CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,300
Total CVEs
214
Critical
551
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
121
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,300)

CVE-2021-41298
8.8

The ECOA BAS controller has an insecure direct object reference vulnerability that allows authenticated users to bypass authorization and access hidde...

Sep 30, 2021
CVE-2021-1284
8.8

This vulnerability allows an unauthenticated attacker with network access to adjacent Cisco SD-WAN vEdge devices to bypass authentication and authoriz...

May 6, 2021
CVE-2020-7547
8.8

This vulnerability allows authenticated users to escalate privileges via the web interface in Schneider Electric's EcoStruxure and SmartStruxure power...

Dec 1, 2020
CVE-2024-39777
8.7

This vulnerability in Mattermost allows remote attackers to forcibly share local channels without administrator consent when shared channels are enabl...

Aug 1, 2024
CVE-2022-46754
8.7

This vulnerability allows authenticated admin users in Dell Wyse Management Suite to access pro license features they are not authorized to use, enabl...

Feb 11, 2023
CVE-2026-24302
8.6

This Azure Arc vulnerability allows authenticated attackers to elevate privileges within managed systems, potentially gaining administrative control. ...

Feb 5, 2026
CVE-2025-64066
8.6

Primakon Pi Portal 1.0.18 has a broken access control vulnerability in its user registration endpoint that allows unauthenticated attackers to create ...

Nov 25, 2025
CVE-2025-59932
8.6

This vulnerability in Flag Forge CTF platform allows unauthenticated attackers to create, modify, or delete platform resources via the /api/resources ...

Sep 27, 2025
CVE-2025-39247
8.6

An access control vulnerability in HikCentral Professional allows unauthenticated attackers to gain administrative privileges. This affects organizati...

Aug 29, 2025
CVE-2025-50850
8.6

This vulnerability in CS Cart 4.18.3 allows attackers to perform brute-force attacks against vendor login pages due to missing CAPTCHA and rate limiti...

Jul 31, 2025
CVE-2025-50059
8.6

This vulnerability in Oracle Java SE and GraalVM networking components allows unauthenticated attackers with network access to bypass Java sandbox sec...

Jul 15, 2025
CVE-2025-0739
8.6

An Improper Access Control vulnerability in EmbedAI 2.1 and earlier allows authenticated attackers to view other users' subscription information by ma...

Jan 30, 2025
CVE-2025-0740
8.6

An authenticated attacker can access other users' chat messages in EmbedAI by manipulating the CHAT_ID parameter in the load_messages endpoint. This a...

Jan 30, 2025
CVE-2024-29082
8.6

An unauthenticated remote attacker can bypass authentication and factory reset Vonets industrial wifi bridge devices via unprotected goform endpoints....

Aug 12, 2024
CVE-2024-33666
8.6

This vulnerability in Zammad allows users with customer-level access to view time accounting details for tickets via the API, which should be restrict...

Apr 26, 2024
CVE-2024-0258
8.6

This memory handling vulnerability in Apple operating systems allows malicious apps to execute arbitrary code outside their sandbox or with elevated p...

Mar 8, 2024
CVE-2023-42838
8.6

This macOS sandbox escape vulnerability allows malicious applications to break out of their security confinement and execute arbitrary code with eleva...

Feb 21, 2024
CVE-2024-20927
8.6

This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via HTTP to compromise the server. It enables unauth...

Feb 17, 2024
CVE-2023-20223
8.6

This vulnerability in Cisco DNA Center allows unauthenticated remote attackers to read and modify data in an internal service repository due to insuff...

Sep 27, 2023
CVE-2025-32992
8.5

Thermo Fisher Scientific ePort software through version 3.0.0 has an incorrect access control vulnerability that allows unauthorized users to bypass a...

Aug 18, 2025
CVE-2024-51954
8.5

An improper access control vulnerability in ArcGIS Server versions 11.3 and below allows authenticated attackers with low privileges to access secure ...

Mar 3, 2025
CVE-2024-43479
8.5

This vulnerability allows remote code execution in Microsoft Power Automate Desktop, enabling attackers to execute arbitrary code on affected systems....

Sep 10, 2024
CVE-2023-48239
8.5

This vulnerability in Nextcloud Server allows a malicious user to update any personal or global external storage configuration, making those storage l...

Nov 21, 2023
CVE-2023-21491
8.5

This vulnerability allows local attackers to write arbitrary files with system privileges due to improper access control in Samsung's ThemeManager. It...

May 4, 2023
CVE-2025-53049
8.4

This vulnerability in Oracle Business Intelligence Enterprise Edition allows high-privileged attackers with network access to compromise the system vi...

Oct 21, 2025
CVE-2025-26678
8.4

CVE-2025-26678 is an improper access control vulnerability in Windows Defender Application Control (WDAC) that allows local attackers to bypass securi...

