Not Failing Securely ('Failing Open')

Draft Class
Structure: Simple
Description

This vulnerability occurs when a system, upon encountering an error or failure, defaults to its least secure configuration instead of a safer alternative. Examples include reverting to the weakest encryption or the most permissive access rules.

Extended Description

Failing open creates a dangerous gap where the system operates with known, weaker security controls. This directly introduces the vulnerabilities associated with that permissive state, making it significantly easier for an attacker to exploit the system. Often, this design choice is made to prioritize uptime and reduce support overhead, mistakenly valuing continuous functionality over security. This approach fundamentally undermines security posture and provides administrators with a false sense of protection. The secure alternative is to "fail closed" or "fail safe," where the system denies access or stops operations until the issue can be safely resolved, ensuring security is never automatically compromised for convenience.

Common Consequences 1
Scope: Access Control

Impact: Bypass Protection Mechanism

Intended access restrictions can be bypassed, which is often contradictory to what the product's administrator expects.

Potential Mitigations 1
Phase: Architecture and Design
Subdivide and allocate resources and components so that a failure in one part does not affect the entire product.
Demonstrative Examples 1

ID : DX-164

Switches may revert their functionality to that of hubs when the table used to map ARP information to the switch interface overflows, such as when under a spoofing attack. This results in traffic being broadcast to an eavesdropper, instead of being sent only on the relevant switch interface. To mitigate this type of problem, the developer could limit the number of ARP entries that can be recorded for a given switch interface, while other interfaces may keep functioning normally. Configuration options can be provided on the appropriate actions to be taken in case of a detected failure, but safe defaults should be used.
Observed Examples 2
CVE-2007-5277The failure of connection attempts in a web browser resets DNS pin restrictions. An attacker can then bypass the same origin policy by rebinding a domain name to a different IP address. This was an attempt to "fail functional."
CVE-2006-4407Incorrect prioritization leads to the selection of a weaker cipher. Although it is not known whether this issue occurred in implementation or design, it is feasible that a poorly designed algorithm could be a factor.
References 2
The Protection of Information in Computer Systems
Jerome H. Saltzer and Michael D. Schroeder
Proceedings of the IEEE 63
09-1975
ID: REF-196
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Not Technology-Specific : UndeterminedICS/OT : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Alternate Terms

Failing Open

Taxonomy Mapping
  • OWASP Top Ten 2004
Notes
Research GapSince design issues are hard to fix, they are rarely publicly reported, so there are few CVE examples of this problem as of January 2008. Most publicly reported issues occur as the result of an implementation error instead of design, such as CVE-2005-3177 (Improper handling of large numbers of resources) or CVE-2005-2969 (inadvertently disabling a verification step, leading to selection of a weaker protocol).