CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,311
Total CVEs
216
Critical
558
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
124
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 22
6 Adobe 21
7 Dell 20
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,311)

CVE-2025-21202
6.1

This vulnerability allows an authenticated attacker to elevate privileges within the Windows Recovery Environment Agent. Attackers could gain SYSTEM-l...

Jan 14, 2025
CVE-2025-0033
6.0

This CVE describes an improper access control vulnerability in AMD SEV-SNP (Secure Encrypted Virtualization with Secure Nested Paging) that could allo...

Oct 14, 2025
CVE-2025-57197
6.0

An improper access control vulnerability in Payeer Android app 2.5.0 allows local attackers with root access to bypass PIN verification and change the...

Sep 29, 2025
CVE-2025-21573
6.0

This vulnerability in Oracle Financial Services Revenue Management and Billing's Chatbot component allows authenticated high-privilege attackers to ma...

Apr 15, 2025
CVE-2025-25968
6.0

This vulnerability allows editor-privileged users in DDSN Interactive cm3 Acora CMS version 10.1.1 to access sensitive information like administrator ...

Feb 20, 2025
CVE-2025-61881
5.9

This vulnerability in Oracle Database Server's Java VM component allows unauthenticated attackers with network access via Oracle Net to potentially mo...

Oct 21, 2025
CVE-2025-53057
5.9

This vulnerability in Oracle Java SE and GraalVM allows an unauthenticated attacker with network access to potentially modify critical data through di...

Oct 21, 2025
CVE-2024-41934
5.9

An improper access control vulnerability in Intel GPA software allows authenticated local users to potentially cause denial of service. This affects u...

Feb 12, 2025
CVE-2024-42796
5.9

An unauthenticated attacker can delete music genre entries in Kashipara Music Management System v1.0 via the /music/ajax.php?action=delete_genre endpo...

Sep 16, 2024
CVE-2024-32045
5.9

This vulnerability allows Mattermost users to link their playbook runs to private channels they don't have access to, bypassing intended access contro...

May 26, 2024
CVE-2026-20073
5.8

This vulnerability allows unauthenticated remote attackers to bypass access controls on Cisco ASA and FTD firewalls by sending traffic that should be ...

Mar 4, 2026
CVE-2025-24840
5.8

An improper access control vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows unauthenticated attackers on adjacent networ...

Aug 12, 2025
CVE-2025-0742
5.8

An Improper Access Control vulnerability in EmbedAI 2.1 and earlier allows authenticated attackers to access other users' files by manipulating the FI...

Jan 30, 2025
CVE-2025-0741
5.8

An authenticated attacker can write messages into other users' chat sessions by manipulating the 'chat_id' parameter in EmbedAI's chat functionality. ...

Jan 30, 2025
CVE-2021-34753
5.8

This vulnerability allows unauthenticated remote attackers to bypass Cisco Firepower Threat Defense security rules for Ethernet Industrial Protocol tr...

Nov 15, 2024
CVE-2024-20465
5.8

This vulnerability allows unauthenticated remote attackers to bypass configured IPv4 access control lists on affected Cisco switches when Resilient Et...

Sep 25, 2024
CVE-2024-20261
5.8

A vulnerability in Cisco Firepower Threat Defense (FTD) software allows attackers to bypass file policies that should block encrypted archive files. U...

May 22, 2024
CVE-2024-11358
5.7

Mattermost Android mobile apps up to version 2.21.0 have a misconfigured file provider that allows local attackers to access sensitive files. This aff...

Dec 16, 2024
CVE-2025-64897
5.6

This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion where low-privileged authenticated users can bypass security controls ...

Dec 10, 2025
CVE-2025-30698
5.6

This vulnerability in Oracle Java SE and GraalVM's 2D component allows an unauthenticated attacker with network access to potentially compromise Java ...

Apr 15, 2025
CVE-2026-20638
5.5

This vulnerability allows identifying information to leak to Live Caller ID app extensions even when those extensions are disabled. It affects iOS and...

Feb 11, 2026
CVE-2026-20839
5.5

This vulnerability allows an authorized attacker on a Windows system to access sensitive information through improper access control in the Client-Sid...

Jan 13, 2026
CVE-2025-46288
5.5

A permissions vulnerability in Apple operating systems allows applications to access sensitive payment tokens without proper authorization. This affec...

Dec 17, 2025
CVE-2025-46292
5.5

This CVE describes an iOS/iPadOS vulnerability where apps could bypass entitlement checks to access sensitive user data. It affects users running vuln...