Apr 8, 2025
CVE-2024-41605
8.4

This vulnerability allows attackers to replace legitimate Foxit PDF update files with malicious executables via side-loading attacks, enabling arbitra...

Sep 26, 2024
CVE-2024-23360
8.4

This vulnerability allows memory corruption when creating an LPAC client because the LPAC engine could access GPU registers. It affects devices with Q...

Jun 3, 2024
CVE-2024-33396
8.4

This vulnerability in Karmada allows a local attacker to execute arbitrary code by exploiting improper access control in the token component. It affec...

May 2, 2024
CVE-2023-38297
8.4

A vulnerable pre-installed Android app (com.factory.mmigroup) exposes system-level functionality to local third-party apps without requiring permissio...

Apr 22, 2024
CVE-2023-43517
8.4

This CVE describes a memory corruption vulnerability in Qualcomm's Automotive Multimedia systems due to improper access control in the Hardware Abstra...

Feb 6, 2024
CVE-2023-31100
8.4

This CVE describes an improper access control vulnerability in Phoenix SecureCore Technology 4's SMI handler that allows unauthorized modification of ...

Nov 15, 2023
CVE-2023-24844
8.4

This vulnerability allows memory corruption in Qualcomm's Core component when invoking calls to the Access Control core library with hardware-protecte...

Oct 3, 2023
CVE-2023-21642
8.4

CVE-2023-21642 is a memory corruption vulnerability in Qualcomm's HAB (Hardware Abstraction Layer) memory management that allows attackers with physic...

May 2, 2023
CVE-2022-40539
8.4

This vulnerability allows memory corruption in Automotive Android OS due to improper array index validation, potentially enabling arbitrary code execu...

Mar 10, 2023
CVE-2022-33243
8.4

CVE-2022-33243 is a memory corruption vulnerability in Qualcomm's Inter-Processor Communication (IPC) subsystem due to improper access control. This a...

Feb 12, 2023
CVE-2025-66397
8.3

This vulnerability allows any authenticated user in ChurchCRM to perform Kiosk Manager actions like allowing/accepting kiosk registrations, reloading ...

Dec 17, 2025
CVE-2025-57130
8.3

An incorrect access control vulnerability in ZwiiCMS allows authenticated low-privilege users to escalate privileges by accessing and modifying any us...

Nov 5, 2025
CVE-2025-7051
8.3

This vulnerability allows any authenticated user in N-central to read, write, and modify syslog configurations across all customer accounts on the ser...

Aug 21, 2025
CVE-2024-26139
8.3

This vulnerability in OpenCTI allows authenticated users with low privileges to escalate their permissions to administrative level through the profile...

May 23, 2024
CVE-2023-45744
8.3

An unauthenticated data integrity vulnerability in Peplink Smart Reader v1.2.0 allows attackers to modify device configuration via specially crafted H...

Apr 17, 2024
CVE-2024-25962
8.3

Dell InsightIQ version 5.0 has an improper access control vulnerability that allows remote low-privileged attackers to gain unauthorized access to mon...

Mar 27, 2024
CVE-2024-20916
8.3

This vulnerability in Oracle Enterprise Manager Base Platform allows high-privileged attackers with physical network access to compromise the system, ...

Jan 16, 2024
CVE-2023-22102
8.3

This vulnerability in Oracle MySQL Connector/J allows an unauthenticated attacker with network access to potentially compromise the connector through ...

Oct 17, 2023
CVE-2023-21923
8.3

This vulnerability in Oracle Health Sciences InForm allows authenticated attackers with low privileges to perform unauthorized data manipulation, acce...

Apr 18, 2023
CVE-2021-1600
8.3

CVE-2021-1600 allows unauthenticated attackers on the same network segment to bypass firewall restrictions on Cisco Intersight Virtual Appliance's ext...

Jul 22, 2021
CVE-2026-21535
8.2

CVE-2026-21535 is an improper access control vulnerability in Microsoft Teams that allows unauthorized attackers to access and disclose sensitive info...

Feb 19, 2026
CVE-2026-1117
8.2

This vulnerability allows unauthenticated attackers to trigger resource-intensive text generation operations and manipulate server state in the lollms...

Feb 2, 2026
CVE-2025-66028
8.2

OneUptime versions before 8.0.5567 contain a privilege escalation vulnerability where attackers can manipulate the login response to gain admin dashbo...

Nov 26, 2025
CVE-2025-27919
8.2

This vulnerability in AnyDesk allows a remote user with 'Control my device' permission to modify settings and set a Full Access password without confi...

Nov 6, 2025

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,300 CVEs classified as CWE-284, with 214 rated critical and 551 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free