CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,307)
This CVE describes an improper certificate validation vulnerability in UniFi Connect products that allows attackers on the same network to potentially...
May 7, 2024This vulnerability allows unauthenticated attackers to bypass authentication on affected Mitel SIP phones and conference units. Attackers could modify...
May 2, 2024This vulnerability in silex technology DS-600 firmware allows remote attackers to retrieve sensitive information via an unauthenticated GET EEP_DATA c...
Apr 15, 2024This CVE describes a permission control vulnerability in the window module of Huawei/HarmonyOS systems. Successful exploitation could allow unauthoriz...
Apr 8, 2024This vulnerability allows remote attackers to access all order confirmations from the TradePro v9.5 online shop due to incorrect access control in the...
Apr 4, 2024Alldata V0.4.6 has insecure permissions that allow low-privileged users (including test accounts) to query information about all users in the system. ...
Apr 2, 2024This directory listing vulnerability in Customer Support System v1 allows unauthenticated attackers to enumerate directories and access sensitive file...
Mar 1, 2024This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via T3 or IIOP protocols to access sensitive data. I...
Feb 17, 2024This vulnerability in Oracle Java SE and GraalVM allows unauthenticated attackers with network access to modify critical data in Java deployments that...
Jan 16, 2024This vulnerability allows unauthenticated attackers to modify SMB settings on QStar Archive Solutions servers without authentication. It affects QStar...
Jan 13, 2024This vulnerability allows unauthenticated attackers to access system backups and sensitive information from QStar Archive Solutions servers. It affect...
Jan 13, 2024This vulnerability in WALLIX Bastion and Access Manager involves incorrect access control that could allow unauthorized users to access sensitive data...
Jan 8, 2024Relyum RELY-PCIe 22.2.1 devices have a system group misconfiguration that allows unauthorized read access to the operating system's central password h...
Dec 13, 2023This vulnerability allows unauthenticated attackers to bypass security controls and access ColdFusion administration endpoints (CFM/CFC files). Adobe ...
Nov 17, 2023This vulnerability in Intel Connectivity Performance Suite's user mode driver allows unauthenticated attackers to potentially access sensitive informa...
Nov 14, 2023CVE-2023-46759 is a permission control vulnerability in Huawei's call module that allows unauthorized access to sensitive information. Successful expl...
Nov 8, 2023CVE-2023-46664 is an improper access control vulnerability in Sielco PolyEco1000 that allows attackers to bypass authorization by manipulating user-su...
Oct 26, 2023Sielco PolyEco1000 devices have an information disclosure vulnerability where unauthenticated remote attackers can access sensitive information via sp...
Oct 26, 2023CVE-2023-38848 is an information disclosure vulnerability in rmc R Beauty CLINIC Line software that allows remote attackers to access sensitive inform...
Oct 25, 2023This vulnerability allows attackers with permission to manage PAM propagation scripts in Devolutions Server to retrieve stored passwords via a GET req...
Oct 13, 2023NVIDIA Cumulus Linux has a VxLAN forwarding vulnerability where specially crafted IPv6 packets may be incorrectly forwarded, potentially exposing netw...
Sep 20, 2023CVE-2023-40850 is an incorrect access control vulnerability in Netentsec NS-ASG 6.3 that allows attackers to leak sensitive files from the application...
Sep 13, 2023An incorrect access control vulnerability in PowerJob versions 4.3.2 and earlier allows remote attackers to obtain sensitive information by querying t...
Aug 17, 2023This vulnerability in pnpm allows attackers to create specially crafted tarballs that appear safe when inspected on npm registry or installed via npm,...
Aug 1, 2023This vulnerability allows attackers to bypass security controls in Adobe ColdFusion and access administration endpoints without authentication. It aff...
Jul 12, 2023This vulnerability allows unprivileged remote attackers to download files from SICK FTMg AIR FLOW SENSOR devices via the REST interface using low-priv...
May 15, 2023This vulnerability allows attackers to bypass security features in Azure Service Connector, potentially gaining unauthorized access to connected resou...
Apr 11, 2023This vulnerability allows authenticated attackers on the FortiSOAR administrative interface to perform unauthorized actions via crafted HTTP requests....
Mar 7, 2023This vulnerability allows remote attackers to bypass access controls and download arbitrary files from the directory where SS1 or Rakuraku PC Cloud Ag...
Mar 6, 2023This vulnerability in Zulip allows deactivated users to access messages when Single Sign-On (SSO) is enabled. It affects Zulip servers running version...
Jul 28, 2022This vulnerability in Mendix applications allows attackers with access to an active user session to change that user's password without proper validat...
Jul 12, 2022CVE-2022-31055 is a security misconfiguration vulnerability in kCTF (Kubernetes CTF infrastructure) where the 'kctf cluster set-src-ip-ranges' command...
Jun 13, 2022CVE-2021-26627 allows remote attackers to access live video feeds without authentication by sending RTSP requests to vulnerable devices. This affects ...
Apr 19, 2022This vulnerability in Arista EOS platforms allows VXLAN match rules in IPv4 access-lists to ignore specified IP protocols when applied to L2/L3 port i...
Apr 14, 2022CVE-2020-13677 is an access control vulnerability in Drupal's JSON:API module that allows attackers to bypass intended content restrictions. This affe...
Feb 11, 2022This vulnerability allows unauthenticated attackers to access privileged logfiles and diagnostic data on Siemens CP-8000 and CP-8021/8022 master modul...
Jan 11, 2022CVE-2021-26338 is an improper access control vulnerability in AMD's System Management Unit (SMU) that allows attackers to override performance control...
Nov 16, 2021This vulnerability in the WP DSGVO Tools (GDPR) WordPress plugin allows unauthenticated attackers to delete any post or page on affected websites. Att...
Nov 5, 2021An improper access control vulnerability in the FirmwareUpgrade component of QSAN Storage Manager allows remote attackers to reboot and disrupt storag...
Jul 7, 2021This vulnerability allows unauthenticated attackers to trigger a denial-of-service condition in Adobe Experience Manager (AEM) by exploiting improper ...
Jun 28, 2021CVE-2021-26118 is an access control bypass vulnerability in Apache ActiveMQ Artemis where advisory message creation in the OpenWire protocol bypasses ...
Jan 27, 2021pgAdmin 9.11 in server mode has a restore restriction bypass vulnerability that allows authenticated attackers to execute arbitrary commands on the ho...
Feb 5, 2026This vulnerability in Java Secure Socket Extension (JSSE) allows attackers to manipulate or access critical data in Java applications. It affects mult...
Apr 15, 2025A permissions vulnerability in macOS allows applications to bypass access controls and access protected user data. This affects macOS Ventura, Sequoia...
Mar 31, 2025A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...
Mar 31, 2025CVE-2024-53348 is an incorrect access control vulnerability in LoxiLB load balancer software that allows attackers to bypass authentication mechanisms...
Mar 21, 2025This vulnerability in Mattermost allows a malicious remote user in a shared channel to overwrite an existing local user's account. This affects Matter...
Aug 1, 2024This vulnerability involves incorrect access control in Artery AT32F415CBT7 and AT32F421C8T7 microcontroller devices, allowing unauthorized access to ...
Jun 25, 2024This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows attackers to read arbitrary files from the file system wit...
Mar 18, 2024This vulnerability in Spring Security allows broken access control when applications directly use AuthenticationTrustResolver.isFullyAuthenticated() w...
Feb 20, 2024About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,307 CVEs classified as CWE-284, with 216 rated critical and 555 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free