CWE-307: Improper Restriction of Excessive Authentication Attempts

low-risk

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism

Detection Methods

Dynamic Analysis with Automated Results Interpretation

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Web Application Scanner Web Services Scanner Database Scanners Cost effective for partial coverage: Host-based Vulnerability Scanners - Examine configuration for flaws, verifying that audit mechanisms work, ensure host configuration meets certain predefined criteria

Dynamic Analysis with Manual Results Interpretation

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Fuzz Tester Framework-based Fuzzer Cost effective for partial coverage: Forced Path Execution

Manual Static Analysis - Source Code

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Focused Manual Spotcheck - Focused manual analysis of source Manual Source Code Review (not inspections)

Automated Static Analysis - Source Code

According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer

Automated Static Analysis

According to SOAR [REF-1479], the following detection techniques may be useful: Cost effective for partial coverage: Configuration Checker

Architecture or Design Review

According to SOAR [REF-1479], the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.)

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2020-15906 9.8 84.7%
CVE-2019-17240 9.8 82.6%
CVE-2023-22960 7.5 61.3%
CVE-2020-35590 9.8 42.9%
CVE-2024-39225 9.8 32.5%
CVE-2024-39225 9.8 32.5%
CVE-2001-1339 9.8 24.3%
CVE-2022-29056 3.7 24.2%
CVE-2022-29056 3.7 24.2%
CVE-2021-36750 8.1 19.7%
3
/ 100
low-risk
Active Threat 3/50 · Minimal
Exploit Availability 0/50 · Minimal