CWE-1390: Weak Authentication
Description
The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.
Submission Date :
Oct. 5, 2022, midnight
Modification Date :
2023-10-26 00:00:00+00:00
Organization :
MITRE
Extended Description
Attackers may be able to bypass weak authentication faster and/or with less effort than expected.
Example - 1
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications. Multiple OT products used weak authentication.
Related Weaknesses
This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.
CWE-262: Not Using Password Aging
CWE-263: Password Aging with Long Expiration
CWE-287: Improper Authentication
CWE-289: Authentication Bypass by Alternate Name
CWE-290: Authentication Bypass by Spoofing
CWE-294: Authentication Bypass by Capture-replay
CWE-301: Reflection Attack in an Authentication Protocol
CWE-302: Authentication Bypass by Assumed-Immutable Data
CWE-303: Incorrect Implementation of Authentication Algorithm
CWE-305: Authentication Bypass by Primary Weakness
CWE-307: Improper Restriction of Excessive Authentication Attempts
CWE-308: Use of Single-factor Authentication
CWE-309: Use of Password System for Primary Authentication
CWE-522: Insufficiently Protected Credentials
CWE-593: Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
CWE-603: Use of Client-Side Authentication
CWE-620: Unverified Password Change
CWE-640: Weak Password Recovery Mechanism for Forgotten Password
CWE-804: Guessable CAPTCHA
CWE-836: Use of Password Hash Instead of Password for Authentication
CWE-1391: Use of Weak Credentials
Visit http://cwe.mitre.org/ for more details.