CWE-287 (Improper Authentication)
GPTKB entity
Statements (27)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
Security Weakness
|
| gptkbp:consequence |
Unauthorized access
Privilege escalation Data exposure |
| gptkbp:describedBy |
gptkb:MITRE_CWE
|
| gptkbp:describes |
When an application does not properly verify the identity of a user, process, or device before granting access to sensitive resources.
|
| gptkbp:example |
Accepting default or blank passwords
Not validating authentication tokens Allowing access to a system without verifying a password |
| gptkbp:foundIn |
APIs
Network services Web applications |
| gptkbp:maintainedBy |
gptkb:MITRE
|
| gptkbp:name |
Improper Authentication
|
| gptkbp:parent |
CWE-284 (Access Control)
|
| gptkbp:prevention |
Implement strong authentication mechanisms
Use multi-factor authentication Validate credentials properly |
| gptkbp:relatedTo |
CWE-285 (Improper Authorization)
CWE-384 (Session Fixation) CWE-863 (Incorrect Authorization) |
| gptkbp:status |
Active
|
| gptkbp:vulnerableTo |
gptkb:CWE-287
|
| gptkbp:bfsParent |
gptkb:Common_Weakness_Enumeration_(CWE)
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-287 (Improper Authentication)
|