CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,303
Total CVEs
214
Critical
553
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
123
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,303)

CVE-2023-35939
8.1

This vulnerability in GLPI allows authenticated users (and in some cases unauthenticated users) to bypass access controls and interact with, modify, o...

Jul 5, 2023
CVE-2023-2946
8.1

CVE-2023-2946 is an improper access control vulnerability in OpenEMR that allows unauthorized users to access sensitive patient data and administrativ...

May 27, 2023
CVE-2023-2845
8.1

This CVE describes an improper access control vulnerability in cloudexplorer-lite that allows unauthorized users to access restricted functionality or...

May 23, 2023
CVE-2021-45111
8.1

This vulnerability allows authenticated remote users in Odoo to trigger the creation of demonstration data, including user accounts with known credent...

Apr 25, 2023
CVE-2023-24544
8.1

An improper access control vulnerability in Buffalo network switches allows network-adjacent attackers to access specific files, potentially enabling ...

Apr 11, 2023
CVE-2022-2225
8.1

CVE-2022-2225 allows non-admin users to bypass Cloudflare WARP's Zero Trust security policies by using warp-cli subcommands to disable network interfa...

Jul 26, 2022
CVE-2022-32212
8.1

This CVE describes an OS command injection vulnerability in Node.js that allows attackers to bypass host validation checks and perform DNS rebinding a...

Jul 14, 2022
CVE-2021-3062
8.1

An improper access control vulnerability in PAN-OS allows authenticated GlobalProtect users to access the EC2 instance metadata endpoint on AWS-hosted...

Nov 10, 2021
CVE-2021-39333
8.1

This vulnerability in the Hashthemes Demo Importer WordPress plugin allows any logged-in user to execute database truncation and file deletion functio...

Nov 1, 2021
CVE-2021-24198
8.1

This vulnerability in the wpDataTables WordPress plugin allows authenticated users with low privileges to delete other users' data from shared tables ...

Apr 12, 2021
CVE-2025-7016
8.0

An improper access control vulnerability in Akın Software's QR Menu allows attackers to abuse authentication mechanisms, potentially gaining unauthor...

Jan 29, 2026
CVE-2025-64660
8.0

This vulnerability allows an authorized attacker to execute arbitrary code remotely on systems running vulnerable versions of GitHub Copilot and Visua...

Nov 20, 2025
CVE-2025-48860
8.0

An authenticated low-privileged attacker can remotely access backup archives created by users with elevated permissions in ctrlX OS setup mechanism. T...

Aug 14, 2025
CVE-2025-20229
8.0

This vulnerability allows low-privileged Splunk users without admin or power roles to execute arbitrary code on the server by uploading files to a spe...

Mar 26, 2025
CVE-2024-28338
8.0

This vulnerability allows attackers to bypass authentication on TOTOLINK A8000RU routers by crafting a specific session cookie, granting unauthorized ...

Mar 12, 2024
CVE-2021-23845
8.0

This session hijacking vulnerability in Bosch B426/B429 configuration web pages allows attackers to take over authenticated user sessions. Affected sy...

Jun 18, 2021
CVE-2025-49707
7.9

An improper access control vulnerability in Azure Virtual Machines allows authenticated attackers to perform local spoofing attacks. This affects Azur...

Aug 12, 2025
CVE-2024-25576
7.9

This vulnerability allows a privileged user on affected Intel FPGA systems to escalate their privileges through improper access control in firmware. I...

Aug 14, 2024
CVE-2023-25777
7.9

This vulnerability allows authenticated Windows users with local access to potentially escalate privileges through improper access control in Intel Th...

Feb 14, 2024
CVE-2022-40964
7.9

This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software allows a privileged user to escalate privileges via local access due to impr...

Aug 11, 2023
CVE-2025-60865
7.8

A local privilege escalation vulnerability in avanquest Driver Updater allows attackers with local access to gain SYSTEM-level privileges through the ...

Feb 3, 2026
CVE-2025-46691
7.8

Dell PremierColor Panel Driver versions before 1.0.0.1 A01 contain an improper access control vulnerability that allows local low-privileged attackers...

Jan 28, 2026
CVE-2026-20949
7.8

This vulnerability allows an unauthorized attacker to bypass local security features in Microsoft Office Excel, potentially gaining elevated privilege...

Jan 13, 2026
CVE-2026-20843
7.8

This vulnerability in Windows Routing and Remote Access Service (RRAS) allows authenticated attackers to escalate privileges on the local system. Atta...

Jan 13, 2026
CVE-2025-64673
7.8

CVE-2025-64673 is a local privilege escalation vulnerability in the Storvsp.sys driver that allows authenticated attackers to gain SYSTEM-level privil...

