CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

769
Total CVEs
341
Critical
312
High
8.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
67
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Qualcomm 12
3 Huawei 11
4 Microsoft 11
5 Debian 10
6 Dlink 9
7 Cisco 9
8 Dell 9
9 Fedoraproject 8
10 Adobe 8

All Improper Authentication CVEs (769)

CVE-2023-44302
8.1

Dell PowerProtect Data Manager DM5500 appliances running version 5.14.0.0 and earlier contain an improper authentication vulnerability (CWE-287). Remo...

Dec 4, 2023
CVE-2023-37283
8.1

This vulnerability allows authentication bypass in PingFederate's Identifier First Adapter when configured in a specific, non-recommended way. Attacke...

Oct 25, 2023
CVE-2023-32347
8.1

This vulnerability in Teltonika's Remote Management System allows attackers who obtain a device's serial number and MAC address to authenticate as tha...

May 22, 2023
CVE-2023-2706
8.1

This vulnerability allows unauthenticated attackers to bypass authentication in the OTP Login Woocommerce & Gravity Forms WordPress plugin by obtainin...

May 17, 2023
CVE-2023-29032
8.1

This vulnerability in Apache OpenMeetings allows attackers with access to certain private information to impersonate other users. It affects Apache Op...

May 12, 2023
CVE-2023-1752
8.1

This vulnerability in Nexx Smart Home devices allows any user to register an already registered alarm or associated device using only the device's MAC...

Apr 4, 2023
CVE-2022-42951
8.1

CVE-2022-42951 is an authentication bypass vulnerability in Couchbase Server that allows attackers to connect to the cluster manager using default cre...

Feb 6, 2023
CVE-2022-33202
8.1

This CVE describes an authentication bypass vulnerability in L2Blocker network security devices. An adjacent attacker can bypass login authentication ...

Jun 27, 2022
CVE-2021-26253
8.1

This vulnerability allows attackers to bypass DUO multi-factor authentication in Splunk Enterprise, enabling unauthorized access to protected Splunk i...

May 6, 2022
CVE-2022-25155
8.1

This vulnerability allows remote unauthenticated attackers to bypass authentication on affected Mitsubishi Electric PLCs by replaying eavesdropped pas...

Apr 1, 2022
CVE-2022-23654
8.1

Wiki.js versions before 2.5.274 contain an improper authentication vulnerability (CWE-287) where authenticated users with write access to restricted p...

Feb 22, 2022
CVE-2021-43833
8.1

This vulnerability allows any authenticated user in eLabFTW to gain access to arbitrary accounts by setting a specially crafted email address. It affe...

Dec 16, 2021
CVE-2021-41265
8.1

CVE-2021-41265 is an authentication bypass vulnerability in Flask-AppBuilder's REST API that allows attackers to craft malicious requests to gain unau...

Dec 9, 2021
CVE-2021-36306
8.1

CVE-2021-36306 is an authentication bypass vulnerability in Dell Networking OS10's RESTCONF API that allows remote unauthenticated attackers to gain u...

Nov 20, 2021
CVE-2021-24647
8.1

This vulnerability in the Registration Forms WordPress plugin allows unauthenticated attackers to log in as any user by knowing their user ID or usern...

Nov 8, 2021
CVE-2021-31520
8.1

CVE-2021-31520 is a session token authentication bypass vulnerability in Trend Micro IM Security that allows remote attackers to guess administrators'...

May 10, 2021
CVE-2021-23923
8.1

This vulnerability allows Windows domain users to bypass authentication in Devolutions Server, potentially gaining unauthorized access. It affects org...

Apr 1, 2021
CVE-2026-0408
8.0

A path traversal vulnerability in NETGEAR WiFi range extenders allows authenticated LAN attackers to access sensitive webproc files containing router ...

Jan 13, 2026
CVE-2026-0407
8.0

This CVE describes an authentication bypass vulnerability in NETGEAR WiFi range extenders that allows attackers on the same network to access the admi...

Jan 13, 2026
CVE-2024-20815
8.0

This vulnerability allows attackers within Bluetooth range to connect to a Samsung device's mobile hotspot without authentication. It affects Samsung ...

Feb 6, 2024
CVE-2023-41089
8.0

This vulnerability allows attackers to impersonate legitimate users by exploiting improper authentication mechanisms. Attackers can use cookie headers...

Oct 19, 2023
CVE-2021-45917
8.0

This vulnerability allows an authenticated attacker on the local network to perform server-side request forgery (SSRF) attacks against other agent com...

Jan 3, 2022
CVE-2021-25910
8.0

CVE-2021-25910 is an improper authentication vulnerability in ZIV AUTOMATION 4CCT-EA6-334126BF devices where the cookie parameter can be manipulated t...

Jan 29, 2021
CVE-2026-0405
7.8

An authentication bypass vulnerability in NETGEAR Orbi routers allows local network users to access the administrative web interface without credentia...

