CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,310)
This vulnerability in SigningHub v8.6.8 allows attackers to bypass access controls and create unlimited user accounts without rate limiting. This can ...
Oct 20, 2025Webmin 2.510 has a Host Header Injection vulnerability in the password reset functionality that allows attackers to manipulate password reset emails. ...
Oct 16, 2025This CVE describes a sandbox escape vulnerability in Xcode where malicious applications could read and write files outside their designated sandbox bo...
Sep 15, 2025A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...
May 12, 2025This vulnerability in Visual Studio Code's Remote Extension allows attackers to escalate privileges when connecting to remote workspaces. It affects u...
Nov 12, 2024This vulnerability in AMI AptioV BIOS allows local attackers to bypass access controls and modify SPI flash memory, potentially installing persistent ...
Nov 12, 2024This vulnerability in Combodo iTop allows attackers to bypass access controls by specifying arbitrary routes through allowed operations. It affects al...
Nov 7, 2024This CVE allows low-privileged users without admin or power roles to create notifications in Splunk Web Bulletin Messages that are broadcast to all us...
Jul 1, 2024This vulnerability in Brivo ACS100 and ACS300 access control systems allows attackers to bypass password recovery protections and gain unauthorized ac...
Feb 19, 2024An improper access control vulnerability in Intel SUR software allows unauthenticated attackers on the same network segment to potentially cause denia...
Feb 14, 2024This vulnerability in Intel PROSet/Wireless and Killer Wi-Fi software allows unauthenticated local users to trigger denial of service conditions. It a...
Feb 14, 2024This vulnerability allows attackers with physical or administrative access to bypass System Management Mode (SMM) protections and access the SPI flash...
Feb 13, 2024This vulnerability allows authenticated users to claim and access empty AWS accounts by sending malicious API requests with non-existent event IDs and...
Dec 22, 2023This vulnerability in QMS Automotive's QMS.Mobile module allows attackers to bypass authorization checks, potentially accessing sensitive data, perfor...
Sep 12, 2023This vulnerability allows memory corruption in the Qualcomm kernel due to improper access control when processing mapping requests from root processes...
Jun 6, 2023This vulnerability in Intel Retail Edge Mobile iOS app allows authenticated users with local device access to escalate privileges. It affects iOS user...
May 10, 2023This vulnerability in NVIDIA GPU Display Driver allows unprivileged users to access privileged kernel registers through the DxgkDdiEscape handler. Thi...
May 17, 2022This vulnerability allows non-administrative users to modify movement detection parameters on Reolink RLC-410W cameras due to incorrect default permis...
Jan 28, 2022This vulnerability in Azure Connected Machine Agent allows an authenticated attacker with local access to a machine to escalate privileges, potentiall...
Oct 14, 2025Tenable Network Monitor versions before 6.5.1 have insecure directory permissions when installed to non-default locations on Windows, allowing local u...
May 23, 2025This CVE describes a macOS sandbox escape vulnerability where malicious applications can bypass sandbox restrictions to access sensitive user data. It...
Mar 31, 2025An improper access control vulnerability in Solidigm DC Products firmware allows attackers with physical or local access to gain unauthorized access o...
Oct 7, 2024This vulnerability in Intel Thunderbolt driver software allows authenticated local users to escalate privileges due to improper access control. It aff...
May 16, 2024This CVE describes an access control vulnerability in Huawei's security verification module that allows unauthorized access to protected resources. Su...
Aug 8, 2024CVE-2026-21694 is an improper access control vulnerability in Titra time tracking software that allows authenticated users to view and edit other user...
Jan 8, 2026A privilege boundary violation vulnerability in Radiometer medical analyzers allows users with physical access to bypass access controls and gain unau...
Dec 17, 2025This vulnerability allows local attackers to bypass access controls in ImsService on Samsung devices, enabling unauthorized use of privileged APIs. It...
Sep 3, 2025Kapsch TrafficCom RIS-9160 and RIS-9260 Roadside Units contain an unauthenticated EFI shell accessible during boot, allowing attackers to execute arbi...
Aug 26, 2025This vulnerability allows physical attackers to bypass access controls on INSTAR 2K+ and 4K cameras via the UART interface. Attackers with physical ac...
Aug 13, 2025This vulnerability in Visual Studio Code allows an authenticated local attacker to bypass access controls and gain elevated privileges on the system. ...
Apr 12, 2025This vulnerability allows NetBackup administrators to modify the expiration of Governance mode backups in Veritas NetBackup, potentially causing prema...
May 3, 2024CVE-2025-47179 is an improper access control vulnerability in Microsoft Configuration Manager that allows authenticated attackers to elevate privilege...
Nov 11, 2025CVE-2025-22391 is an improper access control vulnerability in SigTest software (Ring 3 user applications) that allows authenticated local attackers to...
Nov 11, 2025This vulnerability allows an attacker with access to the MIB3 infotainment system's main OS to compromise the CPU core responsible for CAN message pro...
Jun 28, 2025Dell Alienware Command Center versions before 6.7.37.0 have an improper access control vulnerability that allows local low-privileged attackers to ele...
Apr 16, 2025This CVE describes an improper access control vulnerability in FortiClient for Windows that allows local users to escalate privileges via the FortiSSL...
Feb 11, 2025This vulnerability in Thunderbolt(TM) Share software allows an authenticated local user to potentially escalate privileges due to improper access cont...
Nov 13, 2024This vulnerability in JAM STAPL Player software allows authenticated users with local access to potentially escalate privileges. It affects users runn...
Nov 13, 2024This CVE describes an elevation of privilege vulnerability in Visual Studio that allows authenticated attackers to gain higher privileges than intende...
Nov 12, 2024An improper access removal handling vulnerability in Solidigm DC Products firmware allows attackers with physical access to bypass security controls a...
Oct 7, 2024This vulnerability in Intel RAID Web Console software allows authenticated users with local access to escalate privileges. It affects all versions of ...
Sep 16, 2024This CVE describes an elevation of privilege vulnerability in Visual Studio that allows authenticated attackers to gain higher privileges than intende...
Jun 11, 2024Dell Alienware Command Center versions before 6.10.15.0 have an improper access control vulnerability that allows local low-privileged attackers to ta...
Nov 13, 2025This vulnerability allows an attacker with physical access to a locked Apple device to use Siri to access sensitive user data. It affects macOS, iOS, ...
Mar 31, 2025Chartbrew versions before 4.8.1 have an authorization bypass vulnerability where authenticated users can manipulate charts belonging to other projects...
Mar 6, 2026This vulnerability allows guest-level authenticated users on TP-Link Tapo C260 v1 cameras to bypass access restrictions by sending crafted requests to...
Feb 10, 2026CVE-2026-24670 is a broken access control vulnerability in Open eClass (formerly GUnet eClass) that allows authenticated students to create new course...
Feb 3, 2026CVE-2026-24668 is a broken access control vulnerability in Open eClass (formerly GUnet eClass) course management systems. Authenticated students can a...
Feb 3, 2026This vulnerability allows authenticated users without proper permissions to download FAQ attachments in phpMyFAQ due to flawed permission checks. It a...
Jan 24, 2026This vulnerability in Gitea allows authenticated users to modify the visibility settings of other users' OpenID identities due to improper ownership v...
Jan 22, 2026About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,310 CVEs classified as CWE-284, with 216 rated critical and 557 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free