CWE-347: CWE-347
Yearly Trend
Top Affected Vendors
All CWE-347 CVEs (181)
This vulnerability allows unauthenticated attackers to bypass signature verification in PKCS7 objects with Authenticated Attributes in AWS-LC. It affe...
Mar 2, 2026A signature malleability vulnerability in sm-crypto's SM2 signature verification allows attackers to create new valid signatures from existing ones. T...
Jan 22, 2026A signature forgery vulnerability in sm-crypto's SM2 implementation allows attackers to create valid signatures for arbitrary public keys. This affect...
Jan 22, 2026This vulnerability in Windows Admin Center allows an authorized attacker to bypass cryptographic signature verification, enabling local privilege esca...
Jan 13, 2026This vulnerability allows attackers to bypass JSON Web Signature verification in auth0/node-jws when using HMAC algorithms. Applications are affected ...
Dec 4, 2025This vulnerability allows an authenticated user with local access to escalate privileges on Windows systems running the Zoom Workplace VDI Client. The...
Nov 13, 2025A local privilege escalation vulnerability in FortiClient for macOS allows authenticated local users to gain elevated privileges by exploiting imprope...
Oct 14, 2025A Signature Wrapping vulnerability in samlify allows attackers to forge SAML authentication responses and impersonate any user. This affects all appli...
May 19, 2025Suricata's default AF_PACKET defrag configuration causes packet truncation when reassembling fragmented packets, leading to incomplete network traffic...
Apr 10, 2025CVE-2025-24043 is a cryptographic signature verification vulnerability in .NET that allows authenticated attackers to execute arbitrary code remotely....
Mar 11, 2025This vulnerability allows attackers to forge JWT tokens by exploiting algorithm confusion in lepture Authlib. When jwt.decode() is called without spec...
Jun 9, 2024A vulnerability in GnuTLS causes Cockpit to reject certificate chains with distributed trust when using cockpit-certificate-ensure, allowing unauthent...
Jan 16, 2024This vulnerability in free5GC UDM allows an invalid curve attack when using Go versions before 1.19. An attacker can send arbitrary SUCIs (Subscriptio...
Oct 23, 2023CVE-2022-24771 is a cryptographic vulnerability in node-forge that allows signature forgery when using RSA PKCS#1 v1.5 with low public exponents. Atta...
Mar 18, 2022This vulnerability allows an attacker to create a digitally signed LibreOffice document that appears valid but actually uses a different key for verif...
Feb 24, 2022CVE-2021-44878 is an authentication bypass vulnerability in pac4j OpenID Connect implementation. It allows attackers to forge unsigned ID tokens using...
Jan 6, 2022CVE-2021-41832 is a signature validation bypass vulnerability in Apache OpenOffice that allows attackers to manipulate documents to appear as if they ...
Oct 11, 2021This vulnerability allows malicious applications to bypass code signature validation checks, potentially circumventing macOS and iOS privacy preferenc...
Sep 8, 2021CVE-2021-28091 is a signature verification bypass vulnerability in Lasso, an open-source library for SAML authentication. Attackers can forge SAML ass...
Jun 4, 2021This vulnerability in libdnf allows attackers to execute arbitrary code by modifying RPM package headers and tricking users into installing them. It a...
May 19, 2021This vulnerability in Grassroot Platform allows attackers to forge valid JSON Web Tokens by exploiting improper signature verification during JWT refr...
Apr 19, 2021This vulnerability in Union Pay Android apps allows attackers to bypass payment authentication by generating fraudulent cryptographic signatures using...
Apr 6, 2021This vulnerability in phpseclib allows attackers to forge RSA PKCS#1 v1.5 signatures, potentially bypassing authentication or authorization checks. It...
Apr 6, 2021CVE-2024-26194 is a Secure Boot security feature bypass vulnerability that allows attackers to circumvent Secure Boot protections on affected systems....
Apr 9, 2024IBM ApplinX 11.1 has a privilege escalation vulnerability where attackers can craft or modify JWT tokens to impersonate users or gain elevated privile...
