CWE-304: Missing Critical Step in Authentication

BaseDraft

The product implements an authentication technique, but it skips a step that weakens the technique.

View on MITRE
Back to CWE Lookup

Extended Description

Authentication techniques should follow the algorithms that define them exactly, otherwise authentication can be bypassed or more easily subjected to brute force attacks.

Technical Details

Structure
Simple

Applicable To

Languages
Not Language-Specific
Platforms

Learn More