CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (769)
Dell PowerProtect Data Manager DM5500 appliances running version 5.14.0.0 and earlier contain an improper authentication vulnerability (CWE-287). Remo...
Dec 4, 2023This vulnerability allows authentication bypass in PingFederate's Identifier First Adapter when configured in a specific, non-recommended way. Attacke...
Oct 25, 2023This vulnerability in Teltonika's Remote Management System allows attackers who obtain a device's serial number and MAC address to authenticate as tha...
May 22, 2023This vulnerability allows unauthenticated attackers to bypass authentication in the OTP Login Woocommerce & Gravity Forms WordPress plugin by obtainin...
May 17, 2023This vulnerability in Apache OpenMeetings allows attackers with access to certain private information to impersonate other users. It affects Apache Op...
May 12, 2023This vulnerability in Nexx Smart Home devices allows any user to register an already registered alarm or associated device using only the device's MAC...
Apr 4, 2023CVE-2022-42951 is an authentication bypass vulnerability in Couchbase Server that allows attackers to connect to the cluster manager using default cre...
Feb 6, 2023This CVE describes an authentication bypass vulnerability in L2Blocker network security devices. An adjacent attacker can bypass login authentication ...
Jun 27, 2022This vulnerability allows attackers to bypass DUO multi-factor authentication in Splunk Enterprise, enabling unauthorized access to protected Splunk i...
May 6, 2022This vulnerability allows remote unauthenticated attackers to bypass authentication on affected Mitsubishi Electric PLCs by replaying eavesdropped pas...
Apr 1, 2022Wiki.js versions before 2.5.274 contain an improper authentication vulnerability (CWE-287) where authenticated users with write access to restricted p...
Feb 22, 2022This vulnerability allows any authenticated user in eLabFTW to gain access to arbitrary accounts by setting a specially crafted email address. It affe...
Dec 16, 2021CVE-2021-41265 is an authentication bypass vulnerability in Flask-AppBuilder's REST API that allows attackers to craft malicious requests to gain unau...
Dec 9, 2021CVE-2021-36306 is an authentication bypass vulnerability in Dell Networking OS10's RESTCONF API that allows remote unauthenticated attackers to gain u...
Nov 20, 2021This vulnerability in the Registration Forms WordPress plugin allows unauthenticated attackers to log in as any user by knowing their user ID or usern...
Nov 8, 2021CVE-2021-31520 is a session token authentication bypass vulnerability in Trend Micro IM Security that allows remote attackers to guess administrators'...
May 10, 2021This vulnerability allows Windows domain users to bypass authentication in Devolutions Server, potentially gaining unauthorized access. It affects org...
Apr 1, 2021A path traversal vulnerability in NETGEAR WiFi range extenders allows authenticated LAN attackers to access sensitive webproc files containing router ...
Jan 13, 2026This CVE describes an authentication bypass vulnerability in NETGEAR WiFi range extenders that allows attackers on the same network to access the admi...
Jan 13, 2026This vulnerability allows attackers within Bluetooth range to connect to a Samsung device's mobile hotspot without authentication. It affects Samsung ...
Feb 6, 2024This vulnerability allows attackers to impersonate legitimate users by exploiting improper authentication mechanisms. Attackers can use cookie headers...
Oct 19, 2023This vulnerability allows an authenticated attacker on the local network to perform server-side request forgery (SSRF) attacks against other agent com...
Jan 3, 2022CVE-2021-25910 is an improper authentication vulnerability in ZIV AUTOMATION 4CCT-EA6-334126BF devices where the cookie parameter can be manipulated t...
Jan 29, 2021An authentication bypass vulnerability in NETGEAR Orbi routers allows local network users to access the administrative web interface without credentia...
Jan 13, 2026This CVE describes a local privilege escalation vulnerability in macOS where improper authentication allows a local attacker to gain elevated privileg...
