CWE-303

Incorrect Implementation of Authentication Algorithm
AI Translation Available

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.

Status
draft
Abstraction
base

This incorrect implementation may allow authentication to be bypassed.

Common Consequences

access control
Impacts
bypass protection mechanism

Potential Mitigations