CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,300
Total CVEs
214
Critical
551
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
121
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,300)

CVE-2024-8805
8.8

This vulnerability in BlueZ's HID over GATT Profile allows network-adjacent attackers to execute arbitrary code without authentication by exploiting i...

Nov 22, 2024
CVE-2024-46280
8.8

PIX-LINK LV-WR22 RE3002-P1-01 firmware version V117.0 has a Telnet service enabled with hardcoded root credentials that cannot be changed. This allows...

Sep 30, 2024
CVE-2024-8779
8.8

CVE-2024-8779 is an improper access control vulnerability in OMFLOW software from The SYSCOM Group that allows authenticated users with regular privil...

Sep 16, 2024
CVE-2024-37341
8.8

This vulnerability in Microsoft SQL Server allows authenticated attackers to execute arbitrary code with elevated privileges, potentially gaining full...

Sep 10, 2024
CVE-2024-42023
8.8

This CVE describes an improper access control vulnerability in Veeam software that allows low-privileged users to remotely execute code with Administr...

Sep 7, 2024
CVE-2024-24986
8.8

This vulnerability allows authenticated local users to escalate privileges on systems with affected Intel Ethernet Network Controllers and Adapters. T...

Aug 14, 2024
CVE-2024-40475
8.8

CVE-2024-40475 is an incorrect access control vulnerability in SourceCodester Best House Rental Management System v1.0 that allows unauthorized access...

Aug 12, 2024
CVE-2024-40531
8.8

A mass assignment vulnerability in Pantera CRM allows authenticated users to modify any user attribute, including administrative roles, by injecting p...

Aug 5, 2024
CVE-2024-6737
8.8

This vulnerability allows remote attackers with regular user privileges in the Electronic Official Document Management System from 2100 TECHNOLOGY to ...

Jul 15, 2024
CVE-2024-23663
8.8

This vulnerability allows attackers to create users with elevated privileges on Fortinet FortiExtender devices via crafted HTTP requests. It affects m...

Jul 9, 2024
CVE-2024-37905
8.8

This vulnerability in authentik's API-Access-Token mechanism allows attackers to escalate privileges to full admin access. Any authentik instance runn...

Jun 28, 2024
CVE-2022-45929
8.8

This vulnerability in Northern.tech Mender allows low-privileged read-only users to escalate their privileges by changing their own roles to administr...

Jun 20, 2024
CVE-2023-45217
8.8

This vulnerability in Intel Power Gadget software allows authenticated local users to escalate privileges on Windows systems. Attackers could gain SYS...

May 16, 2024
CVE-2023-40070
8.8

This vulnerability in Intel Power Gadget for macOS allows authenticated local users to escalate privileges due to improper access control. Attackers c...

May 16, 2024
CVE-2022-32507
8.8

This vulnerability allows unprivileged users to execute Bluetooth Low Energy (BLE) commands that should require privileged access on Nuki smart locks....

May 14, 2024
CVE-2024-31759
8.8

This vulnerability in sanluan PublicCMS v4.0.202302.e allows attackers to escalate privileges through the change password function. Attackers can gain...

Apr 16, 2024
CVE-2024-21114
8.8

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the host system to compromise the VirtualBox software...

Apr 16, 2024
CVE-2024-21112
8.8

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the host system to compromise VirtualBox, potentially...

Apr 16, 2024
CVE-2024-21067
8.8

This vulnerability in Oracle Enterprise Manager Base Platform allows a low-privileged attacker with local access to the host to completely compromise ...

Apr 16, 2024
CVE-2024-29837
8.8

This vulnerability allows unauthenticated attackers to access administrator functionality in Evolution Controller's web interface when any user is alr...

Apr 15, 2024
CVE-2024-29993
8.8

This vulnerability in Azure CycleCloud allows authenticated users to elevate their privileges to administrator level, potentially gaining full control...

Apr 9, 2024
CVE-2023-49978
8.8

CVE-2023-49978 is an improper access control vulnerability in Customer Support System v1 that allows non-administrator users to access administrative ...

Mar 21, 2024
CVE-2024-25501
8.8

This vulnerability in WinMail allows remote attackers to execute arbitrary code by sending a crafted script via the email parameter. It affects WinMai...

Mar 9, 2024
CVE-2024-28115
8.8

This CVE describes a privilege escalation vulnerability in FreeRTOS Kernel affecting ARMv7-M and ARMv8-M ports with MPU support enabled. It allows att...

Mar 7, 2024
CVE-2023-38946
8.8

This vulnerability allows attackers to bypass authentication in Multilaser RE160 routers by supplying a specially crafted cookie, granting them comple...

Mar 6, 2024
CVE-2024-27497
8.8

Linksys E2000 router version 1.0.06 build 1 contains an authentication bypass vulnerability in the position.js file that allows attackers to access ad...

