CWE-347: CWE-347

182
Total CVEs
54
Critical
92
High
7.9
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
21
2025
51
2024
42
2023
21
2022
14

Top Affected Vendors

1 Microsoft 10
2 Fedoraproject 8
3 Debian 6
4 Dell 5
5 Apple 5
6 Onelogin 4
7 Cisco 4
8 Zoom 4
9 Zscaler 4
10 Github 3

All CWE-347 CVEs (182)

CVE-2025-55311
6.5

This vulnerability in Foxit PDF software allows attackers to create malicious PDFs that use JavaScript to modify annotation content and clear modifica...

Dec 11, 2025
CVE-2024-23460
6.4

This vulnerability allows local attackers to execute arbitrary code on macOS systems by exploiting the Zscaler Updater's failure to validate digital s...

Aug 6, 2024
CVE-2025-23364
6.2

This vulnerability in TIA Administrator allows attackers to bypass code signing certificate validation during installations, potentially enabling arbi...

Jul 8, 2025
CVE-2025-20248
6.0

This vulnerability allows authenticated local attackers with root-system privileges to bypass Cisco IOS XR Software image signature verification and l...

Sep 10, 2025
CVE-2026-23992
5.9

This vulnerability in go-tuf allows a compromised or misconfigured TUF repository to set signature verification thresholds to zero, effectively disabl...

Jan 22, 2026
CVE-2025-68972
5.9

This GnuPG vulnerability allows attackers to append unauthorized content to signed messages while still passing signature verification. The attack exp...

Dec 27, 2025
CVE-2024-8036
5.9

This vulnerability in ABB systems allows attackers to send specially crafted firmware or configuration files to system nodes, potentially causing deni...

Oct 25, 2024
CVE-2025-15469
5.5

The OpenSSL 'dgst' command-line tool silently truncates files larger than 16MB when using one-shot signing algorithms (Ed25519, Ed448, ML-DSA variants...

Jan 27, 2026
CVE-2025-43521
5.5

A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...

Dec 12, 2025
CVE-2025-43390
5.5

A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...

Nov 4, 2025
CVE-2025-43185
5.5

This CVE describes a code-signing downgrade vulnerability in macOS that could allow malicious applications to bypass security restrictions and access ...

Jul 30, 2025
CVE-2025-2866
5.5

A cryptographic signature verification flaw in LibreOffice allows attackers to spoof PDF signatures by making invalid signatures appear valid. This af...

Apr 27, 2025
CVE-2024-53267
5.5

This vulnerability in sigstore-java allows attackers to present a validly-signed but mismatched bundle that appears to be logged in a transparency log...

Nov 26, 2024
CVE-2024-37886
5.4

CVE-2024-37886 is a signature verification bypass vulnerability in Nextcloud's user_oidc app that allows attackers to potentially forge OpenID Connect...

Jun 14, 2024
CVE-2026-24850
5.3

This vulnerability in the ML-DSA Rust crate allows attackers to forge digital signatures by exploiting a validation flaw where duplicate hint indices ...

Jan 28, 2026
CVE-2025-68925
5.3

Jervis versions before 2.2 fail to validate JWT algorithm headers, allowing attackers to forge tokens using weaker algorithms like 'none' or HMAC. Thi...

Jan 13, 2026
CVE-2025-59803
5.3

Foxit PDF Editor and Reader versions before 2025.2.1 contain a signature spoofing vulnerability where attackers can embed triggers (like JavaScript) i...

Dec 11, 2025
CVE-2025-55229
5.3

This vulnerability allows attackers to spoof digital certificates in Windows systems by exploiting improper cryptographic signature verification. Atta...

Aug 21, 2025
CVE-2025-24015
5.3

This vulnerability in Deno runtime versions 1.46.0 through 2.1.6 fails to validate AES-GCM authentication tags, allowing tampered ciphertexts to go un...

Jun 3, 2025
CVE-2024-49394
5.3

This vulnerability in mutt and neomutt email clients allows attackers to reuse signed but unencrypted email messages by manipulating the In-Reply-To h...

Nov 12, 2024
CVE-2024-41258
5.3

This vulnerability in filestash v0.4 disables SSH host key verification, allowing man-in-the-middle attackers to intercept and potentially steal sensi...

Jul 31, 2024
CVE-2024-41254
5.3

This vulnerability in litestream v0.3.13 disables SSH host key verification, allowing man-in-the-middle attackers to intercept and potentially modify ...

Jul 31, 2024
CVE-2024-36277
5.3

This vulnerability in the FreeFrom nostr client allows attackers to inject malicious event data with invalid cryptographic signatures that the app can...

Jun 17, 2024
CVE-2024-21988
5.3

This vulnerability in NetApp StorageGRID allows attackers to potentially intercept and decrypt SSH communications through man-in-the-middle attacks. I...

Jun 14, 2024
CVE-2020-16922
5.3

This Windows vulnerability allows attackers to bypass digital signature validation, enabling them to load malicious files that appear legitimate. It a...

Oct 16, 2020
CVE-2025-47827
KEV 4.6

This vulnerability allows attackers to bypass Secure Boot protection in IGEL OS by exploiting improper cryptographic signature verification in the ige...

Jun 5, 2025
CVE-2025-43903
4.3

This vulnerability in Poppler's PDF processing library allows attackers to forge digital signatures on PDF documents by bypassing signature verificati...

Apr 18, 2025
CVE-2025-43522
3.3

A code-signing downgrade vulnerability in Intel-based Mac computers allows malicious apps to bypass security restrictions and access sensitive user da...

Dec 12, 2025
CVE-2025-64786
3.3

Acrobat Reader has an improper cryptographic signature verification vulnerability that allows attackers to bypass security features and gain limited u...

Dec 9, 2025
CVE-2025-64787
3.3

This CVE describes an Improper Verification of Cryptographic Signature vulnerability in Adobe Acrobat Reader that allows attackers to bypass cryptogra...

Dec 9, 2025
CVE-2026-0750
N/A

This vulnerability allows attackers to bypass authentication in Drupal Commerce Paybox payment processing module by exploiting improper cryptographic ...

Jan 28, 2026
CVE-2026-24807
N/A

This vulnerability allows attackers to bypass cryptographic signature verification in the quick-media library's SVG processing module. Attackers could...

Jan 27, 2026

About CWE-347 (CWE-347)

Our database tracks 182 CVEs classified as CWE-347, with 54 rated critical and 92 rated high severity. The average CVSS score for CWE-347 vulnerabilities is 7.9.

External reference: View CWE-347 on MITRE CWE →

Monitor CWE-347 Vulnerabilities

Get alerted when new CWE-347 CVEs affect your infrastructure.

Start Monitoring Free