CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (745)
CVE-2024-3080 is an authentication bypass vulnerability affecting certain ASUS router models that allows unauthenticated remote attackers to gain admi...
Jun 14, 2024CVE-2024-22441 is an authentication bypass vulnerability in HPE Cray Parallel Application Launch Service (PALS) that allows unauthenticated attackers ...
Jun 13, 2024This CVE describes an improper authentication vulnerability in Apache Submarine Commons Utils where a default hardcoded secret is used if users don't ...
Jun 12, 2024This vulnerability in Northern.tech Mender Enterprise allows attackers to bypass SAML authentication and take over user accounts. It affects organizat...
Jun 3, 2024CVE-2024-29849 is an authentication bypass vulnerability in Veeam Backup Enterprise Manager that allows unauthenticated attackers to log into the web ...
May 22, 2024CVE-2024-3263 allows attackers to easily guess and brute-force passwords in YMS VIS Pro veterinary information systems due to weak credential generati...
May 14, 2024This vulnerability allows remote attackers to bypass authentication on NETGEAR ProSAFE Network Management System installations without requiring any c...
May 3, 2024This vulnerability allows unauthenticated attackers to bypass authentication mechanisms in the Build App Online WordPress plugin, enabling account tak...
Apr 25, 2024This vulnerability allows unauthenticated attackers to bypass authentication mechanisms in the Checkout Mestres WP WordPress plugin, enabling them to ...
Apr 24, 2024This CVE describes an improper authentication vulnerability in multiple NEC Aterm router models that allows remote attackers to execute arbitrary comm...
Mar 28, 2024This CVE describes an improper authentication vulnerability in multiple NEC Aterm router models that allows unauthenticated remote attackers to execut...
Mar 28, 2024This vulnerability allows unauthenticated attackers to access TeslaMate's Grafana dashboard on port 3000 after discovering the instance on port 4000. ...
Mar 27, 2024CVE-2024-1147 is an authentication bypass vulnerability in OpenText PVCS Version Manager that allows attackers to download files without proper authen...
Mar 21, 2024CVE-2024-28255 is an authentication bypass vulnerability in OpenMetadata's JWT filter that allows attackers to access protected endpoints without vali...
Mar 15, 2024This authentication bypass vulnerability in Arcserve Unified Data Protection allows attackers to gain unauthorized access without valid credentials by...
Mar 13, 2024This vulnerability allows remote attackers to bypass authentication and escalate privileges in Newland Nquire 1000 Interactive Kiosk web management po...
Mar 9, 2024This CVE-2024-21899 is an improper authentication vulnerability in QNAP operating systems that allows attackers to bypass authentication mechanisms an...
Mar 8, 2024This CVE describes an authentication bypass vulnerability in Adobe FrameMaker Publishing Server that allows attackers to gain unauthorized access with...
Feb 15, 2024CVE-2024-21410 is a critical elevation of privilege vulnerability in Microsoft Exchange Server that allows attackers to gain unauthorized administrati...
Feb 13, 2024An improper authentication vulnerability in SonicWall SonicOS SSL-VPN allows remote attackers to bypass authentication under specific conditions. This...
Feb 8, 2024CVE-2023-51982 is an authentication bypass vulnerability in CrateDB's Admin UI component. Attackers can bypass password authentication by setting the ...
Jan 30, 2024This CVE describes an NGINX authentication bypass vulnerability in GL.iNet router firmware that allows unauthenticated attackers to execute arbitrary ...
Jan 12, 2024CVE-2022-34267 is an authentication bypass vulnerability in RWS WorldServer that allows unauthenticated attackers to upload and execute arbitrary Java...
Dec 25, 2023This vulnerability allows attackers to bypass authentication controls in Jamf Pro Server, potentially gaining unauthorized access to administrative fu...
Dec 25, 2023This vulnerability allows remote blocked users to bypass authentication in ProLion CryptoSpike when using LDAP/Active Directory. Attackers can obtain ...
