CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,311)
This vulnerability allows an authenticated attacker to elevate privileges within the Windows Recovery Environment Agent. Attackers could gain SYSTEM-l...
Jan 14, 2025This CVE describes an improper access control vulnerability in AMD SEV-SNP (Secure Encrypted Virtualization with Secure Nested Paging) that could allo...
Oct 14, 2025An improper access control vulnerability in Payeer Android app 2.5.0 allows local attackers with root access to bypass PIN verification and change the...
Sep 29, 2025This vulnerability in Oracle Financial Services Revenue Management and Billing's Chatbot component allows authenticated high-privilege attackers to ma...
Apr 15, 2025This vulnerability allows editor-privileged users in DDSN Interactive cm3 Acora CMS version 10.1.1 to access sensitive information like administrator ...
Feb 20, 2025This vulnerability in Oracle Database Server's Java VM component allows unauthenticated attackers with network access via Oracle Net to potentially mo...
Oct 21, 2025This vulnerability in Oracle Java SE and GraalVM allows an unauthenticated attacker with network access to potentially modify critical data through di...
Oct 21, 2025An improper access control vulnerability in Intel GPA software allows authenticated local users to potentially cause denial of service. This affects u...
Feb 12, 2025An unauthenticated attacker can delete music genre entries in Kashipara Music Management System v1.0 via the /music/ajax.php?action=delete_genre endpo...
Sep 16, 2024This vulnerability allows Mattermost users to link their playbook runs to private channels they don't have access to, bypassing intended access contro...
May 26, 2024This vulnerability allows unauthenticated remote attackers to bypass access controls on Cisco ASA and FTD firewalls by sending traffic that should be ...
Mar 4, 2026An improper access control vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows unauthenticated attackers on adjacent networ...
Aug 12, 2025An Improper Access Control vulnerability in EmbedAI 2.1 and earlier allows authenticated attackers to access other users' files by manipulating the FI...
Jan 30, 2025An authenticated attacker can write messages into other users' chat sessions by manipulating the 'chat_id' parameter in EmbedAI's chat functionality. ...
Jan 30, 2025This vulnerability allows unauthenticated remote attackers to bypass Cisco Firepower Threat Defense security rules for Ethernet Industrial Protocol tr...
Nov 15, 2024This vulnerability allows unauthenticated remote attackers to bypass configured IPv4 access control lists on affected Cisco switches when Resilient Et...
Sep 25, 2024A vulnerability in Cisco Firepower Threat Defense (FTD) software allows attackers to bypass file policies that should block encrypted archive files. U...
May 22, 2024Mattermost Android mobile apps up to version 2.21.0 have a misconfigured file provider that allows local attackers to access sensitive files. This aff...
Dec 16, 2024This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion where low-privileged authenticated users can bypass security controls ...
Dec 10, 2025This vulnerability in Oracle Java SE and GraalVM's 2D component allows an unauthenticated attacker with network access to potentially compromise Java ...
Apr 15, 2025This vulnerability allows identifying information to leak to Live Caller ID app extensions even when those extensions are disabled. It affects iOS and...
Feb 11, 2026This vulnerability allows an authorized attacker on a Windows system to access sensitive information through improper access control in the Client-Sid...
Jan 13, 2026A permissions vulnerability in Apple operating systems allows applications to access sensitive payment tokens without proper authorization. This affec...
Dec 17, 2025This CVE describes an iOS/iPadOS vulnerability where apps could bypass entitlement checks to access sensitive user data. It affects users running vuln...
Dec 17, 2025This CVE describes a macOS and Safari vulnerability where insufficient permission checks could allow an application to access sensitive user data. The...
Dec 17, 2025A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS Tah...
Dec 12, 2025A logic vulnerability in macOS allows applications to bypass access restrictions and read protected user data. This affects macOS Tahoe, Sequoia, and ...
Dec 12, 2025A permissions vulnerability in macOS allows applications to bypass intended restrictions and access protected user data. This affects macOS Tahoe vers...
Dec 12, 2025This CVE describes an authorization vulnerability in Apple operating systems where improper state management could allow an application to access sens...
Nov 4, 2025This vulnerability allows malicious apps to bypass entitlement checks and access sensitive user data on Apple devices. It affects iOS, iPadOS, and mac...
Nov 4, 2025A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...
Nov 4, 2025This CVE describes an improper access control vulnerability in macOS where applications could bypass entitlement checks and access sensitive user data...
Nov 4, 2025This macOS vulnerability allows applications to access sensitive user data they shouldn't have permission to view. It affects macOS systems running vu...
Nov 4, 2025A logic vulnerability in macOS allows applications to access user-sensitive data without proper authorization. This affects macOS Sequoia, Tahoe, and ...
Nov 4, 2025This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows authenticated high-privilege attackers to modify or read sensitive data via HTTP...
Oct 21, 2025A logic flaw in macOS allows applications to bypass intended restrictions and access sensitive user data without proper authorization. This affects ma...
Oct 15, 2025This macOS vulnerability allows malicious applications to bypass symlink protections and access protected user data. It affects macOS systems before v...
Sep 15, 2025This vulnerability allows unsigned applications to launch on Intel-based Mac computers, potentially enabling malicious apps to access protected user d...
Sep 15, 2025This CVE describes a sandbox escape vulnerability in macOS that allows malicious applications to bypass security restrictions and access sensitive use...
Sep 15, 2025This CVE describes a macOS vulnerability where applications could access sensitive user data without proper authorization. It affects macOS systems be...
Sep 15, 2025This vulnerability allows applications to bypass macOS security protections and access sensitive user data they shouldn't normally be able to reach. I...
Sep 15, 2025This CVE describes a permissions bypass vulnerability in macOS that allows applications to modify protected areas of the file system. The vulnerabilit...
Sep 15, 2025A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS systems ru...
Sep 15, 2025This CVE describes a permissions issue in macOS that could allow malicious applications to access protected user data they shouldn't have permission t...
Sep 15, 2025A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS systems be...
Sep 15, 2025A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS sys...
Sep 15, 2025A logic vulnerability in macOS allows applications to bypass intended access controls and access sensitive user data. This affects macOS systems runni...
Sep 15, 2025This vulnerability in Electron Capture allows local unprivileged users on macOS to bypass TCC privacy protections by setting the ELECTRON_RUN_AS_NODE ...
Aug 5, 2025This vulnerability allows malicious apps to access sensitive user data on Apple devices due to improper state management. It affects users running old...
May 12, 2025This vulnerability in Oracle Communications Order and Service Management allows authenticated attackers with low privileges to manipulate data, read r...
Apr 15, 2025About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free