Unimplemented or Unsupported Feature in UI

Draft Base
Structure: Simple
Description

This vulnerability occurs when a user interface displays a security feature as active and functional, but the underlying code that powers it is either missing or disabled. Users receive visual confirmation that a protection is in place, creating a false sense of security.

Extended Description

This flaw is a classic case of UI deception, where the front-end presentation and the back-end logic are dangerously misaligned. It often happens during rushed development cycles, feature toggling, or when a security control is deprecated but its visual elements are not removed. Developers might see buttons, checkboxes, or status messages indicating features like 'encryption enabled,' 'admin audit logging active,' or '2FA required,' but these controls do nothing when interacted with, leaving the application exposed. The primary risk is that users and administrators will rely on these phantom protections, making riskier decisions under the assumption they are safe. To prevent this, development and QA teams must implement integration tests that verify the backend security logic is triggered for every front-end control. Code reviews should specifically check for 'dead' UI components and ensure any feature flag or configuration setting that disables a security function also consistently removes or grays out its interface elements.

Common Consequences 1
Scope: Other

Impact: Varies by Context

Potential Mitigations 1
Phase: Testing
Perform functionality testing before deploying the application.
Observed Examples 4
CVE-2000-0127GUI configuration tool does not enable a security option when a checkbox is selected, although that option is honored when manually set in the configuration file.
CVE-2001-0863Router does not implement a specific keyword when it is used in an ACL, allowing filter bypass.
CVE-2001-0865Router does not implement a specific keyword when it is used in an ACL, allowing filter bypass.
CVE-2004-0979Web browser does not properly modify security setting when the user sets it.
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Implementation
Taxonomy Mapping
  • PLOVER
Notes
Research GapThis issue needs more study, as there are not many examples. It is not clear whether it is primary or resultant.