Dec 6, 2023This vulnerability allows authentication bypass on Netwrix Usercube deployment endpoints in misconfigured on-premises installations, leading to privil...
Nov 28, 2023CVE-2023-48312 is a privilege escalation vulnerability in capsule-proxy that allows unauthenticated users to bypass token review mechanisms and intera...
Nov 24, 2023The UserPro WordPress plugin up to version 5.1.1 has an authentication bypass vulnerability in its Facebook login functionality. Unauthenticated attac...
Nov 22, 2023This vulnerability allows unauthenticated attackers to access, modify, or delete any file in ownCloud if they know a victim's username and that victim...
Nov 21, 2023CVE-2023-29155 allows unauthenticated attackers to gain root/admin access to INEA ME RTU devices by exploiting missing authentication requirements. Th...
Nov 20, 2023CVE-2023-44324 is an improper authentication vulnerability in Adobe FrameMaker Publishing Server that allows unauthenticated attackers to bypass secur...
Nov 17, 2023This vulnerability allows remote attackers to execute arbitrary code on affected Tor IoT devices by sending specially crafted MQTT requests. It affect...
Nov 15, 2023This vulnerability allows remote attackers to bypass authentication and gain unauthorized privileges in TheHive and Cortex security platforms when usi...
Sep 11, 2023This vulnerability allows attackers to bypass authentication on MoFi Network MOFI4500-4GXeLTE-V2 routers and execute arbitrary code via crafted HTTP r...
Sep 8, 2023This vulnerability in Devolutions Remote Desktop Manager allows users to bypass permission checks when using remote tools and macros, enabling unautho...
Aug 21, 2023This vulnerability allows attackers to bypass authentication in Konga v0.14.9 by crafting malicious JWT tokens. Attackers can gain unauthorized admini...
Aug 16, 2023CVE-2023-35082 is an authentication bypass vulnerability in Ivanti EPMM (formerly MobileIron Core) that allows remote unauthenticated attackers to acc...
Aug 15, 2023CVE-2023-35078 is an authentication bypass vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that allows unauthenticated attackers to access admi...
Jul 25, 2023This vulnerability allows attackers to bypass authentication on GeoVision GV-ADR2701 security cameras by manipulating login responses. Affected organi...
Jul 19, 2023CVE-2023-37266 allows unauthenticated attackers to bypass authentication in CasaOS by crafting arbitrary JWTs, gaining root access to execute arbitrar...
Jul 17, 2023This vulnerability allows unauthenticated attackers to bypass authentication in PowerShield SNMP Web Pro 1.1 by directly accessing CGI scripts without...
Jul 12, 2023CVE-2023-32222 is an authentication bypass vulnerability in D-Link DSL-G256DG routers that allows attackers to access the web management interface wit...
Jun 28, 2023Apache Accumulo 2.1.0 has an improper authentication vulnerability where invalid credentials may be accepted, allowing unauthorized access. This affec...
Jun 21, 2023This CVE describes an improper authentication vulnerability in KB-AHR and KB-IRIP series devices that allows attackers to bypass authentication mechan...
Jun 13, 2023This vulnerability allows attackers to bypass authentication on Planet Technologies WDRT-1800AX routers by manipulating the LoginStatus cookie, enabli...
Jun 7, 2023An improper authentication vulnerability in T&D Corporation and ESPEC MIC CORP. data logger products allows remote unauthenticated attackers to log in...
May 23, 2023This vulnerability allows unauthenticated attackers to bypass authentication in WordPress sites using the RegistrationMagic plugin. By exploiting insu...
May 16, 2023This vulnerability allows unauthenticated attackers to reset passwords for any user account, including administrators, in WordPress sites using the Es...
May 12, 2023This vulnerability in Shimo VPN Client for macOS allows attackers to bypass authentication by reusing process IDs (PID re-use) in the helper tool. Att...
May 4, 2023This vulnerability allows unauthenticated attackers to gain administrative privileges on WordPress sites running the Easy Digital Downloads plugin. At...
May 2, 2023About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 745 CVEs classified as CWE-287, with 329 rated critical and 300 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free