CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (758)
This vulnerability allows remote attackers to gain complete control of systems running vulnerable NVDA Remote add-ons by guessing weak passwords. The ...
Feb 28, 2025This vulnerability in NVIDIA UFM products allows attackers to bypass authentication by sending malformed requests via the Ethernet management interfac...
Dec 6, 2024CVE-2023-29117 is an authentication bypass vulnerability in Waybox Enel X web management API that allows attackers to gain administrator privileges wi...
Nov 5, 2024CVE-2023-22650 is an authentication bypass vulnerability in Rancher where deleted, disabled, or revoked users from external authentication providers r...
Oct 16, 2024CVE-2024-45148 is an improper authentication vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security features and gain...
Oct 10, 2024This CVE describes an improper authentication vulnerability in TAKENAKA ENGINEERING digital video recorders that allows authenticated remote attackers...
Sep 18, 2024This CVE describes an authentication bypass vulnerability (CWE-287) in Xiaomi systems that allows attackers to bypass authentication mechanisms. The v...
Aug 28, 2024This vulnerability allows attackers to bypass two-factor authentication (2FA) in Securepoint UTM by exploiting improper handling of OTP keys. Attacker...
Jul 12, 2024CVE-2024-6235 is an authentication bypass vulnerability in NetScaler Console that allows unauthenticated attackers to access sensitive information. Th...
Jul 10, 2024CVE-2024-5201 is an authentication bypass vulnerability in OpenText Dimensions RM that allows authenticated users to escalate their privileges to thos...
May 23, 2024An authentication bypass vulnerability in Snow License Manager allows attackers to gain unauthorized access when Active Directory authentication is en...
May 14, 2024This vulnerability allows remote attackers who have obtained valid user credentials to bypass multi-factor authentication (MFA) in the ArmorX Android ...
Apr 29, 2024This vulnerability allows authenticated attackers to take over other user accounts in Mattermost by exploiting a flaw in authentication switching from...
Mar 15, 2024This CVE describes an improper authentication vulnerability in Schneider Electric devices that allows unauthorized tampering of device configuration v...
Feb 14, 2024This vulnerability allows a remote authenticated attacker to bypass multi-factor authentication (MFA) on SonicWall SMA100 SSL-VPN virtual office porta...
Dec 5, 2023This vulnerability allows authenticated users on Jolokia endpoints in Apache ActiveMQ to execute arbitrary code through JMX MBean operations. Attacker...
Nov 28, 2023This vulnerability allows unauthenticated access to the Web SSH terminal in Cassia Access Controller. Attackers can bypass authentication and gain SSH...
Oct 27, 2023This vulnerability allows unauthenticated remote attackers to bypass authentication on SICK Flexi Soft Gateways by capturing and replaying authenticat...
Oct 23, 2023This vulnerability allows an attacker on the same network to bypass authentication on TP-Link Archer C20 routers and execute arbitrary operating syste...
Sep 6, 2023CVE-2023-33563 is an authentication bypass vulnerability in PHP Jabbers Time Slots Booking Calendar 3.3 that allows remote attackers to take over user...
Aug 1, 2023CVE-2022-34155 is an authentication bypass vulnerability in the miniOrange OAuth Single Sign On WordPress plugin. Attackers can bypass authentication ...
Jul 18, 2023Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widgets with authentication bypass vulnerabilities that allow remote attackers to chain with...
Jun 26, 2023This authentication bypass vulnerability in Qrio Lock smart locks allows network-adjacent attackers to intercept communication and perform unauthorize...
May 23, 2023This CVE describes an improper authentication vulnerability in multiple ABB Terra AC wallbox electric vehicle charging station models. Attackers can b...
May 17, 2023This vulnerability allows network-adjacent attackers to bypass authentication on D-Link DIR-1935 routers by exploiting improper HNAP login request han...
Mar 29, 2023CVE-2023-0228 is an improper authentication vulnerability in ABB Symphony Plus S+ Operations that allows attackers to bypass authentication mechanisms...
