Ranking no.7 on the OWASP’s Top 10, identification and authentication failures cover insecure practices in user authentication. If you aren’t properly verifying identities, attackers can slip in using stolen or guessed credentials. But what exactly falls under this category, how do attackers abuse it, and how can you prevent it?
–
01 – What are identification and authentication failures?
In a nutshell, flaws that let attackers impersonate other users or otherwise bypass the login process, i.e. the application fails to correctly identify or authenticate users.
Common examples include accepting weak or default passwords, lacking multi–factor authentication, improper session management, or other failures that make it easy for unauthorised users to gain access.
Some of the most common weaknesses are:
Any lapse in properly verifying identity can quickly lead to unauthorised access and major breaches.
–
02 – How is it exploited?
Attackers often don’t need sophisticated tricks for this one – they simply use automated tools to try common passwords or lists of stolen credentials on sites without protections. They also exploit weak session handling; for example, if session cookies are not secured, attackers might hijack an active session.
A prime example you might remember is the 2014 “Celebgate” incident, where attackers brute-forced the passwords of celebrity Apple iCloud accounts. Apple’s system at the time lacked effective rate limiting, so the attackers were able to systematically guess passwords and gain access to private data.
More generally, credential stuffing attacks (using username/password pairs leaked from other sites) frequently succeed against systems that haven’t implemented multi–factor authentication or login attempt throttling.
–
03 – How do you prevent authentication failures?
Preventing identification and authentication failures requires strong controls throughout the login and session process:
–
It sounds obvious, but don’t leave your front door unlocked! By embedding strong authentication practices and controls, you dramatically reduce the risk of unauthorised access.
Posted 19 Mar 25
A regular digest of useful info about Secure by Design – what it is, why it matters, and tips on proactive security.
11 Mar 25
Built in the UK. Securing products worldwide.
Logical Peak Ltd. ©