Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-306 (关键功能的认证机制缺失) — Vulnerability Class 1115

1115 vulnerabilities classified as CWE-306 (关键功能的认证机制缺失). AI Chinese analysis included.

CWE-306 represents a critical authentication weakness where software fails to verify user identity before executing sensitive operations or consuming substantial resources. Attackers typically exploit this vulnerability by directly invoking administrative endpoints, initiating high-cost processes, or accessing restricted data without valid credentials, effectively bypassing security controls. This oversight allows unauthorized users to perform actions intended only for authenticated individuals, leading to privilege escalation, data breaches, or denial of service through resource exhaustion. To mitigate this risk, developers must implement robust access control mechanisms that strictly enforce authentication checks on all critical functions. This involves integrating secure session management, validating tokens for every request, and applying the principle of least privilege to ensure that only verified users with appropriate permissions can trigger sensitive operations or consume significant system resources.

MITRE CWE Description
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Common Consequences (1)
Access Control, OtherGain Privileges or Assume Identity, Varies by Context
Exposing critical functionality essentially provides an attacker with the privilege level of that functionality. The consequences will depend on the associated functionality, but they can range from reading or modifying sensitive data, accessing administrative or other privileged functionality, or p…
Mitigations (5)
Architecture and DesignDivide the software into anonymous, normal, privileged, and administrative areas. Identify which of these areas require a proven user identity, and use a centralized authentication capability. Identify all potential communication channels, or other means of interaction with the software, to ensure that all channels are appropriately protected, including those channels that are assumed to be access…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Architecture and DesignWhere possible, avoid implementing custom, "grow-your-own" authentication routines and consider using authentication capabilities as provided by the surrounding framework, operating system, or environment. These capabilities may avoid common weaknesses that are unique to authentication; support automatic auditing and tracking; and make it easier to provide a clear separation between authentication…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator [REF-45].
Implementation, System Configuration, OperationWhen storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to require strong authentication for users who should be allowed to access the data [REF-1297] [REF-1298] [REF-1302].
Examples (2)
In the following Java example the method createBankAccount is used to create a BankAccount object for a bank management application.
public BankAccount createBankAccount(String accountNumber, String accountType, String accountName, String accountSSN, double balance) { BankAccount account = new BankAccount(); account.setAccountNumber(accountNumber); account.setAccountType(accountType); account.setAccountOwnerName(accountName); account.setAccountOwnerSSN(accountSSN); account.setBalance(balance); return account; }
Bad · Java
private boolean isUserAuthentic = false; // authenticate user, // if user is authenticated then set variable to true // otherwise set variable to false public boolean authenticateUser(String username, String password) { ... } public BankAccount createNewBankAccount(String accountNumber, String accountType, String accountName, String accountSSN, double balance) { BankAccount account = null; if (isUserAuthentic) { account = new BankAccount(); account.setAccountNumber(accountNumber); account.setAccountType(accountType); account.setAccountOwnerName(accountName); account.setAccountOwnerSSN(accountS
Good · Java
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these…
CVE IDTitleCVSSSeverityPublished
CVE-2019-6543 AVEVA Group plc InduSoft Web Studio和InTouch Edge HMI 访问控制错误漏洞 — AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update 8.4 -2019-02-13
CVE-2019-6533 Kunbus PR100088 Modbus 安全漏洞 — PR100088 Modbus gateway 9.1 -2019-02-12
CVE-2018-0181 Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent Software Redis Server Unauthenticated Access Vulnerability — Cisco Policy Suite (CPS) Software 9.1 -2019-01-10
CVE-2018-18995 ABB GATE-E1和GATE-E2 安全漏洞 — ABB GATE-E1 and GATE-E2 9.8 -2019-01-03
CVE-2018-17924 多款Rockwell Automation产品安全漏洞 — Rockwell Automation 7.5 -2018-12-07
CVE-2018-5393 TP-Link EAP Controller versions 2.5.3 and earlier lack RMI authentication — EAP Controller 9.8 -2018-09-28
CVE-2018-14796 Tec4Data SmartCooler 安全漏洞 — SmartCooler 7.5 -2018-09-20
CVE-2018-10603 Martem GW6和GWM 授权问题漏洞 — TELEM GW6 9.8 -2018-07-31
CVE-2017-2637 Red Hat OpenStack 权限许可和访问控制问题漏洞 — rhosp-director 10.0 -2018-07-26
CVE-2017-3217 CalAmp LMU 3030 series OBD-II CDMA and GSM devices has an SMS (text message) interface that can be deployed where no password is configured for this interface by the integrator / reseller — LMU 3030 OBD-II 8.1 -2018-07-24
CVE-2018-0374 Cisco Policy Suite 安全漏洞 — Cisco Policy Suite unknown 9.1 -2018-07-18
CVE-2018-0376 Cisco Policy Suite 安全漏洞 — Cisco Policy Suite unknown 7.5 -2018-07-18
CVE-2018-0377 Cisco Policy Suite 安全漏洞 — Cisco Policy Suite unknown 9.1 -2018-07-18
CVE-2017-2638 infinispan 安全漏洞 — infinispan 8.2 -2018-07-16
CVE-2016-6544 iTrack Easy's getgps data can be modified without authentication — Easy 7.5 -2018-07-13
CVE-2016-6549 Zizai Tech Nut allows for unauthenticated Bluetooth pairing — Tech Nut 4.3 -2018-07-13
CVE-2016-9496 Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, lacks authentication to access certain pages — HN7740S 6.5 -2018-07-13
CVE-2018-10635 Universal Robots Robot Controllers 安全漏洞 — Universal Robots Robot Controllers Version CB 3.1, SW Version 3.4.5-100 9.8 -2018-07-11
CVE-2016-6540 TrackR Bravo is missing authentication for the cloud service and allows querying or sending of GPS data from unauthenticated users — Bravo Mobile Application 8.1 -2018-07-06
CVE-2016-6541 TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes — Bravo Mobile Application 8.8 -2018-07-06
CVE-2018-4853 Siemens SICLOCK TC100和SICLOCK TC400 安全漏洞 — SICLOCK TC100, SICLOCK TC400 7.5 -2018-07-03
CVE-2018-4854 Siemens SICLOCK TC100和SICLOCK TC400 安全漏洞 — SICLOCK TC100, SICLOCK TC400 8.8 -2018-07-03
CVE-2011-4190 Missing verification of host key for kdump server — kdump 5.3 -2018-06-08
CVE-2018-4840 多款Siemens产品访问控制错误漏洞 — DIGSI 4 7.5 -2018-03-08
CVE-2018-1164 ZyXEL P-870H-51 DSL Router 安全漏洞 — ZyXEL P-870H-51 DSL Router 9.8 -2018-02-21
CVE-2018-4834 Siemens Desigo PXC Series 代码问题漏洞 — Desigo PXC00-E.D V4.10 9.8 Critical2018-01-24
CVE-2017-3184 多款ACTi产品安全漏洞 — ACTi D, B, I, and E series cameras 9.8 -2017-12-15
CVE-2017-13997 Schneider Electric InduSoft Web Studio和InTouch Machine Edition 安全漏洞 — Schneider Electric InduSoft Web Studio, InTouch Machine Edition 9.8 -2017-10-02
CVE-2017-12733 多款OPW产品安全漏洞 — OPW Fuel Management Systems SiteSentinel Integra and SiteSentinel iSite 9.8 -2017-09-09
CVE-2017-6872 Siemens OZW672和OZW772 安全漏洞 — OZW672, OZW772 6.5 -2017-08-08

Vulnerabilities classified as CWE-306 (关键功能的认证机制缺失) represent 1115 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.