CWE-269: Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Yearly Trend
Top Affected Vendors
All Improper Privilege Management CVEs (803)
This vulnerability in Android's Settings app allows a malicious app to disable other users' apps on multi-user devices through a confused deputy attac...
Sep 11, 2024This vulnerability in Android's Uri.java allows attackers to craft malformed Uri objects due to improper input validation, potentially leading to loca...
Sep 11, 2024This CVE describes a local privilege escalation vulnerability in macOS that allows an attacker with existing local access to elevate their privileges ...
Jul 29, 2024This CVE describes a local privilege escalation vulnerability in macOS that allows an attacker with existing local access to gain elevated privileges....
Jul 29, 2024This is a privilege escalation vulnerability in Apple operating systems where an application can execute arbitrary code with kernel privileges due to ...
Jul 29, 2024This vulnerability allows unprivileged users to execute privileged operations through D-Bus methods in Deepin's dde-file-manager. It affects Deepin Li...
Jul 26, 2024CVE-2024-6677 is a privilege escalation vulnerability in uberAgent that allows authenticated users to gain elevated privileges on affected systems. Th...
Jul 12, 2024This vulnerability allows a low-privileged local user on Windows systems running Citrix Virtual Delivery Agent to escalate privileges to SYSTEM level....
Jul 10, 2024CVE-2024-6286 is a local privilege escalation vulnerability in Citrix Workspace app for Windows that allows authenticated low-privileged users to gain...
Jul 10, 2024This vulnerability allows local privilege escalation in Android's kernel due to a logic error in device memory management. An attacker could execute a...
Jul 9, 2024This vulnerability allows a malicious Android app to hide from device Settings while retaining Accessibility Service permissions, enabling local privi...
Jul 9, 2024CVE-2024-23711 is a kernel-level vulnerability in Android's device memory management that allows local privilege escalation without user interaction. ...
Jul 9, 2024This CVE describes a confused deputy vulnerability in Android that allows local privilege escalation without user interaction. Attackers can bypass pe...
Jul 9, 2024This vulnerability in Jungo WinDriver allows local attackers to escalate privileges and execute arbitrary code due to improper privilege management. I...
Jul 2, 2024This vulnerability in Jungo WinDriver allows local attackers to escalate privileges, execute arbitrary code, or cause denial of service due to imprope...
Jul 2, 2024This vulnerability in Jungo WinDriver allows local attackers to escalate privileges and execute arbitrary code due to improper privilege management. I...
Jul 2, 2024This vulnerability in Jamf Compliance Editor's XPC service allows local attackers to escalate privileges on macOS systems. Attackers can gain root acc...
Jun 27, 2024This CVE describes a privilege escalation vulnerability in Huawei's AMS module that allows attackers to gain elevated privileges on affected systems. ...
Jun 14, 2024This vulnerability in SiSoftware SANDRA's kernel driver allows local attackers to escalate privileges by sending a crafted buffer via DeviceIoControl....
Jun 10, 2024This vulnerability in TeraByte Unlimited Image for Windows allows a local attacker to escalate privileges through the TBOFLHelper64.sys and TBOFLHelpe...
May 21, 2024A local privilege escalation vulnerability in Panoramic Corporation Digital Imaging Software allows attackers with local access to elevate privileges ...
May 14, 2024This vulnerability in Android's NotificationManagerService allows local privilege escalation without user interaction due to improper input validation...
May 7, 2024This vulnerability in Android's UserManagerService allows local attackers to bypass user restrictions through improper input validation, potentially e...
May 7, 2024This Android vulnerability allows a malicious app to execute arbitrary code with privileged app permissions due to a logic error in package installati...
May 7, 2024This vulnerability allows attackers to disable the anti-tampering protection in Zscaler Client Connector when an uninstall password is configured. Thi...
May 1, 2024This vulnerability allows unprivileged attackers to escalate privileges by restoring a crafted DLL file into the SUPERAntiSpyware installation directo...
