Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-290 (使用欺骗进行的认证绕过) — Vulnerability Class 245

245 vulnerabilities classified as CWE-290 (使用欺骗进行的认证绕过). AI Chinese analysis included.

CWE-290 represents a critical authentication weakness where systems fail to properly validate the origin of identity claims, allowing attackers to bypass security controls through spoofing. This vulnerability typically arises when authentication mechanisms rely on easily forged data, such as IP addresses or HTTP headers, without implementing robust verification. Attackers exploit this by injecting malicious or manipulated credentials that mimic legitimate users, thereby gaining unauthorized access to sensitive resources or administrative functions. To mitigate this risk, developers must implement multi-factor authentication and ensure that identity verification relies on cryptographically secure tokens rather than easily spoofable network identifiers. Additionally, rigorous input validation and strict adherence to secure authentication protocols, such as OAuth or OpenID Connect, help prevent attackers from impersonating valid entities, ensuring that only genuinely authenticated users can access protected systems.

MITRE CWE Description
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Common Consequences (1)
Access ControlBypass Protection Mechanism, Gain Privileges or Assume Identity
This weakness can allow an attacker to access resources which are not otherwise accessible without proper authentication.
Examples (2)
The following code authenticates users.
String sourceIP = request.getRemoteAddr(); if (sourceIP != null && sourceIP.equals(APPROVED_IP)) { authenticated = true; }
Bad · Java
Both of these examples check if a request is from a trusted address before responding to the request.
sd = socket(AF_INET, SOCK_DGRAM, 0); serv.sin_family = AF_INET; serv.sin_addr.s_addr = htonl(INADDR_ANY); servr.sin_port = htons(1008); bind(sd, (struct sockaddr *) & serv, sizeof(serv)); while (1) { memset(msg, 0x0, MAX_MSG); clilen = sizeof(cli); if (inet_ntoa(cli.sin_addr)==getTrustedAddress()) { n = recvfrom(sd, msg, MAX_MSG, 0, (struct sockaddr *) & cli, &clilen); } }
Bad · C
while(true) { DatagramPacket rp=new DatagramPacket(rData,rData.length); outSock.receive(rp); String in = new String(p.getData(),0, rp.getLength()); InetAddress clientIPAddress = rp.getAddress(); int port = rp.getPort(); if (isTrustedAddress(clientIPAddress) & secretKey.equals(in)) { out = secret.getBytes(); DatagramPacket sp =new DatagramPacket(out,out.length, IPAddress, port); outSock.send(sp); } }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2023-20245 Cisco Firepower Threat Defense 安全漏洞 — Cisco Adaptive Security Appliance (ASA) Software 5.8 Medium2023-11-01
CVE-2023-20256 Cisco Firepower Threat Defense 安全漏洞 — Cisco Adaptive Security Appliance (ASA) Software 5.0 Medium2023-11-01
CVE-2023-28803 Traffic being bypassed by ZCC by configuring synthetic IP range as local network — Client Connector 5.9 Medium2023-10-23
CVE-2023-30803 Sangfor Next-Gen Application Firewall Authentication Bypass — Net-Gen Application Firewall 9.8 Critical2023-10-10
CVE-2023-41329 Domain restrictions bypass via DNS Rebinding in WireMock and WireMock Studio — wiremock 3.9 Low2023-09-06
CVE-2023-4178 Authentication Bypass in Neutron Smart VMS — Neutron Smart VMS 9.8 Critical2023-09-05
CVE-2023-31424 Web authentication and authorization bypass — SANnav 8.1 High2023-08-31
CVE-2023-30950 CVE-2023-30950 — com.palantir.campaigns:campaigns 6.5 Medium2023-08-03
CVE-2022-48513 Huawei HarmonyOS 安全漏洞 — HarmonyOS 9.1 -2023-07-06
CVE-2023-22814 Authentication Bypass issue in My Cloud OS 5 devices — My Cloud OS 5 10.0 Critical2023-06-30
CVE-2023-3243 Honeywell Alerton 安全漏洞 — BCM-WEB 8.3 High2023-06-28
CVE-2023-3128 Grafana 安全漏洞 — Grafana 9.4 Critical2023-06-22
CVE-2023-2807 Authentication bypass in password reset process — Pandora FMS 6.4 Medium2023-06-13
CVE-2022-36331 Impersonation attack causing an Authentication Bypass on Western Digital devices — My Cloud OS 5 10.0 Critical2023-06-12
CVE-2023-2887 User Authentication Bypass in CBOT's Chatbot — Chatbot 9.8 Critical2023-05-25
CVE-2023-22474 Parse Server is vulnerable to authentication bypass via spoofing — parse-server 8.7 High2023-02-03
CVE-2022-40269 Mitsubishi Electric GOT2000 和GT SoftGOT2000 安全漏洞 — GOT2000 Series GT27 model 6.8 Medium2023-02-02
CVE-2022-32747 Schneider Electric EcoStruxure Cybersecurity Admin Expert 安全漏洞 — EcoStruxure™ Cybersecurity Admin Expert (CAE) 8.0 High2023-01-30
CVE-2022-4098 Wiesemann & Theis: Multiple products prone to missing authentication through spoofing — Com-Server ++ 8.0 High2022-12-13
CVE-2021-45036 Velneo vClient improper authentication — Velneo vClient 8.7 High2022-11-28
CVE-2022-0030 PAN-OS: Authentication Bypass in Web Interface — PAN-OS 8.1 High2022-10-12
CVE-2020-11015 Device Authentication Vulnerability in thinx-device-api IoT Device Management Server — thinx-device-api 7.5 High2022-09-29
CVE-2021-27854 L2 network filtering bypass using stacked VLAN0, LLC/SNAP headers, and Ethernet to Wifi frame translation — P802.1Q 4.7 -2022-09-27
CVE-2021-27853 L2 network filtering can be bypassed using stacked VLAN0 and LLC/SNAP headers — 802.2 4.7 -2022-09-27
CVE-2022-39227 Python-jwt subject to Authentication Bypass by Spoofing — python-jwt 9.1 Critical2022-09-23
CVE-2022-23949 Keylime 安全漏洞 — keylime 7.5 -2022-09-21
CVE-2021-43310 Keylime 安全漏洞 — keylime 9.8 -2022-09-21
CVE-2022-35957 Authentication Bypass in Grafana via auth proxy allowing escalation from admin to server admin — grafana 6.6 Medium2022-09-20
CVE-2022-31149 ActivityWatch vulnerable to DNS rebinding attack — activitywatch 8.8 High2022-09-07
CVE-2022-32744 Samba 权限许可和访问控制问题漏洞 — samba 8.8 -2022-08-25

Vulnerabilities classified as CWE-290 (使用欺骗进行的认证绕过) represent 245 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.