When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2024-11680 — KEV
File-sharing PHP product does not check if user is logged in during requests for PHP library files under an includes/ directory, allowing configuration changes, code execution, and other impacts.
CVE: CVE-2022-35248
Chat application skips validation when Central Authentication Service (CAS) is enabled, effectively removing the second factor from two-factor authentication
CVE: CVE-2022-36436
Python-based authentication proxy does not enforce password authentication during the initial handshake, allowing the client to bypass authentication by specifying a 'None' authentication type.
CVE: CVE-2022-30034
Chain: Web UI for a Python RPC framework does not use regex anchors to validate user login emails (CWE-777), potentially allowing bypass of OAuth (CWE-1390).
CVE: CVE-2022-29951
TCP-based protocol in Programmable Logic Controller (PLC) has no authentication.
CVE: CVE-2022-29952
Condition Monitor uses a protocol that does not require authentication.
CVE: CVE-2022-30313
Safety Instrumented System uses proprietary TCP protocols with no authentication.
CVE: CVE-2022-30317
Distributed Control System (DCS) uses a protocol that has no authentication.
CVE: CVE-2022-33139
SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.
CVE: CVE-2021-3116
Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390)
CVE: CVE-2021-21972 — KEV
Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.
CVE: CVE-2021-37415 — KEV
IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.
CVE: CVE-2021-35033
Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port
CVE: CVE-2020-10263
Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access
CVE: CVE-2020-13927 — KEV
Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.
CVE: CVE-2021-35395 — KEV
Stack-based buffer overflows in SFK for wifi chipset used for IoT/embedded devices, as exploited in the wild per CISA KEV.
CVE: CVE-2021-34523 — KEV
Mail server does not properly check an access token before executing a Powershell command, as exploited in the wild per CISA KEV.
CVE: CVE-2020-12812 — KEV
Chain: user is not prompted for a second authentication factor (CWE-287) when changing the case of their username (CWE-178), as exploited in the wild per CISA KEV.
CVE: CVE-2020-10148 — KEV
Authentication bypass by appending specific parameters and values to a URI, as exploited in the wild per CISA KEV.
CVE: CVE-2020-0688 — KEV
Mail server does not generate a unique key during installation, as exploited in the wild per CISA KEV.
CVE: CVE-2017-14623
LDAP Go package allows authentication bypass using an empty password, causing an unauthenticated LDAP bind
CVE: CVE-2009-3421
login script for guestbook allows bypassing authentication by setting a "login_ok" parameter to 1.
CVE: CVE-2009-2382
admin script allows authentication bypass by setting a cookie value to "LOGGEDIN".
CVE: CVE-2009-1048
VOIP product allows authentication bypass using 127.0.0.1 in the Host header.
CVE: CVE-2009-2213
product uses default "Allow" action, instead of default deny, leading to authentication bypass.
CVE: CVE-2009-2168
chain: redirect without exit (CWE-698) leads to resultant authentication bypass.
CVE: CVE-2009-3107
product does not restrict access to a listening port for a critical service, allowing authentication to be bypassed.
CVE: CVE-2009-1596
product does not properly implement a security-related configuration setting, allowing authentication bypass.
CVE: CVE-2009-2422
authentication routine returns "nil" instead of "false" in some situations, allowing authentication bypass using an invalid username.
CVE: CVE-2009-3232
authentication update script does not properly handle when admin does not select any authentication modules, allowing authentication bypass.
CVE: CVE-2009-3231
use of LDAP authentication with anonymous binds causes empty password to result in successful authentication
CVE: CVE-2005-3435
product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
CVE: CVE-2005-0408
chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.
Phase | Note |
---|---|
Architecture and Design | N/A |
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Intro: The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to "remember" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the "Administrator" username, as recorded in the user cookie.
Body: Unfortunately, this code can be bypassed. The attacker can set the cookies independently so that the code does not check the username and password. The attacker could do this with an HTTP request containing headers such as:
my $q = new CGI; if ($q->cookie('loggedin') ne "true") { if (! AuthenticateUser($q->param('username'), $q->param('password'))) { ExitError("Error: you need to log in first"); } else { # Set loggedin and user cookies. $q->cookie( -name => 'loggedin', -value => 'true' ); $q->cookie( -name => 'user', -value => $q->param('username') ); } } if ($q->cookie('user') eq "Administrator") { DoAdministratorTasks(); }
Intro: In January 2009, an attacker was able to gain administrator access to a Twitter server because the server did not restrict the number of login attempts [REF-236]. The attacker targeted a member of Twitter's support team and was able to successfully guess the member's password using a brute force attack by guessing a large number of common words. After gaining access as the member of the support staff, the attacker used the administrator panel to gain access to 33 accounts that belonged to celebrities and politicians. Ultimately, fake Twitter messages were sent that appeared to come from the compromised accounts.
Intro: In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these products were often used in industries such as power, electrical, water, and others, there could even be safety implications.
Body: Multiple vendors did not use any authentication or used client-side authentication for critical functionality in their OT products.