Attackers may be able to bypass weak authentication faster and/or with less effort than expected.
Scope | Impact | Likelihood |
---|---|---|
Integrity Confidentiality Availability Access Control | Read Application Data, Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands Note: This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code. |
References | Description |
---|---|
CVE-2022-30034 | Chain: Web UI for a Python RPC framework does not use regex anchors to validate user login emails (CWE-777), potentially allowing bypass of OAuth (CWE-1390). |
CVE-2022-35248 | Chat application skips validation when Central Authentication Service (CAS) is enabled, effectively removing the second factor from two-factor authentication |
CVE-2021-3116 | Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390) |
CVE-2022-29965 | Distributed Control System (DCS) uses a deterministic algorithm to generate utility passwords |
CVE-2022-29959 | Initialization file contains credentials that can be decoded using a "simple string transformation" |
CVE-2020-8994 | UART interface for AI speaker uses empty password for root shell |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 4.9 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Observed_Examples |