Jan 13, 2026
CVE-2025-43281
7.8

This CVE describes a local privilege escalation vulnerability in macOS where improper authentication allows a local attacker to gain elevated privileg...

Oct 15, 2025
CVE-2025-10672
7.8

This vulnerability in whuan132 AIBattery up to version 1.0.9 allows local attackers to bypass authentication in the AIBatteryHelper component. Attacke...

Sep 18, 2025
CVE-2025-9815
7.8

This vulnerability allows local attackers to bypass authentication in the batteryKid application's privilege helper component on macOS. Attackers can ...

Sep 2, 2025
CVE-2025-41459
7.8

This vulnerability allows local attackers to bypass biometric and PIN authentication in Two App Studio Journey 5.5.6 on iOS through brute-force attack...

Jul 21, 2025
CVE-2024-13088
7.8

An improper authentication vulnerability in QNAP QHora routers allows attackers with local network access to bypass authentication mechanisms and comp...

Jun 6, 2025
CVE-2024-49076
7.8

This vulnerability allows an authenticated attacker to elevate privileges within Windows Virtualization-Based Security (VBS) enclaves, potentially byp...

Dec 12, 2024
CVE-2024-40713
7.8

This vulnerability allows low-privileged users in Veeam Backup & Replication to modify Multi-Factor Authentication settings and bypass MFA protection....

Sep 7, 2024
CVE-2019-6197
7.8

A local privilege escalation vulnerability in Lenovo PC Manager allows attackers to gain elevated system privileges. This affects users running vulner...

Jul 31, 2024
CVE-2023-47304
7.8

This vulnerability allows local attackers with physical access to bypass UART authentication on Vonage Box Telephone Adapter devices. Attackers can re...

Dec 5, 2023
CVE-2022-44569
7.8

This vulnerability allows a locally authenticated attacker with low privileges to bypass authentication mechanisms through insecure inter-process comm...

Nov 3, 2023
CVE-2021-35094
7.8

This vulnerability allows attackers to bypass authentication in Qualcomm Snapdragon chipsets by exploiting improper timeout-based verification in iden...

Jun 14, 2022
CVE-2022-31011
7.8

CVE-2022-31011 is an authentication bypass vulnerability in TiDB 5.3.0 that allows attackers to construct malicious authentication requests to gain un...

May 31, 2022
CVE-2021-36460
7.8

VeryFitPro mobile app versions 3.2.8 and earlier hash passwords locally and transmit those hashes to authenticate with backend APIs. This allows attac...

Apr 25, 2022
CVE-2021-1950
7.8

This vulnerability allows authenticated users to bypass face authentication on affected Qualcomm Snapdragon devices due to improper secure memory clea...

Apr 1, 2022
CVE-2021-4197
7.8

This Linux kernel vulnerability allows a local unprivileged user to write to file handlers in the cgroups subsystem, potentially leading to system cra...

Mar 23, 2022
CVE-2022-24286
7.8

Acer QuickAccess software contains a local privilege escalation vulnerability where unprivileged users can communicate with a system service via an in...

Mar 10, 2022
CVE-2022-0492
7.8

CVE-2022-0492 is a Linux kernel vulnerability in the cgroups v1 release_agent feature that allows local attackers to escalate privileges and escape co...

Mar 3, 2022
CVE-2021-22796
7.8

CVE-2021-22796 is an authentication bypass vulnerability in Schneider Electric's C-Bus Toolkit and C-Gate Server that allows attackers to upload malic...

Feb 11, 2022
CVE-2022-22990
7.8

CVE-2022-22990 is an authentication bypass vulnerability in Western Digital My Cloud devices that allows attackers to bypass limited authentication ch...

Jan 13, 2022
CVE-2021-0096
7.8

This vulnerability allows an authenticated user with local access to potentially escalate privileges on affected Intel NUC systems. It affects users o...

Nov 17, 2021
CVE-2021-41286
7.8

CVE-2021-41286 is an authentication bypass vulnerability in Omikron MultiCash Desktop where password validation occurs client-side. Attackers can mani...

Oct 5, 2021
CVE-2021-30605
7.8

This vulnerability allows attackers to bypass discretionary access controls on Windows systems running vulnerable versions of the ChromeOS Readiness T...

Sep 8, 2021
CVE-2021-27794
7.8

This authentication bypass vulnerability in Brocade Fabric OS allows attackers to log in with empty or invalid passwords via telnet, SSH, and REST int...

Aug 12, 2021
CVE-2021-32579
7.8

This vulnerability allows an unauthenticated attacker with local code execution capability to tamper with the micro-service API in Acronis True Image ...

Aug 5, 2021
CVE-2021-3297
7.8

This vulnerability allows unauthenticated attackers to gain administrator access to Zyxel NBG2105 routers by setting a login cookie value to 1. It aff...

Jan 26, 2021
CVE-2024-57490
7.7

This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffice20 software through a logical flaw, enabling una...

Mar 21, 2025

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 769 CVEs classified as CWE-287, with 341 rated critical and 312 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free