This vulnerability occurs when a system's login or identity verification process is too easy to bypass or fool. While it attempts to check who a user claims to be, the checks are insufficient, allowing attackers to impersonate legitimate users.
Weak authentication creates a critical security gap by failing to reliably verify user identity. Attackers can exploit this flaw using methods like brute-forcing simple passwords, reusing stolen credentials, or bypassing login pages entirely, often with minimal time or resources. This undermines the entire security model, as access controls are built on the faulty assumption that the user's identity is proven. For developers, this means your authentication mechanism must actively resist common attacks. Implement strong, multi-factor authentication (MFA), enforce robust password policies, and use secure, time-limited sessions. Regularly audit and test your login flows to ensure they cannot be circumvented with automated tools or known exploitation techniques.
Impact: Read Application DataGain Privileges or Assume IdentityExecute Unauthorized Code or Commands
This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.