CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

758
Total CVEs
333
Critical
309
High
8.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
66
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Qualcomm 12
3 Huawei 11
4 Microsoft 11
5 Debian 10
6 Dlink 9
7 Cisco 9
8 Dell 9
9 Fedoraproject 8
10 Adobe 8

All Improper Authentication CVEs (758)

CVE-2025-26326
8.8

This vulnerability allows remote attackers to gain complete control of systems running vulnerable NVDA Remote add-ons by guessing weak passwords. The ...

Feb 28, 2025
CVE-2024-0130
8.8

This vulnerability in NVIDIA UFM products allows attackers to bypass authentication by sending malformed requests via the Ethernet management interfac...

Dec 6, 2024
CVE-2023-29117
8.8

CVE-2023-29117 is an authentication bypass vulnerability in Waybox Enel X web management API that allows attackers to gain administrator privileges wi...

Nov 5, 2024
CVE-2023-22650
8.8

CVE-2023-22650 is an authentication bypass vulnerability in Rancher where deleted, disabled, or revoked users from external authentication providers r...

Oct 16, 2024
CVE-2024-45148
8.8

CVE-2024-45148 is an improper authentication vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security features and gain...

Oct 10, 2024
CVE-2024-41929
8.8

This CVE describes an improper authentication vulnerability in TAKENAKA ENGINEERING digital video recorders that allows authenticated remote attackers...

Sep 18, 2024
CVE-2024-45346
8.8

This CVE describes an authentication bypass vulnerability (CWE-287) in Xiaomi systems that allows attackers to bypass authentication mechanisms. The v...

Aug 28, 2024
CVE-2024-39340
8.8

This vulnerability allows attackers to bypass two-factor authentication (2FA) in Securepoint UTM by exploiting improper handling of OTP keys. Attacker...

Jul 12, 2024
CVE-2024-6235
8.8

CVE-2024-6235 is an authentication bypass vulnerability in NetScaler Console that allows unauthenticated attackers to access sensitive information. Th...

Jul 10, 2024
CVE-2024-5201
8.8

CVE-2024-5201 is an authentication bypass vulnerability in OpenText Dimensions RM that allows authenticated users to escalate their privileges to thos...

May 23, 2024
CVE-2024-4129
8.8

An authentication bypass vulnerability in Snow License Manager allows attackers to gain unauthorized access when Active Directory authentication is en...

May 14, 2024
CVE-2024-4303
8.8

This vulnerability allows remote attackers who have obtained valid user credentials to bypass multi-factor authentication (MFA) in the ArmorX Android ...

Apr 29, 2024
CVE-2024-2450
8.8

This vulnerability allows authenticated attackers to take over other user accounts in Mattermost by exploiting a flaw in authentication switching from...

Mar 15, 2024
CVE-2024-0568
8.8

This CVE describes an improper authentication vulnerability in Schneider Electric devices that allows unauthorized tampering of device configuration v...

Feb 14, 2024
CVE-2023-5970
8.8

This vulnerability allows a remote authenticated attacker to bypass multi-factor authentication (MFA) on SonicWall SMA100 SSL-VPN virtual office porta...

Dec 5, 2023
CVE-2022-41678
8.8

This vulnerability allows authenticated users on Jolokia endpoints in Apache ActiveMQ to execute arbitrary code through JMX MBean operations. Attacker...

Nov 28, 2023
CVE-2023-35794
8.8

This vulnerability allows unauthenticated access to the Web SSH terminal in Cassia Access Controller. Attackers can bypass authentication and gain SSH...

Oct 27, 2023
CVE-2023-5246
8.8

This vulnerability allows unauthenticated remote attackers to bypass authentication on SICK Flexi Soft Gateways by capturing and replaying authenticat...

Oct 23, 2023
CVE-2023-37284
8.8

This vulnerability allows an attacker on the same network to bypass authentication on TP-Link Archer C20 routers and execute arbitrary operating syste...

Sep 6, 2023
CVE-2023-33563
8.8

CVE-2023-33563 is an authentication bypass vulnerability in PHP Jabbers Time Slots Booking Calendar 3.3 that allows remote attackers to take over user...

Aug 1, 2023
CVE-2022-34155
8.8

CVE-2022-34155 is an authentication bypass vulnerability in the miniOrange OAuth Single Sign On WordPress plugin. Attackers can bypass authentication ...

Jul 18, 2023
CVE-2023-32523
8.8

Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widgets with authentication bypass vulnerabilities that allow remote attackers to chain with...

Jun 26, 2023
CVE-2023-25946
8.8

This authentication bypass vulnerability in Qrio Lock smart locks allows network-adjacent attackers to intercept communication and perform unauthorize...

May 23, 2023
CVE-2023-0863
8.8

This CVE describes an improper authentication vulnerability in multiple ABB Terra AC wallbox electric vehicle charging station models. Attackers can b...

May 17, 2023
CVE-2022-43620
8.8

This vulnerability allows network-adjacent attackers to bypass authentication on D-Link DIR-1935 routers by exploiting improper HNAP login request han...

