CWE-287

Authentication bypass vulnerabilities discovered at runtime — default credentials, missing auth checks, or broken session management in running services....

Verified by Precogs Threat Research
BASE SCORE
7.5 CRITICAL

Precogs AI Insight

"Precogs AI Binary DAST probes running services for authentication weaknesses including default credentials, replay attacks, and session fixation."

EXPLOIT PROBABILITYHigh
PUBLIC POCAvailable

What is CWE-287 (Improper Authentication)?

Authentication bypass vulnerabilities discovered at runtime — default credentials, missing auth checks, or broken session management in running services.

Vulnerability Insights

In the context of binary ai-powered dast vulnerabilities, this vulnerability poses significant risk because compiled binaries and complex AI logic cannot be easily patched without vendor cooperation. Organizations relying on third-party software must use structural analysis tools to detect these flaws.

Impact on Systems

  • Privilege Escalation: Gaining administrative access as a standard user
  • Account Takeover: Accessing targeted victim accounts
  • Unauthorized Operations: Performing high-risk transactions

Real-World Attack Scenario

An attacker intercepts an HTTP request setting a cookie or parameter like role=user and alters it to role=admin. The application trusts the client-side claim without validating it against a secure backend session. As a result, the application grants the attacker full administrative privileges to the system.

Code Examples

Vulnerable Implementation

// VULNERABLE: Relies strictly on a client-provided boolean
boolean isAdmin = Boolean.parseBoolean(request.getParameter("isAdmin"));
if (isAdmin) {
    showAdminDashboard();
}

Secure Alternative

// SECURE: Verifies identity against trusted backend session state
User user = session.getAttribute("currentUser");
if (user != null && securityService.hasRole(user, "ADMIN")) {
    showAdminDashboard();
}

Remediation

Ensure robust input validation, boundary checking, and adherence to secure architecture frameworks when designing Binary DAST solutions. Use automated code scanning or binary analysis to detect flaws early in the SDLC.