Identification and
Authentication Failures
Previously known as Broken Authentication, this category is now
#7 in the OWASP Top 10 2021 list. It includes weaknesses in how
systems verify user identity and manage sessions.
Key Statistics
CWEs Mapped 22
Max Incidence Rate 14.84%
Total Occurrences 132,195
Total CVEs 3,897
What Are Authentication
Failures?
1 Identity Verification 2 Authentication
Process
Weaknesses in how
systems confirm who Flaws in the methods
users claim to be. used to validate
credentials.
3 Session Management
Problems with how user sessions are created and maintained.
Common Weakness
Enumerations
CWE-297 CWE-287
Improper Validation of Improper Authentication
Certificate with Host
Mismatch
CWE-384
Session Fixation
Automated Attack
Vulnerabilities
Credential Stuffing
Applications vulnerable to attacks using lists of valid
usernames and passwords.
Brute Force
Systems that don't limit repeated login attempts.
Default Credentials
Applications allowing weak passwords like
"Password1" or "admin/admin".
Password Storage Vulnerabilities
Weak Encryption
2 Using easily breakable encryption
methods.
Plain Text
1
Storing passwords without any
encryption.
Poor Hashing
Implementing weak hashing
3 algorithms without salting.
Session Management Flaws
URL Exposure 1
Session identifiers visible in the URL.
2 Session Reuse
Reusing identifiers after successful login.
Invalid Session Handling 3
Not properly invalidating sessions during logout or
inactivity.
Recovery Process
Weaknesses
Knowledge- Weak Recovery SMS
Based Answers Emails Vulnerabilities
Using insecure Poorly implemented Using SMS for
security questions password reset recovery which can
that can be processes. be intercepted.
researched or
guessed.
Multi-Factor Authentication Issues
Missing MFA
1 No second factor required
Weak Implementation
2 Poorly designed MFA
Bypass Vulnerabilities
3 MFA that can be circumvented
Prevention: Multi-Factor Authentication
Biometrics Hardware Tokens Software Tokens
Implement fingerprint or facial Use physical security keys for Implement app-based
recognition as a second factor. enhanced protection. authentication codes.
Prevention: Password Policies
NIST Guidelines
1 Follow NIST 800-63b standards
Password Checks
2 Test against common passwords
Length Over Complexity
3 Prefer longer passphrases
Prevention: Default
Credentials
0 100%
Default Accounts Custom Setup
Never ship with default Require all credentials to be set
credentials, especially for admin during installation.
users.
1st
Priority
Make this a top security
requirement for all deployments.
Prevention: Account Enumeration
Harden registration, credential recovery, and API pathways. Use identical messages for all outcomes to prevent
revealing valid accounts.
Prevention: Brute Force Protection
Login Attempt Delay (seconds)
Implement increasing delays for failed login attempts. Log all failures and alert administrators when attacks are detected.
Prevention: Session
Management
Secure Generation
Use server-side, built-in session managers with high entropy.
Secure Storage
Store session IDs securely, never in URLs.
Proper Invalidation
Invalidate sessions after logout, idle timeout, and
absolute timeout.
Attack Scenario: Credential Stuffing
The Attack The Vulnerability The Impact
Attackers use lists of known No automated threat detection. No Attackers can validate credentials
passwords from data breaches. credential stuffing protection. No for use on other sites. They can
Applications without protection rate limiting on login attempts. gain unauthorized access to
become password oracles. accounts.
Attack Scenario: Password Reuse
User Behavior
2 Users reuse passwords across
multiple sites when forced to
Outdated Practices change frequently.
Password rotation and complexity
requirements encourage weak
1
passwords. Better Approach
NIST 800-63 recommends
3 stopping these practices and
using MFA instead.
Attack Scenario: Session Timeout
Step 1 Step 2 Step 3
User accesses application on public Attacker uses same browser later Attacker now has full access to the
computer but closes browser and finds user still authenticated. user's account and data.
without logging out.
Key OWASP Resources
Proactive Controls Verification Standard
Implement Digital Identity guidelines for secure Follow V2 Authentication and V3 Session Management
authentication. standards.
Testing Guide Cheat Sheets
Use Identity and Authentication testing methodologies. Reference Authentication, Credential Stuffing, Forgot
Password, and Session Management cheat sheets.
NIST Password Guidelines
NIST 800-63b Section 5.1.1 for Memorized Secrets provides evidence-based password policies. It recommends
longer passphrases over complex rotation requirements.