Apr 29, 2024This vulnerability in Oracle Solaris 11 allows a low-privileged local attacker to potentially compromise the entire system, leading to complete takeov...
Apr 16, 2024CVE-2024-29052 is a Windows Storage Elevation of Privilege Vulnerability that allows authenticated attackers to gain SYSTEM-level privileges on affect...
Apr 9, 2024This vulnerability allows an authenticated attacker to exploit the Microsoft Brokering File System to gain SYSTEM-level privileges on Windows systems....
Apr 9, 2024This vulnerability in the Atos Eviden CardOS API Windows installer allows local privilege escalation from a regular user account to SYSTEM-level acces...
Mar 22, 2024This vulnerability allows local privilege escalation on affected Android devices due to uninitialized data in the ppcfw_init_secpolicy function. Attac...
Mar 11, 2024This vulnerability in Android's strncpy function allows local privilege escalation without user interaction. Attackers can exploit a missing bounds ch...
Mar 11, 2024CVE-2024-22008 is an out-of-bounds write vulnerability in the config_gov_time_windows function of tmu.c in Android's kernel. This allows local attacke...
Mar 11, 2024This vulnerability allows local privilege escalation on Android devices by bypassing carrier restrictions during package installation. Attackers can e...
Mar 11, 2024This CVE describes a privilege escalation vulnerability in macOS where a malicious application could exploit a logic issue to gain elevated system pri...
Mar 8, 2024A privilege escalation vulnerability in Thales SafeNet Sentinel HASP LDK installer on Windows allows local attackers to gain elevated system privilege...
Feb 27, 2024A local privilege escalation vulnerability in Thales SafeNet Authentication Client for Windows allows attackers with local access to elevate their pri...
Feb 27, 2024This vulnerability allows malicious apps to launch activities from the background without user interaction, bypassing Android's background activity la...
Feb 15, 2024This CVE describes a local privilege escalation vulnerability in ESET Windows products where an attacker could misuse file operations to delete files ...
Feb 15, 2024This CVE describes a local privilege escalation vulnerability in VMware Aria Operations for Networks. Console users with existing access can exploit t...
Feb 6, 2024A privilege elevation vulnerability in Telerik Test Studio installer allows lower-privileged users to manipulate installation packages and gain elevat...
Jan 31, 2024This CVE describes a privilege escalation vulnerability in Telerik JustDecompile's installer component. Attackers with local access can manipulate ins...
Jan 31, 2024A local privilege escalation vulnerability in Trend Micro Apex One's plug-in manager allows attackers with initial low-privileged access to elevate th...
Jan 23, 2024This vulnerability in Sandbox Accounts for Events allows authenticated users to access sensitive event data by sending crafted requests to the events ...
Dec 22, 2023This vulnerability in BeyondTrust Privilege Management for Windows allows attackers to steal security tokens when the 'Add Admin' token is configured ...
Dec 12, 2023This vulnerability allows local attackers to bypass System Management Mode (SMM) protections on affected AMD processors, potentially enabling privileg...
Nov 14, 2023A local privilege escalation vulnerability in Telit Cinterion cellular modules allows low-privileged attackers to gain manufacturer-level privileges. ...
Nov 10, 2023This vulnerability in MacVim allows privilege escalation to root via insecure interprocess communication (IPC) using Apple's Distributed Objects. Any ...
Nov 7, 2023This vulnerability allows attackers to bypass factory reset protection on Android devices, potentially gaining unauthorized access to devices that sho...
Oct 30, 2023This vulnerability in Android's Activity Manager allows malicious apps to launch background activities without user interaction due to a logic error. ...
Oct 30, 2023About Improper Privilege Management (CWE-269)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Our database tracks 803 CVEs classified as CWE-269, with 167 rated critical and 546 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.
External reference: View CWE-269 on MITRE CWE →
Monitor Improper Privilege Management Vulnerabilities
Get alerted when new Improper Privilege Management CVEs affect your infrastructure.
Start Monitoring Free