CWE-308

Use of Single-factor Authentication
AI Translation Available

The product uses an authentication algorithm that uses a single factor (e.g., a password) in a security context that should require more than one factor.

Status
draft
Abstraction
base
Likelihood
high

Common Consequences

access control
Impacts
bypass protection mechanism

Potential Mitigations

Phases:
architecture and design
Descriptions:
• Use multiple independent authentication schemes, which ensures that -- if one of the methods is compromised -- the system itself is still likely safe from compromise. For this reason, if multiple schemes are possible, they should be implemented and required -- especially if they are easy to use.