Movatterモバイル変換


[0]ホーム

URL:


Skip to content

A07:2021 – Identification and Authentication Failuresicon

Factors

CWEs MappedMax Incidence RateAvg Incidence RateAvg Weighted ExploitAvg Weighted ImpactMax CoverageAvg CoverageTotal OccurrencesTotal CVEs
2214.84%2.55%7.406.5079.51%45.72%132,1953,897

Overview

Previously known asBroken Authentication, this category slid downfrom the second position and now includes Common Weakness Enumerations (CWEs) related to identificationfailures. Notable CWEs included areCWE-297: Improper Validation ofCertificate with Host Mismatch,CWE-287: Improper Authentication, andCWE-384: Session Fixation.

Description

Confirmation of the user's identity, authentication, and sessionmanagement is critical to protect against authentication-relatedattacks. There may be authentication weaknesses if the application:

How to Prevent

  • Where possible, implement multi-factor authentication to prevent automated credential stuffing, brute force, and stolen credential reuse attacks.

  • Do not ship or deploy with any default credentials, particularly for admin users.

  • Implement weak password checks, such as testing new or changed passwords against the top 10,000 worst passwords list.

  • Align password length, complexity, and rotation policies with National Institute of Standards and Technology (NIST) 800-63b's guidelines in section 5.1.1 for Memorized Secrets or other modern, evidence-based password policies.

  • Ensure registration, credential recovery, and API pathways are hardened against account enumeration attacks by using the same messages for all outcomes.

  • Limit or increasingly delay failed login attempts, but be careful not to create a denial of service scenario. Log all failures and alert administrators when credential stuffing, brute force, or other attacks are detected.

  • Use a server-side, secure, built-in session manager that generates a new random session ID with high entropy after login. Session identifier should not be in the URL, be securely stored, and invalidated after logout, idle, and absolute timeouts.

Example Attack Scenarios

Scenario #1: Credential stuffing, the use of lists of knownpasswords, is a common attack. Suppose an application does not implementautomated threat or credential stuffing protection. In that case, theapplication can be used as a password oracle to determine if thecredentials are valid.

Scenario #2: Most authentication attacks occur due to the continueduse of passwords as a sole factor. Once considered best practices,password rotation and complexity requirements encourage users to useand reuse weak passwords. Organizations are recommended to stop thesepractices per NIST 800-63 and use multi-factor authentication.

Scenario #3: Application session timeouts aren't set correctly. Auser uses a public computer to access an application. Instead ofselecting "logout," the user simply closes the browser tab and walksaway. An attacker uses the same browser an hour later, and the user isstill authenticated.

References

List of Mapped CWEs

CWE-255 Credentials Management Errors

CWE-259 Use of Hard-coded Password

CWE-287 Improper Authentication

CWE-288 Authentication Bypass Using an Alternate Path or Channel

CWE-290 Authentication Bypass by Spoofing

CWE-294 Authentication Bypass by Capture-replay

CWE-295 Improper Certificate Validation

CWE-297 Improper Validation of Certificate with Host Mismatch

CWE-300 Channel Accessible by Non-Endpoint

CWE-302 Authentication Bypass by Assumed-Immutable Data

CWE-304 Missing Critical Step in Authentication

CWE-306 Missing Authentication for Critical Function

CWE-307 Improper Restriction of Excessive Authentication Attempts

CWE-346 Origin Validation Error

CWE-384 Session Fixation

CWE-521 Weak Password Requirements

CWE-613 Insufficient Session Expiration

CWE-620 Unverified Password Change

CWE-640 Weak Password Recovery Mechanism for Forgotten Password

CWE-798 Use of Hard-coded Credentials

CWE-940 Improper Verification of Source of a Communication Channel

CWE-1216 Lockout Mechanism Errors


[8]ページ先頭

©2009-2025 Movatter.jp