Read Time:32 Second

Description

The product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) as a particular concept or category, but it does not properly detect or handle inputs that have been modified or constructed in a way that causes the mechanism to detect a different, incorrect concept.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-693
CWE-697

 

Consequences

Integrity: Bypass Protection Mechanism

When the automated recognition is used in a protection mechanism, an attacker may be able to craft inputs that are misinterpreted in a way that grants excess privileges.

 

Potential Mitigations

CVE References