Mar 2, 2023CVE-2021-26637 allows unauthenticated remote attackers to fully control SiHAS SGW-300, ACM-300, and GCM-300 devices due to missing authentication and ...
Jun 23, 2022This vulnerability in Apache Guacamole allows attackers to impersonate other users when SAML authentication is enabled. It affects Apache Guacamole 1....
Jan 11, 2022CVE-2021-45379 is an authentication bypass vulnerability in Glewlwyd OAuth2/OIDC server where one user can log in as another user without knowing thei...
Dec 30, 2021Barrier versions before 2.4.0 have insufficient client identity verification, allowing attackers to spoof connections to the server. This vulnerabilit...
Nov 8, 2021This vulnerability allows attackers to bypass Bluetooth authentication on Tizen devices, enabling unauthorized access and control without user interac...
Jun 11, 2021This CVE describes an authentication bypass vulnerability in BlackBerry Workspaces Server's SAML authentication component. Attackers can potentially g...
May 13, 2021This vulnerability allows attackers to bypass authentication in Atlassian Connect Spring Boot apps by sending context JWTs to lifecycle endpoints that...
May 10, 2021CVE-2021-27522 is a privilege escalation vulnerability in Learnsite 1.2.5.0 that allows attackers to gain administrator access by manipulating user co...
Apr 8, 2021This vulnerability allows attackers to bypass authentication controls in NETGEAR switches by exploiting flaws in the NSDP protocol implementation. Att...
Mar 10, 2021Open5GS 2.1.3 has a default admin password and listens on all network interfaces, allowing attackers to gain administrative access to the 5G core netw...
Jan 26, 2021This CVE describes an authentication bypass vulnerability in Philips Patient Information Center iX and PerformanceBridge Focal Point medical monitorin...
Sep 11, 2020CVE-2024-38139 is an improper authentication vulnerability in Microsoft Dataverse that allows authenticated attackers to elevate privileges over a net...
Oct 15, 2024This vulnerability allows users with multi-factor authentication (MFA) enabled to bypass the token verification process and log in without a valid sec...
Mar 8, 2021This authentication bypass vulnerability in Semantic machines v5.4.8 allows attackers to access protected API endpoints without valid credentials by s...
Jan 13, 2026This vulnerability in Extreme Networks Fabric Engine (VOSS) allows attackers to gain unauthorized access to network fabric and configuration data when...
Oct 7, 2025CVE-2025-29906 is an authentication bypass vulnerability in Finit's getty implementation that allows unauthenticated users to log in as any user witho...
Apr 29, 2025CVE-2024-21632 is an authentication bypass vulnerability in omniauth-microsoft_graph where the email attribute from Microsoft Graph API responses isn'...
Jan 2, 2024This vulnerability allows attackers to bypass authentication in Navidrome's subsonic endpoint using a JWT signed with a hardcoded key. It affects all ...
Dec 21, 2023Parse Server's Apple Game Center authentication adapter had a certificate validation flaw that allowed attackers to bypass authentication by providing...
Jun 17, 2022CVE-2022-30034 is an OAuth authentication bypass vulnerability in Flower, the web UI for Celery Python RPC framework. This allows attackers to bypass ...
Jun 2, 2022CVE-2021-21513 is an authentication bypass vulnerability in Dell EMC OpenManage Server Administrator (OMSA) that allows remote unauthenticated attacke...
Mar 2, 2021An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows authenticated low-privileged attackers to bypass autho...
Apr 4, 2024This vulnerability allows memory corruption in Qualcomm's Core due to improper secure memory access while loading modem images. Attackers could potent...
Nov 7, 2023This vulnerability in Logitech Options software allows attackers to perform Cross-Site Request Forgery (CSRF) attacks during OAuth 2.0 authentication ...
May 3, 2022About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 758 CVEs classified as CWE-287, with 333 rated critical and 309 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free