logo

CWE-1390 - Weak Authentication

CWE-1390

  • Abstraction:
  • Class
  • Structure:
  • Simple
  • Status:
  • Incomplete
Weakness Name

Weak Authentication

Description

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

Common Consequences

Scope: Integrity, Confidentiality, Availability, Access Control

Impact: Read Application Data, Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands

Notes: This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.

Related Weaknesses
  • Release Date:
  • 2022-10-13
  • Latest Modification Date:
  • 2024-02-29