Oct 15, 2025This vulnerability in whuan132 AIBattery up to version 1.0.9 allows local attackers to bypass authentication in the AIBatteryHelper component. Attacke...
Sep 18, 2025This vulnerability allows local attackers to bypass authentication in the batteryKid application's privilege helper component on macOS. Attackers can ...
Sep 2, 2025This vulnerability allows local attackers to bypass biometric and PIN authentication in Two App Studio Journey 5.5.6 on iOS through brute-force attack...
Jul 21, 2025An improper authentication vulnerability in QNAP QHora routers allows attackers with local network access to bypass authentication mechanisms and comp...
Jun 6, 2025This vulnerability allows an authenticated attacker to elevate privileges within Windows Virtualization-Based Security (VBS) enclaves, potentially byp...
Dec 12, 2024This vulnerability allows low-privileged users in Veeam Backup & Replication to modify Multi-Factor Authentication settings and bypass MFA protection....
Sep 7, 2024A local privilege escalation vulnerability in Lenovo PC Manager allows attackers to gain elevated system privileges. This affects users running vulner...
Jul 31, 2024This vulnerability allows local attackers with physical access to bypass UART authentication on Vonage Box Telephone Adapter devices. Attackers can re...
Dec 5, 2023This vulnerability allows a locally authenticated attacker with low privileges to bypass authentication mechanisms through insecure inter-process comm...
Nov 3, 2023This vulnerability allows attackers to bypass authentication in Qualcomm Snapdragon chipsets by exploiting improper timeout-based verification in iden...
Jun 14, 2022CVE-2022-31011 is an authentication bypass vulnerability in TiDB 5.3.0 that allows attackers to construct malicious authentication requests to gain un...
May 31, 2022VeryFitPro mobile app versions 3.2.8 and earlier hash passwords locally and transmit those hashes to authenticate with backend APIs. This allows attac...
Apr 25, 2022This vulnerability allows authenticated users to bypass face authentication on affected Qualcomm Snapdragon devices due to improper secure memory clea...
Apr 1, 2022This Linux kernel vulnerability allows a local unprivileged user to write to file handlers in the cgroups subsystem, potentially leading to system cra...
Mar 23, 2022Acer QuickAccess software contains a local privilege escalation vulnerability where unprivileged users can communicate with a system service via an in...
Mar 10, 2022CVE-2022-0492 is a Linux kernel vulnerability in the cgroups v1 release_agent feature that allows local attackers to escalate privileges and escape co...
Mar 3, 2022CVE-2021-22796 is an authentication bypass vulnerability in Schneider Electric's C-Bus Toolkit and C-Gate Server that allows attackers to upload malic...
Feb 11, 2022CVE-2022-22990 is an authentication bypass vulnerability in Western Digital My Cloud devices that allows attackers to bypass limited authentication ch...
Jan 13, 2022This vulnerability allows an authenticated user with local access to potentially escalate privileges on affected Intel NUC systems. It affects users o...
Nov 17, 2021CVE-2021-41286 is an authentication bypass vulnerability in Omikron MultiCash Desktop where password validation occurs client-side. Attackers can mani...
Oct 5, 2021This vulnerability allows attackers to bypass discretionary access controls on Windows systems running vulnerable versions of the ChromeOS Readiness T...
Sep 8, 2021This authentication bypass vulnerability in Brocade Fabric OS allows attackers to log in with empty or invalid passwords via telnet, SSH, and REST int...
Aug 12, 2021This vulnerability allows an unauthenticated attacker with local code execution capability to tamper with the micro-service API in Acronis True Image ...
Aug 5, 2021This vulnerability allows unauthenticated attackers to gain administrator access to Zyxel NBG2105 routers by setting a login cookie value to 1. It aff...
Jan 26, 2021This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffice20 software through a logical flaw, enabling una...
Mar 21, 2025About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 769 CVEs classified as CWE-287, with 341 rated critical and 312 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free