CWE-1390

Weak Authentication
AI Translation Available

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Status
incomplete
Abstraction
class
ICS/OT Not Technology-Specific

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

Common Consequences

integrity confidentiality availability access control
Impacts
read application data gain privileges or assume identity execute unauthorized code or commands

Potential Mitigations