Portée | Impact | Probabilité |
---|---|---|
Access Control | Bypass Protection Mechanism Note: An attacker could perform an arbitrary number of authentication attempts using different passwords, and eventually gain access to the targeted account using a brute force attack. |
Références | Description |
---|---|
CVE-2019-0039 | the REST API for a network OS has a high limit for number of connections, allowing brute force password guessing |
CVE-1999-1152 | Product does not disconnect or timeout after multiple failed logins. |
CVE-2001-1291 | Product does not disconnect or timeout after multiple failed logins. |
CVE-2001-0395 | Product does not disconnect or timeout after multiple failed logins. |
CVE-2001-1339 | Product does not disconnect or timeout after multiple failed logins. |
CVE-2002-0628 | Product does not disconnect or timeout after multiple failed logins. |
CVE-1999-1324 | User accounts not disabled when they exceed a threshold; possibly a resultant problem. |
Common protection mechanisms include:
Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
Consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator. [REF-45]
According to SOAR, the following detection techniques may be useful:
According to SOAR, the following detection techniques may be useful:
According to SOAR, the following detection techniques may be useful:
According to SOAR, the following detection techniques may be useful:
According to SOAR, the following detection techniques may be useful:
According to SOAR, the following detection techniques may be useful:
CAPEC-ID | Nom du modèle d'attaque |
---|---|
CAPEC-16 | Dictionary-based Password Attack An attacker tries each of the words in a dictionary as passwords to gain access to the system via some user's account. If the password chosen by the user was a word within the dictionary, this attack will be successful (in the absence of other mitigations). This is a specific instance of the password brute forcing attack pattern. Dictionary Attacks differ from similar attacks such as Password Spraying (CAPEC-565) and Credential Stuffing (CAPEC-600), since they leverage unknown username/password combinations and don't care about inducing account lockouts. |
CAPEC-49 | Password Brute Forcing An adversary tries every possible value for a password until they succeed. A brute force attack, if feasible computationally, will always be successful because it will essentially go through all possible passwords given the alphabet used (lower case letters, upper case letters, numbers, symbols, etc.) and the maximum length of the password. |
CAPEC-560 | Use of Known Domain Credentials An adversary guesses or obtains (i.e. steals or purchases) legitimate credentials (e.g. userID/password) to achieve authentication and to perform authorized actions under the guise of an authenticated user or service. |
CAPEC-565 | Password Spraying In a Password Spraying attack, an adversary tries a small list (e.g. 3-5) of common or expected passwords, often matching the target's complexity policy, against a known list of user accounts to gain valid credentials. The adversary tries a particular password for each user account, before moving onto the next password in the list. This approach assists the adversary in remaining undetected by avoiding rapid or frequent account lockouts. The adversary may then reattempt the process with additional passwords, once enough time has passed to prevent inducing a lockout. |
CAPEC-600 | Credential Stuffing An adversary tries known username/password combinations against different systems, applications, or services to gain additional authenticated access. Credential Stuffing attacks rely upon the fact that many users leverage the same username/password combination for multiple systems, applications, and services. |
CAPEC-652 | Use of Known Kerberos Credentials An adversary obtains (i.e. steals or purchases) legitimate Kerberos credentials (e.g. Kerberos service account userID/password or Kerberos Tickets) with the goal of achieving authenticated access to additional systems, applications, or services within the domain. |
CAPEC-653 | Use of Known Operating System Credentials An adversary guesses or obtains (i.e. steals or purchases) legitimate operating system credentials (e.g. userID/password) to achieve authentication and to perform authorized actions on the system, under the guise of an authenticated user or service. This applies to any Operating System. |
Nom | Organisation | Date | Date de publication | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
Sean Eidemiller | Cigital | added/updated demonstrative examples | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Applicable_Platforms, Demonstrative_Examples, Potential_Mitigations | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Name, Potential_Mitigations, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Common_Consequences, Related_Attack_Patterns, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations, References, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Modes_of_Introduction, Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Relationships | |
CWE Content Team | MITRE | updated Detection_Factors, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Demonstrative_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Description, Observed_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated Common_Consequences, Description, Diagram |