Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-287 (认证机制不恰当) — Vulnerability Class 1203

1203 vulnerabilities classified as CWE-287 (认证机制不恰当). AI Chinese analysis included.

CWE-287 represents a critical authentication weakness where a system fails to adequately verify the identity of an actor claiming a specific identity. This flaw typically allows attackers to bypass security controls by exploiting insufficient verification mechanisms, enabling unauthorized access through stolen credentials, brute-force attacks, or session hijacking. When authentication logic is flawed, malicious entities can impersonate legitimate users, leading to severe data breaches and privilege escalation. Developers mitigate this risk by implementing robust, multi-factor authentication protocols and ensuring that identity verification processes are rigorous and resistant to common attack vectors. By strictly validating credentials against secure, hashed databases and employing adaptive security measures, organizations can significantly reduce the likelihood of unauthorized access, thereby protecting sensitive information and maintaining system integrity against sophisticated cyber threats.

MITRE CWE Description
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Common Consequences (1)
Integrity, Confidentiality, Availability, Access ControlRead Application Data, Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands
This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.
Mitigations (1)
Architecture and DesignUse an authentication framework or library such as the OWASP ESAPI Authentication feature.
Examples (2)
The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to "remember" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the "Administrator" username, as recorded in the user cookie.
my $q = new CGI; if ($q->cookie('loggedin') ne "true") { if (! AuthenticateUser($q->param('username'), $q->param('password'))) { ExitError("Error: you need to log in first"); } else { # Set loggedin and user cookies. $q->cookie( -name => 'loggedin', -value => 'true' ); $q->cookie( -name => 'user', -value => $q->param('username') ); } } if ($q->cookie('user') eq "Administrator") { DoAdministratorTasks(); }
Bad · Perl
GET /cgi-bin/vulnerable.cgi HTTP/1.1 Cookie: user=Administrator Cookie: loggedin=true [body of request]
Attack
In January 2009, an attacker was able to gain administrator access to a Twitter server because the server did not restrict the number of login attempts [REF-236]. The attacker targeted a member of Twitter's support team and was able to successfully guess the member's password using a brute force attack by guessing a large number of common words. After gaining access as the member of the support st…
CVE IDTitleCVSSSeverityPublished
CVE-2023-20867 VMware Tools Authentication Bypass Vulnerability — VMware Tools 3.9 Low2023-06-13
CVE-2023-34246 Doorkeeper Improper Authentication vulnerability — doorkeeper 4.2 Medium2023-06-12
CVE-2023-32682 Improper checks for deactivated users during login in synapse — synapse 5.4 Medium2023-06-06
CVE-2023-3065 Mobatime mobile application - Authentication bypass — Mobatime mobile application AMXGT100 9.1 Critical2023-06-05
CVE-2023-2283 libssh 授权问题漏洞 — libssh 7.5 -2023-05-26
CVE-2023-2586 Teltonika Remote Management System 授权问题漏洞 — Remote Management System 9.0 Critical2023-05-22
CVE-2023-32347 Teltonika Remote Management System 授权问题漏洞 — Remote Management System 8.1 High2023-05-22
CVE-2023-2024 Improper Authentication for OpenBlue Enterprise Manager Data Collector — OpenBlue Enterprise Manager Data Collector 10.0 Critical2023-05-18
CVE-2023-0863 Authentication to access the AC wallbox via its Bluetooth Low Energy (BLE) channel can be bypassed, — Terra AC wallbox (UL40/80A) 8.8 High2023-05-17
CVE-2023-2706 OTP Login Woocommerce & Gravity Forms <= 2.2 - Authentication Bypass to Privilege Escalation — OTP Login & Register Woocommerce 8.1 High2023-05-17
CVE-2023-32081 Vert.x STOMP server process client frames that would not send initially a connect frame — vertx-stomp 6.5 Medium2023-05-12
CVE-2023-29032 Apache OpenMeetings: allows bypass authentication — Apache OpenMeetings 8.8 -2023-05-12
CVE-2023-32243 WordPress Essential Addons for Elementor Plugin 5.4.0-5.7.1 is vulnerable to Privilege Escalation — Essential Addons for Elementor 9.8 Critical2023-05-12
CVE-2023-28125 Ivanti Avalanche 竞争条件问题漏洞 — Avalanche 9.8 -2023-05-09
CVE-2023-31123 effectindex/tripreporter vulnerable to improper password verification on POST `/api/v1/account/login` — tripreporter 9.1 Critical2023-05-08
CVE-2023-21487 SAMSUNG Mobile devices 授权问题漏洞 — Samsung Mobile Devices 5.1 Medium2023-05-04
CVE-2023-21484 SAMSUNG Mobile devices 授权问题漏洞 — Samsung Mobile Devices 5.1 Medium2023-05-04
CVE-2022-30995 Acronis Cyber Backup和Acronis Cyber Protect 授权问题漏洞 — Acronis Cyber Protect 15 7.5 -2023-05-03
CVE-2023-30869 WordPress Easy Digital Downloads Plugin 3.1-3.1.1.4.1 is vulnerable to Privilege Escalation — Easy Digital Downloads 9.8 Critical2023-05-02
CVE-2023-1477 HYPR 授权问题漏洞 — Keycloak Authenticator Extension 7.2 High2023-04-28
CVE-2023-1778 Default Credential Vulnerability in GajShield Data Security Firewall — Data Security Firewall 10.0 Critical2023-04-27
CVE-2023-30845 ESPv2 vulnerable to JWT authentication bypass via `X-HTTP-Method-Override` header — esp-v2 8.2 High2023-04-26
CVE-2022-45456 Acronis Agent 安全漏洞 — Acronis Agent 7.5 -2023-04-26
CVE-2023-0209 NVIDIA DGX-1 授权问题漏洞 — NVIDIA DGX servers 8.2 High2023-04-22
CVE-2023-25601 Apache DolphinScheduler 3.0.0 to 3.1.1 python gateway has improper authentication — Apache DolphinScheduler 9.1 -2023-04-20
CVE-2023-27351 PaperCut NG 授权问题漏洞 — NG 9.8 -2023-04-20
CVE-2023-25556 Schneider Electric StruxureWare Data Center Expert 授权问题漏洞 — Merten INSTABUS Tastermodul 1fach System M 625199 8.3 High2023-04-18
CVE-2023-24831 Apache IoTDB grafana-connector Login Bypass Vulnerability — Apache IoTDB 8.8 -2023-04-17
CVE-2023-28963 Junos OS: User-controlled input vulnerability in J-Web — Junos OS 5.3 Medium2023-04-17
CVE-2023-28962 Junos OS: Unauthenticated access vulnerability in J-Web — Junos OS 5.3 Medium2023-04-17

Vulnerabilities classified as CWE-287 (认证机制不恰当) represent 1203 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.