.01492024-05-03
CVE-2022-31803.49.80.23522025-02-11
CVE-2021-346463.39.80.22512021-08-30
CVE-2024-121083.19.60.19402024-12-31
CVE-2018-53532.99.80.15292020-09-30
CVE-2024-206742.78.80.16052024-01-09
CVE-2025-329662.69.80.11212025-04-23
CVE-2018-78422.59.80.08172019-05-22
CVE-2019-12342.57.50.16632019-11-12
CVE-2022-475222.47.50.15692023-04-15
CVE-2019-168712.39.80.05882019-12-19
CVE-2020-101352.35.40.20192020-05-19
CVE-2022-346892.37.50.13202022-10-11
CVE-2009-10482.29.80.03262009-08-14
CVE-2021-211342.26.50.15322021-02-09