Category: SFP Primary Cluster: Authentication

Incomplete
Summary

This category identifies Software Fault Patterns (SFPs) within the Authentication cluster (SFP29, SFP30, SFP31, SFP32, SFP33, SFP34).

Membership
IDNameDescription
CWE-888Software Fault Pattern (SFP) ClustersCWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).
CWE-947SFP Secondary Cluster: Authentication BypassThis category identifies Software Fault Patterns (SFPs) within the Authentication Bypass cluster.
CWE-948SFP Secondary Cluster: Digital CertificateThis category identifies Software Fault Patterns (SFPs) within the Digital Certificate cluster.
CWE-949SFP Secondary Cluster: Faulty Endpoint AuthenticationThis category identifies Software Fault Patterns (SFPs) within the Faulty Endpoint Authentication cluster (SFP29).
CWE-950SFP Secondary Cluster: Hardcoded Sensitive DataThis category identifies Software Fault Patterns (SFPs) within the Hardcoded Sensitive Data cluster (SFP33).
CWE-951SFP Secondary Cluster: Insecure Authentication PolicyThis category identifies Software Fault Patterns (SFPs) within the Insecure Authentication Policy cluster.
CWE-952SFP Secondary Cluster: Missing AuthenticationThis category identifies Software Fault Patterns (SFPs) within the Missing Authentication cluster.
CWE-953SFP Secondary Cluster: Missing Endpoint AuthenticationThis category identifies Software Fault Patterns (SFPs) within the Missing Endpoint Authentication cluster (SFP30).
CWE-954SFP Secondary Cluster: Multiple Binds to the Same PortThis category identifies Software Fault Patterns (SFPs) within the Multiple Binds to the Same Port cluster (SFP32).
CWE-955SFP Secondary Cluster: Unrestricted AuthenticationThis category identifies Software Fault Patterns (SFPs) within the Unrestricted Authentication cluster (SFP34).
Vulnerability Mapping Notes
Usage: Prohibited
Reasons: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.
Comment:
See member weaknesses of this category.