Dec 9, 2025
CVE-2025-37155
7.8

This vulnerability allows authenticated read-only SSH users to bypass access controls and gain administrator privileges on affected network management...

Nov 18, 2025
CVE-2025-60705
7.8

This vulnerability allows an authenticated attacker with local access to exploit improper access control in Windows Client-Side Caching (CSC) Service ...

Nov 11, 2025
CVE-2025-59512
7.8

This vulnerability allows an authorized attacker with local access to exploit improper access controls in Microsoft's Customer Experience Improvement ...

Nov 11, 2025
CVE-2025-43407
7.8

This vulnerability allows an application to escape its sandbox restrictions on affected Apple operating systems. It affects users running vulnerable v...

Nov 4, 2025
CVE-2025-58724
7.8

This vulnerability in Azure Connected Machine Agent allows authenticated attackers to escalate privileges on local systems. Attackers with existing ac...

Oct 14, 2025
CVE-2025-43340
7.8

This macOS vulnerability allows malicious applications to escape their sandbox restrictions, potentially accessing system resources or other applicati...

Sep 15, 2025
CVE-2025-43204
7.8

This vulnerability allows malicious applications to escape macOS sandbox restrictions, potentially accessing system resources or user data they should...

Sep 15, 2025
CVE-2025-10491
7.8

This CVE describes a DLL hijacking vulnerability in MongoDB Windows installations where custom installation directories may have improper ACLs, allowi...

Sep 15, 2025
CVE-2025-54098
7.8

This vulnerability allows an authorized attacker with local access to a Windows Hyper-V host to elevate privileges due to improper access control. It ...

Sep 9, 2025
CVE-2025-49692
7.8

An improper access control vulnerability in Azure Windows Virtual Machine Agent allows authenticated attackers to escalate privileges locally on affec...

Sep 9, 2025
CVE-2025-53729
7.8

This vulnerability in Azure File Sync allows an authenticated attacker with local access to elevate privileges on the system. It affects organizations...

Aug 12, 2025
CVE-2025-50777
7.8

The AZIOT 2MP Smart Wi-Fi CCTV camera firmware contains an access control vulnerability that allows local attackers to gain root shell access. This ex...

Jul 30, 2025
CVE-2025-47993
7.8

This vulnerability in Microsoft PC Manager allows authenticated attackers to bypass intended access controls and gain elevated privileges on the local...

Jul 8, 2025
CVE-2025-23365
7.8

A privilege escalation vulnerability in TIA Administrator allows low-privileged users to trigger installations by manipulating cache files and downloa...

Jul 8, 2025
CVE-2025-32714
7.8

This vulnerability in Windows Installer allows authenticated attackers to bypass proper access controls and gain elevated local privileges. It affects...

Jun 10, 2025
CVE-2025-47161
7.8

CVE-2025-47161 is an improper access control vulnerability in Microsoft Defender for Endpoint that allows authenticated attackers to elevate privilege...

May 15, 2025
CVE-2025-21470
7.8

This vulnerability allows memory corruption when processing image encoding with a NULL configuration parameter in an IOCTL call. It affects Qualcomm d...

May 6, 2025
CVE-2024-49842
7.8

This CVE describes a memory corruption vulnerability in Qualcomm components where incorrect API restrictions allow memory mapping into protected VM ad...

May 6, 2025
CVE-2024-9157
7.8

A privilege escalation vulnerability in Synaptics audio drivers allows local authenticated attackers to load arbitrary DLLs into privileged processes....

Mar 11, 2025
CVE-2025-21359
7.8

This Windows kernel vulnerability allows attackers to bypass security features, potentially gaining elevated privileges or executing arbitrary code. I...

Feb 11, 2025
CVE-2024-35177
7.8

This CVE describes a local privilege escalation vulnerability in Wazuh Windows agent where improper ACLs on non-default installation directories allow...

Feb 3, 2025
CVE-2024-43600
7.8

This vulnerability allows attackers to elevate privileges within Microsoft Office applications, potentially gaining higher-level access than intended....

Dec 12, 2024
CVE-2024-49600
7.8

Dell Power Manager versions before 3.17 have an improper access control vulnerability that allows local low-privileged attackers to execute arbitrary ...

Dec 9, 2024
CVE-2024-45334
7.8

This vulnerability in Trend Micro Antivirus One allows attackers to modify product configurations without authorization, potentially disabling securit...

Oct 22, 2024
CVE-2024-43503
7.8

This vulnerability allows authenticated attackers to elevate their privileges within Microsoft SharePoint, potentially gaining administrative access. ...

Oct 8, 2024

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,303 CVEs classified as CWE-284, with 214 rated critical and 553 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free