CWE-308: Use of Single-factor Authentication
low-riskThe product uses an authentication algorithm that uses a single factor (e.g., a password) in a security context that should require more than one factor.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (9)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-47652 | 8.1 | 0.7% | — |
| CVE-2025-42959 | 8.1 | 0.1% | — |
| CVE-2025-64103 | 9.8 | 0.1% | — |
| CVE-2024-50618 | 4.3 | 0.0% | — |
| CVE-2023-50934 | 5.3 | 0.0% | — |
| CVE-2023-25681 | 5.3 | 0.0% | — |
| CVE-2026-33550 | 2.0 | 0.0% | — |
| CVE-2023-49075 | 8.4 | 0.0% | — |
| CVE-2023-34228 | 5.3 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal