CWE-354: CWE-354

35
Total CVEs
4
Critical
21
High
7.3
Avg CVSS

Yearly Trend

2026
2
2025
8
2024
10
2023
3
2022
7

Top Affected Vendors

1 Huawei 3
2 Google 2
3 Zoom 2
4 Sonicwall 1
5 Sharp 1
6 Frrouting 1
7 Fortinet 1
8 Litespeedtech 1
9 F5 1
10 Dieboldnixdorf 1

All CWE-354 CVEs (35)

CVE-2025-11543
9.8

This vulnerability allows attackers to bypass integrity checks and install unauthorized firmware on Sharp Display Solutions projectors. Attackers coul...

Dec 22, 2025
CVE-2024-25678
9.8

This vulnerability in LiteSpeed QUIC (LSQUIC) Library involves mishandled DCID (Destination Connection ID) validation, allowing attackers to potential...

Feb 9, 2024
CVE-2025-54887
9.1

This vulnerability in the Ruby JWE library allows attackers to brute-force authentication tags in encrypted JWEs, potentially leading to loss of confi...

Aug 8, 2025
CVE-2024-3596
9.0

CVE-2024-3596 allows a local attacker to forge RADIUS protocol responses by exploiting MD5 collisions, enabling them to modify authentication outcomes...

Jul 9, 2024
CVE-2020-14120
8.8

This vulnerability in some Xiaomi devices allows attackers to achieve privilege escalation by exploiting insufficient parameter validation in third-pa...

Apr 21, 2022
CVE-2022-25946
8.7

This vulnerability allows authenticated administrators on F5 BIG-IP systems running in Appliance mode to bypass security restrictions due to a missing...

May 5, 2022
CVE-2023-28386
8.6

This vulnerability allows attackers to upload malicious firmware to Snap One OvrC Pro devices due to insufficient signature validation. Only MD5 hash ...

May 22, 2023
CVE-2024-3727
8.3

This vulnerability in the containers/image library allows attackers to trigger authenticated registry accesses on behalf of victims, potentially leadi...

May 14, 2024
CVE-2024-52550
8.0

This vulnerability in Jenkins Pipeline: Groovy Plugin allows attackers with Item/Build permission to rebuild previous builds using unapproved Jenkinsf...

Nov 13, 2024
CVE-2022-29173
8.0

This vulnerability in go-tuf allows attackers to perform rollback attacks, causing clients to install older, potentially vulnerable software versions ...

May 5, 2022
CVE-2024-46992
7.8

This CVE describes an ASAR integrity bypass vulnerability in Electron that allows attackers to modify application files and potentially execute arbitr...

Jul 1, 2025
CVE-2024-51141
7.8

This vulnerability allows a local attacker to execute arbitrary code on systems with the TOTOLINK A600UB Bluetooth Wireless Adapter driver installer. ...

Nov 15, 2024
CVE-2020-4610
7.8

This vulnerability in IBM Security Secret Server (IBM Security Verify Privilege Manager 10.8.2) allows a local user to execute arbitrary code due to i...

Jun 25, 2021
CVE-2024-34714
7.6

The Hoppscotch Browser Extension vulnerability allows any website to send messages to the extension and receive responses, bypassing CORS restrictions...

May 14, 2024
CVE-2026-26275
7.5

A logic flaw in httpsig-hyper versions before 0.0.23 causes digest verification to always succeed regardless of actual digest values, allowing message...

Feb 19, 2026
CVE-2023-38802
7.5

This vulnerability allows remote attackers to cause denial of service (DoS) in FRRouting and Pica8 PICOS systems by sending specially crafted BGP upda...

Aug 29, 2023
CVE-2021-37182
7.5

This vulnerability affects Siemens SCALANCE industrial network switches with OSPF enabled. An unauthenticated remote attacker can send specially craft...

Jun 14, 2022
CVE-2022-21757
7.5

This vulnerability in MediaTek WIFI Firmware allows remote attackers to cause a system crash (denial of service) without authentication or user intera...

Jun 6, 2022
CVE-2022-22781
7.5

This vulnerability in Zoom Client for MacOS allows attackers to downgrade users to older, less secure versions during the update process. It affects M...

Apr 28, 2022
CVE-2022-22253
7.5

CVE-2022-22253 is an integrity check validation vulnerability in Huawei's DFX module that could allow attackers to compromise system stability. This a...

Apr 11, 2022
CVE-2021-41067
7.5

This vulnerability in Listary allows attackers to intercept software updates via man-in-the-middle (MITM) attacks due to insecure HTTP connections and...

Dec 14, 2021
CVE-2021-22442
7.5

This vulnerability in Huawei smartphones allows attackers to bypass integrity checks, potentially causing system resets. It affects Huawei smartphone ...

Aug 2, 2021
CVE-2023-36537
7.3

This vulnerability in Zoom Rooms for Windows allows authenticated local users to escalate their privileges on the system. Attackers with standard user...

Jul 11, 2023
CVE-2021-20709
7.2

This vulnerability allows attackers with administrative privileges to execute arbitrary operating system commands on affected NEC Aterm routers by sen...

Apr 26, 2021
CVE-2021-41206
7.0

TensorFlow is vulnerable to shape validation flaws in multiple operations, allowing attackers to trigger undefined behavior including crashes or poten...

Nov 5, 2021
CVE-2020-9210
6.8

This vulnerability in Huawei products allows attackers to physically install malware due to insufficient integrity checks in a specific module. Exploi...

Dec 27, 2024
CVE-2023-24063
6.8

This vulnerability allows physical attackers to bypass disk encryption on Diebold Nixdorf ATMs by manipulating the /etc/mtab file during the Pre-Boot ...

Aug 8, 2024
CVE-2024-47573
6.5

This vulnerability allows authenticated attackers with Read/Write system maintenance permissions to install corrupted firmware images on FortiNDR devi...

Mar 14, 2025
CVE-2024-41909
5.9

This vulnerability allows attackers to intercept SSH traffic and drop specific packets, potentially downgrading or disabling security features in Apac...

Aug 12, 2024
CVE-2025-33193
5.7

NVIDIA DGX Spark GB10 systems contain a vulnerability in SROOT firmware where improper integrity validation could allow attackers to access sensitive ...

Nov 25, 2025
CVE-2025-3247
5.3

The Contact Form 7 WordPress plugin has an order replay vulnerability that allows unauthenticated attackers to reuse a single Stripe PaymentIntent for...

Apr 16, 2025
CVE-2026-25934
4.3

A data integrity vulnerability in go-git versions before 5.16.5 fails to properly verify checksums for .pack and .idx files, potentially allowing corr...

Feb 9, 2026
CVE-2023-50738
4.3

This vulnerability allows attackers to bypass firmware downgrade protection on affected Lexmark printers, potentially enabling them to install older, ...

Jan 17, 2025
CVE-2024-23462
3.3

An improper validation vulnerability in Zscaler Client Connector on macOS allows attackers to cause denial of service by crashing the client binary, w...

May 2, 2024
CVE-2025-4616
N/A

A locally authenticated non-admin user can bypass security controls in Palo Alto Networks Prisma Browser by exploiting insufficient input validation. ...

Nov 14, 2025

About CWE-354 (CWE-354)

Our database tracks 35 CVEs classified as CWE-354, with 4 rated critical and 21 rated high severity. The average CVSS score for CWE-354 vulnerabilities is 7.3.

External reference: View CWE-354 on MITRE CWE →

Monitor CWE-354 Vulnerabilities

Get alerted when new CWE-354 CVEs affect your infrastructure.

Start Monitoring Free