Statements (19)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
Security Weakness
|
| gptkbp:cause |
gptkb:Privilege_Escalation
gptkb:Security_Bypass Unauthorized Access |
| gptkbp:describes |
A software system does not properly verify the identity of a user or entity
|
| gptkbp:externalLink |
https://cwe.mitre.org/data/definitions/287.html
|
| gptkbp:hasIdol |
287
|
| gptkbp:mitigatedBy |
Implement strong authentication mechanisms
Validate credentials properly Enforce multi-factor authentication Use secure authentication protocols |
| gptkbp:name |
Improper Authentication
|
| gptkbp:partOf |
gptkb:CWE
|
| gptkbp:relatedTo |
Authentication
|
| gptkbp:usedIn |
Vulnerability Classification
|
| gptkbp:bfsParent |
gptkb:CWE
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-287
|