Dec 17, 2025
CVE-2025-46282
5.5

This CVE describes a macOS and Safari vulnerability where insufficient permission checks could allow an application to access sensitive user data. The...

Dec 17, 2025
CVE-2025-43513
5.5

A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS Tah...

Dec 12, 2025
CVE-2025-43416
5.5

A logic vulnerability in macOS allows applications to bypass access restrictions and read protected user data. This affects macOS Tahoe, Sequoia, and ...

Dec 12, 2025
CVE-2025-43351
5.5

A permissions vulnerability in macOS allows applications to bypass intended restrictions and access protected user data. This affects macOS Tahoe vers...

Dec 12, 2025
CVE-2025-43498
5.5

This CVE describes an authorization vulnerability in Apple operating systems where improper state management could allow an application to access sens...

Nov 4, 2025
CVE-2025-43499
5.5

This vulnerability allows malicious apps to bypass entitlement checks and access sensitive user data on Apple devices. It affects iOS, iPadOS, and mac...

Nov 4, 2025
CVE-2025-43396
5.5

A sandbox escape vulnerability in macOS allows sandboxed applications to bypass security restrictions and access sensitive user data. This affects mac...

Nov 4, 2025
CVE-2025-43334
5.5

This CVE describes an improper access control vulnerability in macOS where applications could bypass entitlement checks and access sensitive user data...

Nov 4, 2025
CVE-2025-43335
5.5

This macOS vulnerability allows applications to access sensitive user data they shouldn't have permission to view. It affects macOS systems running vu...

Nov 4, 2025
CVE-2025-43322
5.5

A logic vulnerability in macOS allows applications to access user-sensitive data without proper authorization. This affects macOS Sequoia, Tahoe, and ...

Nov 4, 2025
CVE-2025-53061
5.5

This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows authenticated high-privilege attackers to modify or read sensitive data via HTTP...

Oct 21, 2025
CVE-2025-43313
5.5

A logic flaw in macOS allows applications to bypass intended restrictions and access sensitive user data without proper authorization. This affects ma...

Oct 15, 2025
CVE-2025-43369
5.5

This macOS vulnerability allows malicious applications to bypass symlink protections and access protected user data. It affects macOS systems before v...

Sep 15, 2025
CVE-2025-43321
5.5

This vulnerability allows unsigned applications to launch on Intel-based Mac computers, potentially enabling malicious apps to access protected user d...

Sep 15, 2025
CVE-2025-43325
5.5

This CVE describes a sandbox escape vulnerability in macOS that allows malicious applications to bypass security restrictions and access sensitive use...

Sep 15, 2025
CVE-2025-43315
5.5

This CVE describes a macOS vulnerability where applications could access sensitive user data without proper authorization. It affects macOS systems be...

Sep 15, 2025
CVE-2025-43319
5.5

This vulnerability allows applications to bypass macOS security protections and access sensitive user data they shouldn't normally be able to reach. I...

Sep 15, 2025
CVE-2025-43291
5.5

This CVE describes a permissions bypass vulnerability in macOS that allows applications to modify protected areas of the file system. The vulnerabilit...

Sep 15, 2025
CVE-2025-43285
5.5

A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS systems ru...

Sep 15, 2025
CVE-2025-31269
5.5

This CVE describes a permissions issue in macOS that could allow malicious applications to access protected user data they shouldn't have permission t...

Sep 15, 2025
CVE-2025-31270
5.5

A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS systems be...

Sep 15, 2025
CVE-2025-43208
5.5

A permissions vulnerability in macOS allows applications to access sensitive location information without proper authorization. This affects macOS sys...

Sep 15, 2025
CVE-2025-24197
5.5

A logic vulnerability in macOS allows applications to bypass intended access controls and access sensitive user data. This affects macOS systems runni...

Sep 15, 2025
CVE-2025-54871
5.5

This vulnerability in Electron Capture allows local unprivileged users on macOS to bypass TCC privacy protections by setting the ELECTRON_RUN_AS_NODE ...

Aug 5, 2025
CVE-2025-31212
5.5

This vulnerability allows malicious apps to access sensitive user data on Apple devices due to improper state management. It affects users running old...

May 12, 2025
CVE-2025-30729
5.5

This vulnerability in Oracle Communications Order and Service Management allows authenticated attackers with low privileges to manipulate data, read r...

Apr 15, 2025

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free