Mar 29, 2023
CVE-2023-0228
8.8

CVE-2023-0228 is an improper authentication vulnerability in ABB Symphony Plus S+ Operations that allows attackers to bypass authentication mechanisms...

Mar 2, 2023
CVE-2021-26637
8.8

CVE-2021-26637 allows unauthenticated remote attackers to fully control SiHAS SGW-300, ACM-300, and GCM-300 devices due to missing authentication and ...

Jun 23, 2022
CVE-2021-43999
8.8

This vulnerability in Apache Guacamole allows attackers to impersonate other users when SAML authentication is enabled. It affects Apache Guacamole 1....

Jan 11, 2022
CVE-2021-45379
8.8

CVE-2021-45379 is an authentication bypass vulnerability in Glewlwyd OAuth2/OIDC server where one user can log in as another user without knowing thei...

Dec 30, 2021
CVE-2021-42072
8.8

Barrier versions before 2.4.0 have insufficient client identity verification, allowing attackers to spoof connections to the server. This vulnerabilit...

Nov 8, 2021
CVE-2021-25424
8.8

This vulnerability allows attackers to bypass Bluetooth authentication on Tizen devices, enabling unauthorized access and control without user interac...

Jun 11, 2021
CVE-2021-22155
8.8

This CVE describes an authentication bypass vulnerability in BlackBerry Workspaces Server's SAML authentication component. Attackers can potentially g...

May 13, 2021
CVE-2021-26077
8.8

This vulnerability allows attackers to bypass authentication in Atlassian Connect Spring Boot apps by sending context JWTs to lifecycle endpoints that...

May 10, 2021
CVE-2021-27522
8.8

CVE-2021-27522 is a privilege escalation vulnerability in Learnsite 1.2.5.0 that allows attackers to gain administrator access by manipulating user co...

Apr 8, 2021
CVE-2020-35231
8.8

This vulnerability allows attackers to bypass authentication controls in NETGEAR switches by exploiting flaws in the NSDP protocol implementation. Att...

Mar 10, 2021
CVE-2021-25863
8.8

Open5GS 2.1.3 has a default admin password and listens on all network interfaces, allowing attackers to gain administrative access to the 5G core netw...

Jan 26, 2021
CVE-2020-16222
8.8

This CVE describes an authentication bypass vulnerability in Philips Patient Information Center iX and PerformanceBridge Focal Point medical monitorin...

Sep 11, 2020
CVE-2024-38139
8.7

CVE-2024-38139 is an improper authentication vulnerability in Microsoft Dataverse that allows authenticated attackers to elevate privileges over a net...

Oct 15, 2024
CVE-2021-21329
8.7

This vulnerability allows users with multi-factor authentication (MFA) enabled to bypass the token verification process and log in without a valid sec...

Mar 8, 2021
CVE-2025-66698
8.6

This authentication bypass vulnerability in Semantic machines v5.4.8 allows attackers to access protected API endpoints without valid credentials by s...

Jan 13, 2026
CVE-2025-11192
8.6

This vulnerability in Extreme Networks Fabric Engine (VOSS) allows attackers to gain unauthorized access to network fabric and configuration data when...

Oct 7, 2025
CVE-2025-29906
8.6

CVE-2025-29906 is an authentication bypass vulnerability in Finit's getty implementation that allows unauthenticated users to log in as any user witho...

Apr 29, 2025
CVE-2024-21632
8.6

CVE-2024-21632 is an authentication bypass vulnerability in omniauth-microsoft_graph where the email attribute from Microsoft Graph API responses isn'...

Jan 2, 2024
CVE-2023-51442
8.6

This vulnerability allows attackers to bypass authentication in Navidrome's subsonic endpoint using a JWT signed with a hardcoded key. It affects all ...

Dec 21, 2023
CVE-2022-31083
8.6

Parse Server's Apple Game Center authentication adapter had a certificate validation flaw that allowed attackers to bypass authentication by providing...

Jun 17, 2022
CVE-2022-30034
8.6

CVE-2022-30034 is an OAuth authentication bypass vulnerability in Flower, the web UI for Celery Python RPC framework. This allows attackers to bypass ...

Jun 2, 2022
CVE-2021-21513
8.6

CVE-2021-21513 is an authentication bypass vulnerability in Dell EMC OpenManage Server Administrator (OMSA) that allows remote unauthenticated attacke...

Mar 2, 2021
CVE-2024-25699
8.5

An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows authenticated low-privileged attackers to bypass autho...

Apr 4, 2024
CVE-2023-24852
8.4

This vulnerability allows memory corruption in Qualcomm's Core due to improper secure memory access while loading modem images. Attackers could potent...

Nov 7, 2023
CVE-2022-0916
8.4

This vulnerability in Logitech Options software allows attackers to perform Cross-Site Request Forgery (CSRF) attacks during OAuth 2.0 authentication ...

May 3, 2022

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 758 CVEs classified as CWE-287, with 333 rated critical and 309 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free