Jan 20, 2026This vulnerability in some Honor products allows attackers to forge system files and overwrite legitimate ones due to improper signature verification....
Dec 29, 2023This vulnerability in some Honor products allows attackers to forge system files and overwrite legitimate ones due to improper signature verification....
Dec 29, 2023This CVE describes a DLL preloading vulnerability in Lenovo Driver Management software that could allow local attackers to escalate privileges by plac...
Aug 17, 2021This vulnerability in Supermicro BMC firmware allows attackers to bypass validation checks and install malicious firmware images on affected servers. ...
Jan 16, 2026This vulnerability in Supermicro BMC firmware allows attackers to bypass validation checks and install malicious firmware images on affected systems. ...
Sep 19, 2025A vulnerability in Supermicro BMC firmware validation logic allows attackers to install malicious firmware images on affected systems. This affects Su...
Sep 19, 2025This vulnerability allows a local administrator to bypass CPU microcode signature verification on AMD systems with SEV-SNP, potentially compromising t...
Feb 3, 2025This CVE describes an improper cryptographic signature verification vulnerability in Schneider Electric's Data Center Expert software. Attackers can m...
Oct 11, 2024This vulnerability allows attackers to upload malicious firmware to affected Realtek rtl819x devices by exploiting a flaw in the boa formUpload functi...
Jul 8, 2024This vulnerability allows authenticated attackers to upload malicious firmware to Motorola MBTS Site Controllers due to missing cryptographic signatur...
Aug 29, 2023This vulnerability allows attackers to bypass cryptographic signature verification in Dell PowerStore storage systems. By tricking a high-privileged u...
Jun 22, 2023AVEVA System Platform versions 2017 through 2020 R2 P01 fail to properly verify cryptographic signatures for data, allowing attackers to bypass authen...
Apr 4, 2022A signature management vulnerability in Huawei iManager NetEco products allows attackers to forge signatures and bypass signature verification during ...
Oct 27, 2021This vulnerability allows remote attackers to execute arbitrary code on affected Schneider Electric homeLYnk and spaceLYnk devices by bypassing crypto...
May 26, 2021This vulnerability allows authenticated local attackers on Windows systems with Cisco Secure Client and Secure Firewall Posture Engine installed to pe...
Mar 5, 2025A library injection vulnerability in Microsoft Word 16.83 for macOS allows malicious applications to inject specially crafted libraries, leveraging Wo...
Dec 18, 2024A library injection vulnerability in Microsoft Outlook for macOS allows malicious applications to inject code and leverage Outlook's permissions, pote...
Dec 18, 2024A library injection vulnerability in Microsoft PowerPoint 16.83 for macOS allows malicious applications to inject specially crafted libraries, leverag...
Dec 18, 2024A library injection vulnerability in Microsoft Teams for macOS allows malicious applications to inject code into the WebView.app helper process. This ...
Dec 18, 2024This vulnerability allows local attackers to bypass cryptographic signature verification in Samsung SmartSwitch, enabling installation of malicious ap...
Dec 3, 2024This vulnerability allows authenticated local attackers with privilege level 15 or unauthenticated attackers with physical access to execute persisten...
May 7, 2025This vulnerability allows attackers who gain root-level access to load unsigned kernel modules, enabling kernel-level code execution and complete syst...
Feb 15, 2026This vulnerability allows authenticated local attackers with root-system privileges on Cisco IOS XR devices to bypass Secure Boot integrity checks and...
Mar 12, 2025This vulnerability in Zoom Workplace VDI App for Windows allows authenticated local users to escalate privileges due to insufficient verification of d...
May 15, 2024This vulnerability in Foxit PDF software allows attackers to create malicious PDFs that use JavaScript to modify annotation content and clear modifica...
Dec 11, 2025About CWE-347 (CWE-347)
Our database tracks 181 CVEs classified as CWE-347, with 54 rated critical and 91 rated high severity. The average CVSS score for CWE-347 vulnerabilities is 7.9.
External reference: View CWE-347 on MITRE CWE →
Monitor CWE-347 Vulnerabilities
Get alerted when new CWE-347 CVEs affect your infrastructure.
Start Monitoring Free