CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,303
Total CVEs
214
Critical
553
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
123
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,303)

CVE-2024-26022
7.8

This vulnerability allows authenticated users with local access to Intel NUC devices to bypass UEFI security controls and escalate privileges. It affe...

Aug 14, 2024
CVE-2024-38163
7.8

This vulnerability in the Windows Update Stack allows an authenticated attacker to execute arbitrary code with SYSTEM privileges. It affects Windows s...

Aug 14, 2024
CVE-2024-38195
7.8

CVE-2024-38195 is a remote code execution vulnerability in Azure CycleCloud that allows authenticated attackers to execute arbitrary code on affected ...

Aug 13, 2024
CVE-2024-38162
7.8

This vulnerability allows an authenticated attacker with local access to elevate privileges on Azure Arc-enabled servers. It affects systems running t...

Aug 13, 2024
CVE-2024-41308
7.8

This vulnerability in Enjay CRM OS v1.0 allows attackers to escape the restricted terminal environment and gain root-level privileges on the underlyin...

Aug 7, 2024
CVE-2024-40812
7.8

This vulnerability allows shortcuts on Apple devices to bypass internet permission requirements, potentially enabling unauthorized network access. It ...

Jul 29, 2024
CVE-2024-38100
7.8

This vulnerability allows an attacker to gain elevated privileges on Windows systems through Windows File Explorer. It affects Windows 10, 11, and Ser...

Jul 9, 2024
CVE-2024-39934
7.8

Robotmk versions before 2.0.1 contain a privilege escalation vulnerability where local users can gain SYSTEM privileges when automated Python environm...

Jul 4, 2024
CVE-2024-37289
7.8

This vulnerability in Trend Micro Apex One allows a local attacker with low-privileged access to escalate privileges on affected systems. Attackers co...

Jun 10, 2024
CVE-2023-52711
7.8

This vulnerability in AMD PSP P2C Mailbox V2 SMI handler allows attackers to bypass SPI flash protection and leak/corrupt SMM memory. It affects syste...

May 28, 2024
CVE-2023-43748
7.8

This vulnerability in Intel GPA Framework software installers allows authenticated local users to escalate privileges due to improper access control. ...

May 16, 2024
CVE-2024-33673
7.8

This vulnerability allows attackers to execute arbitrary code through DLL hijacking in Veritas Backup Exec. Attackers can place malicious DLLs in loca...

Apr 26, 2024
CVE-2024-21103
7.8

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to a Linux host to completely compromise the VirtualBox ...

Apr 16, 2024
CVE-2024-21805
7.8

This vulnerability allows authenticated Windows users on affected SKYSEA Client View systems to place arbitrary files in a specific folder. If a malic...

Mar 12, 2024
CVE-2023-35121
7.8

This vulnerability in Intel oneAPI DPC++/C++ Compiler allows authenticated users with local access to potentially escalate privileges. It affects user...

Feb 14, 2024
CVE-2023-44283
7.8

This vulnerability in Dell SupportAssist allows locally authenticated users to escalate privileges and execute arbitrary code with Windows system-leve...

Feb 14, 2024
CVE-2023-7025
7.8

This critical vulnerability in KylinSoft hedron-domain-hook allows local attackers to bypass access controls via the DBus Handler's init_kcm function....

Dec 21, 2023
CVE-2023-28397
7.8

This vulnerability allows authenticated attackers with local access to potentially escalate privileges in systems using affected Intel Aptio V UEFI Fi...

Nov 14, 2023
CVE-2023-31019
7.8

This vulnerability in NVIDIA GPU Display Driver for Windows allows attackers to impersonate clients through named pipe access issues in wksServicePlug...

Nov 2, 2023
CVE-2023-36790
7.8

This vulnerability in Windows Remote Desktop Protocol (RDP) Encoder Mirror Driver allows authenticated attackers to execute arbitrary code with SYSTEM...

Oct 10, 2023
CVE-2023-36725
7.8

This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploiting improper access cont...

Oct 10, 2023
CVE-2023-32477
7.8

This vulnerability in Dell Common Event Enabler allows local low-privileged users to bypass access controls and gain elevated privileges on affected W...

Sep 29, 2023
CVE-2023-20224
7.8

This vulnerability allows authenticated local attackers on Cisco ThousandEyes Enterprise Agent virtual appliances to escalate privileges to root by ex...

Aug 16, 2023
CVE-2023-24905
7.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable Remote Desktop Client software. Attackers can explo...

May 9, 2023
CVE-2023-25496
7.8

A local privilege escalation vulnerability in Lenovo Driver Manager allows authenticated local users to execute arbitrary code with SYSTEM/administrat...

Apr 28, 2023
CVE-2023-20065
7.8

This vulnerability allows an authenticated local attacker to escape the Cisco IOx application container and execute arbitrary commands with root privi...

