| CAPEC Details | |||||||
|---|---|---|---|---|---|---|---|
| Name | Functionality Bypass | ||||||
      
  | |||||||
| Summary | An adversary attacks a system by bypassing some or all functionality intended to protect it. Often, a system user will think that protection is in place, but the functionality behind those protections has been disabled by the adversary. | ||||||
| Prerequisites | |||||||
| Solutions | |||||||
| Related Weaknesses | 
      
  |