CWE-645: Overly Restrictive Account Lockout Mechanism

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product contains an account lockout protection mechanism, but the mechanism is too restrictive and can be triggered too easily, which allows attackers to deny service to legitimate users by causing their accounts to be locked out.

扩展描述

Account lockout is a security feature often present in applications as a countermeasure to the brute force attack on the password based authentication mechanism of the system. After a certain number of failed login attempts, the users' account may be disabled for a certain period of time or until it is unlocked by an administrator. Other security events may also possibly trigger account lockout. However, an attacker may use this very security feature to deny service to legitimate system users. It is therefore important to ensure that the account lockout security mechanism is not overly restrictive.

常见后果

影响范围: Availability

技术影响: DoS: Resource Consumption (Other)

说明: Users could be locked out of accounts.

潜在缓解措施

阶段: Architecture and Design

描述: Implement more intelligent password throttling mechanisms such as those which take IP address into account, in addition to the login name.

阶段: Architecture and Design

描述: Implement a lockout timeout that grows as the number of incorrect login attempts goes up, eventually resulting in a complete lockout.

阶段: Architecture and Design

描述: Consider alternatives to account lockout that would still be effective against password brute force attacks, such as presenting the user machine with a puzzle to solve (makes it do some computation).

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)
关键信息

CWE ID: CWE-645

抽象级别: Base

结构: Simple

状态: Incomplete

利用可能性: High

相关弱点
相关攻击模式
CAPEC-2