Mar 23, 2023
CVE-2023-1489
7.8

This vulnerability in Wise System Monitor allows local attackers to bypass access controls through improper handling of IoControlCode in the WiseHDInf...

Mar 18, 2023
CVE-2023-24485
7.8

CVE-2023-24485 allows a standard Windows user to escalate privileges to SYSTEM level on computers running Citrix Workspace app. This vulnerability aff...

Feb 16, 2023
CVE-2022-20732
7.8

This vulnerability allows authenticated local attackers on Cisco Virtualized Infrastructure Manager (VIM) to access improperly protected configuration...

Apr 21, 2022
CVE-2021-42855
7.8

CVE-2021-42855 is a local privilege escalation vulnerability in SteelCentral AppInternals Dynamic Sampling Agent (DSA) where an attacker with local ac...

Mar 10, 2022
CVE-2022-21825
7.8

This vulnerability allows local attackers to escalate privileges on Linux systems running Citrix Workspace App with App Protection enabled. An attacke...

Feb 9, 2022
CVE-2021-34401
7.8

This vulnerability in NVIDIA's Linux kernel driver allows improper access control in the nvmap NVGPU_IOCTL_CHANNEL_SET_ERROR_NOTIFIER interface. Attac...

Jan 18, 2022
CVE-2021-1419
7.8

This vulnerability in Cisco Access Points allows authenticated local users to modify files and potentially gain root privileges through improper file ...

Sep 23, 2021
CVE-2021-25440
7.8

This vulnerability in Samsung's FactoryCameraFB app allows untrusted applications to access arbitrary files with elevated privileges due to improper a...

Jul 8, 2021
CVE-2021-25438
7.8

This vulnerability allows untrusted applications to perform local file inclusion attacks in Samsung Members app's webview component. Attackers could a...

Jul 8, 2021
CVE-2021-25412
7.8

This vulnerability allows local attackers to bypass access controls in Samsung's genericssoservice, enabling them to execute protected activities with...

Jun 11, 2021
CVE-2020-10145
7.8

This vulnerability in Adobe ColdFusion installer allows unprivileged users to create files in the default installation directory due to insecure ACL s...

May 27, 2021
CVE-2020-9668
7.8

This vulnerability in Adobe Genuine Service allows attackers to exploit improper access control when handling symbolic links, enabling privilege escal...

Apr 16, 2021
CVE-2020-25238
7.8

This vulnerability allows a local attacker with valid account credentials and limited access rights to manipulate specific files in certain folders, p...

Feb 9, 2021
CVE-2020-10143
7.8

This vulnerability allows unprivileged Windows users to achieve arbitrary code execution with SYSTEM privileges by creating a specially-crafted openss...

Dec 9, 2020
CVE-2026-2592
7.7

This vulnerability allows unauthenticated attackers to mark WooCommerce orders as paid without actual payment by reusing valid payment tokens from oth...

Feb 17, 2026
CVE-2025-5962
7.7

A local privilege escalation vulnerability in Lightspeed history service allows unprivileged users on the same system to access and manipulate other u...

Sep 22, 2025
CVE-2025-4962
7.7

An Insecure Direct Object Reference (IDOR) vulnerability in Lunary API versions up to 0.8.8 allows authenticated users to create templates in other us...

Aug 18, 2025
CVE-2022-26389
7.7

An improper access control vulnerability in Hillrom ELI Resting Electrocardiograph devices allows attackers to escalate privileges on affected medical...

Feb 7, 2025
CVE-2025-23083
7.7

This vulnerability in Node.js allows attackers to hook into worker thread creation events via the diagnostics_channel utility, enabling them to access...

Jan 22, 2025
CVE-2024-45392
7.7

SuiteCRM versions before 7.14.5 and 8.6.2 have an insufficient access control vulnerability in the API that allows authenticated attackers to delete r...

Sep 5, 2024
CVE-2023-52367
7.7

This CVE describes an improper access control vulnerability in Huawei's media library module that allows unauthorized access to restricted functionali...

Feb 18, 2024
CVE-2024-24771
7.7

Open Forms versions before 2.2.9/2.3.7/2.4.5/2.5.2 contain a multi-factor authentication weakness where superuser credentials could potentially bypass...

Feb 7, 2024
CVE-2023-39962
7.7

This vulnerability in Nextcloud Server allows a malicious authenticated user to delete any personal or global external storage configuration, making t...

Aug 10, 2023
CVE-2023-31199
7.7

This vulnerability allows a privileged user on a local system to escalate their privileges through improper access control in Intel SSD Toolbox. It af...

May 12, 2023

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,303 CVEs classified as CWE-284, with 214 rated critical and 553 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free