Description
A product requires authentication, but the product has an alternate path or channel that does not require authentication.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
CWE-287
CWE-284
CWE-420
CWE-425
Consequences
Access Control: Bypass Protection Mechanism
Potential Mitigations
Phase: Architecture and Design
Description:
Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource.
CVE References
- CVE-2000-1179
- Router allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters.
- CVE-1999-1454
- Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key.
- CVE-1999-1077
- OS allows local attackers to bypass the password protection of idled sessions via the programmer’s switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock.
- CVE-2003-0304
- Direct request of installation file allows attacker to create administrator accounts.
- CVE-2002-0870
- Attackers may gain additional privileges by directly requesting the web management URL.
- CVE-2002-0066
- Bypass authentication via direct request to named pipe.
- CVE-2003-1035
- User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing.
More Stories
The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them
Apache Tomcat is an open-source web server and servlet container that is widely used in enterprise environments to run Java...
ZDI-CAN-18333: A Critical Zero-Day Vulnerability in Microsoft Windows
Zero-day vulnerabilities are a serious threat to cybersecurity, as they can be exploited by malicious actors to gain unauthorized access...
CWE-669 – Incorrect Resource Transfer Between Spheres
Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere,...
CWE-67 – Improper Handling of Windows Device Names
Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a...
CWE-670 – Always-Incorrect Control Flow Implementation
Description The code contains a control flow path that does not reflect the algorithm that the path is intended to...
CWE-671 – Lack of Administrator Control over Security
Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect...