Statements (19)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
Security Weakness
|
gptkbp:cause |
gptkb:Privilege_Escalation
gptkb:Security_Bypass Unauthorized Access |
gptkbp:describes |
A software system does not properly verify the identity of a user or entity
|
gptkbp:externalLink |
https://cwe.mitre.org/data/definitions/287.html
|
gptkbp:hasIdol |
287
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-287
|
gptkbp:mitigatedBy |
Implement strong authentication mechanisms
Validate credentials properly Enforce multi-factor authentication Use secure authentication protocols |
gptkbp:name |
Improper Authentication
|
gptkbp:partOf |
gptkb:CWE
|
gptkbp:relatedTo |
Authentication
|
gptkbp:usedIn |
Vulnerability Classification
|
gptkbp:bfsParent |
gptkb:CWE
|
gptkbp:bfsLayer |
7
|