CWE-303

Incorrect Implementation of Authentication Algorithm

Weakness Description

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.

This incorrect implementation may allow authentication to be bypassed.

Common Consequences

Access Control
Bypass Protection Mechanism
Advertisement

Related Weaknesses