Mar 1, 2024
CVE-2024-1632
8.8

CVE-2024-1632 is an improper access control vulnerability in Progress Sitefinity CMS that allows low-privileged backend users to access sensitive admi...

Feb 28, 2024
CVE-2024-25723
8.8

This vulnerability in ZenML Server allows remote attackers to escalate privileges by activating user accounts with only a valid username and new passw...

Feb 27, 2024
CVE-2024-1675
8.8

This vulnerability allows attackers to bypass Chrome's download restrictions via a malicious HTML page, potentially enabling unauthorized file system ...

Feb 21, 2024
CVE-2023-39425
8.8

This vulnerability in Intel DSA software allows authenticated users with local access to potentially escalate privileges due to improper access contro...

Feb 14, 2024
CVE-2024-25677
8.8

This vulnerability in Min browser versions before 1.31.0 allows local HTML files to bypass same-origin policy restrictions and access other local file...

Feb 9, 2024
CVE-2024-24824
8.8

This vulnerability in Graylog allows authenticated users with appropriate permissions to load and instantiate arbitrary Java classes via HTTP PUT requ...

Feb 7, 2024
CVE-2023-50159
8.8

This vulnerability allows attackers to bypass kiosk mode application restrictions in ScaleFusion Windows Desktop App, enabling execution of arbitrary ...

Jan 11, 2024
CVE-2023-32204
8.8

This vulnerability in Intel OFU software allows authenticated users with local access to potentially escalate privileges due to improper access contro...

Nov 14, 2023
CVE-2023-43336
8.8

This CVE describes an access control vulnerability in Sangoma FreePBX CDR module that allows attackers to bypass authorization by modifying parameter ...

Nov 2, 2023
CVE-2023-32632
8.8

This vulnerability allows remote attackers to execute arbitrary commands on Yifan YF325 routers by sending specially crafted network requests to the v...

Oct 11, 2023
CVE-2023-0506
8.8

This CVE describes a privilege escalation vulnerability in ByDemes Group Airspace CCTV Web Service version 2.616.BY00.11. It allows low-privileged att...

Oct 3, 2023
CVE-2023-38132
8.8

The LAN-W451NGR router from LOGITEC CORPORATION has an improper access control vulnerability that allows unauthenticated attackers to log into the tel...

Aug 18, 2023
CVE-2022-41784
8.8

This vulnerability in Intel's OFU software kernel driver allows authenticated local users to bypass access controls and escalate privileges. It affect...

May 10, 2023
CVE-2023-24512
8.8

This vulnerability allows authenticated attackers with gNMI access to modify arbitrary configurations on Arista EOS switches when the Streaming Teleme...

Apr 25, 2023
CVE-2022-47542
8.8

CVE-2022-47542 is an incorrect access control vulnerability in Red Gate SQL Monitor that allows remote attackers to escalate privileges. This affects ...

Mar 30, 2023
CVE-2023-1647
8.8

This CVE describes an improper access control vulnerability in Cal.com (formerly Calendly) scheduling software. It allows unauthorized users to bypass...

Mar 27, 2023
CVE-2022-1025
8.8

CVE-2022-1025 is an improper access control vulnerability in Argo CD that allows authenticated users to escalate privileges to admin level. All Argo C...

Jul 12, 2022
CVE-2022-21182
8.8

This vulnerability allows attackers to escalate privileges on InHand Networks InRouter302 devices by sending specially crafted HTTP requests to the ro...

May 12, 2022
CVE-2021-36775
8.8

CVE-2021-36775 is an improper access control vulnerability in SUSE Rancher that allows users to retain privileges after they should have been revoked....

Apr 4, 2022
CVE-2022-0824
8.8

This vulnerability in Webmin allows attackers to bypass access controls and execute arbitrary code remotely on affected systems. It affects Webmin ins...

Mar 2, 2022
CVE-2021-3967
8.8

This CVE-2021-3967 vulnerability in Zulip allows attackers to bypass access controls and potentially access sensitive data or perform unauthorized act...

Feb 26, 2022
CVE-2021-40416
8.8

This vulnerability allows any authenticated user to execute unauthorized Get APIs on Reolink RLC-410W cameras due to incorrect default permissions in ...

Jan 28, 2022
CVE-2022-0270
8.8

CVE-2022-0270 is an authentication bypass vulnerability in bored-agent (a Kubernetes component) where improper header sanitization allows attackers to...

Jan 25, 2022
CVE-2021-42124
8.8

This vulnerability allows an attacker with access to the Inforail Service in Ivanti Avalanche to perform session takeover, potentially gaining unautho...

Dec 7, 2021

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,300 CVEs classified as CWE-284, with 214 rated critical and 551 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free