Proper authentication responses
Summary​
System responses to authentication failures must not indicate which part of the authentication was incorrect.
Description​
Authentication forms are one of the most publicly accessible parts of an application, which makes them more susceptible to be attacked. Most authentication mechanisms require only a username and a password. If the responses to authentication attempts indicate which authentication parameter was incorrect, attackers may be able to obtain a list of valid usernames (user enumeration) that they can use in brute force attacks.
Supported In​
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References​
- CWEâ„¢-203. Observable discrepancy
- NIST Framework-PR_AC-7. Users, devices and other assets are authenticated (e.g., single-factor, multifactor) commensurate with the risk of the transaction
- NIST Framework-RS_RP-1. Response plan is executed during or after an incident
- PDPO-S1_5. Information to be generally available
- CMMC-AC_L2-3_1_8. Unsuccessful logon attempts
- CMMC-AC_L2-3_1_9. Privacy & security notices
- CMMC-AU_L2-3_3_4. Audit failure alerting
- ISA/IEC 62443-IAC-1_12. System use notification
- WASSEC-6_2_1_1. Authentication - Brute force
- ISSAF-T_19_2. Web application assessment - Global Countermeasures (server-side)
- ISSAF-V_12. Application security - Source code auditing (error handling)
- NIST 800-171-1_9. Provide privacy and security notices
- NIST 800-171-5_11. Obscure feedback of authentication information
Vulnerabilities​
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.