Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-284 (访问控制不恰当) — Vulnerability Class 2062

2062 vulnerabilities classified as CWE-284 (访问控制不恰当). AI Chinese analysis included.

CWE-284 represents a critical security weakness where software fails to properly restrict access to sensitive resources, allowing unauthorized actors to interact with data or functions they should not reach. This flaw typically arises when developers neglect to implement robust authentication or authorization checks, enabling attackers to bypass security controls through direct URL manipulation, token forgery, or privilege escalation techniques. Exploitation often leads to severe consequences, including data breaches, unauthorized system modifications, or complete service disruption. To mitigate this risk, developers must enforce strict access control policies at every layer of the application architecture. This involves implementing comprehensive identity verification, applying the principle of least privilege, and rigorously validating user permissions before granting access to any protected resource, ensuring that only authenticated and authorized users can perform specific actions.

MITRE CWE Description
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. Access control involves the use of several protection mechanisms such as: Authentication (proving the identity of an actor) Authorization (ensuring that a given actor can access a resource), and Accountability (tracking of activities that were performed) When any mechanism is not applied or otherwise fails, attackers can compromise the security of the product by gaining privileges, reading sensitive information, executing commands, evading detection, etc. There are two distinct behaviors that can introduce access control weaknesses: Specification: incorrect privileges, permissions, ownership, etc. are explicitly specified for either the user or the resource (for example, setting a password file to be world-writable, or giving administrator capabilities to a guest user). This action could be performed by the program or the administrator. Enforcement: the mechanism contains errors that prevent it from properly enforcing the specified access control requirements (e.g., allowing the user to specify their own privileges, or allowing a syntactically-incorrect ACL to produce insecure settings). This problem occurs within the program itself, in that it does not actually enforce the intended security policy that the administrator specifies.
Common Consequences (1)
OtherVaries by Context
Mitigations (2)
Architecture and Design, OperationVery carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Architecture and DesignCompartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separatio…
Examples (2)
This code temporarily raises the program's privileges to allow creation of a new user folder.
def makeNewUserDir(username): if invalidUsername(username): #avoid CWE-22 and CWE-78 print('Usernames cannot contain invalid characters') return False try: raisePrivileges() os.mkdir('/home/' + username) lowerPrivileges() except OSError: print('Unable to create new user directory for user:' + username) return False return True
Bad · Python
This function runs an arbitrary SQL query on a given database, returning the result of the query.
function runEmployeeQuery($dbName, $name){ mysql_select_db($dbName,$globalDbHandle) or die("Could not open Database".$dbName); //Use a prepared statement to avoid CWE-89 $preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name'); $preparedStatement->execute(array(':name' => $name)); return $preparedStatement->fetchAll(); } /.../ $employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2019-6520 多款 Moxa 产品安全漏洞 — Moxa IKS, EDS 6.5 -2019-03-05
CVE-2019-1664 Cisco HyperFlex Software Unauthenticated Root Access Vulnerability — Cisco HyperFlex HX-Series 8.4 -2019-02-21
CVE-2019-1666 Cisco HyperFlex Unauthenticated Statistics Retrieval Vulnerability — Cisco HyperFlex HX-Series 5.3 -2019-02-21
CVE-2019-1660 Cisco TelePresence Management Suite Simple Object Access Protocol Vulnerability — Cisco TelePresence Management Suite (TMS) 9.4 -2019-02-07
CVE-2019-6517 BD FACSLyric 安全漏洞 — BD FACSLyric 8.4 -2019-02-06
CVE-2018-10612 多款3S-Smart Software Solutions产品访问控制错误漏洞 — 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0 9.8 -2019-01-29
CVE-2019-1653 Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability — Cisco Small Business RV Series Router Firmware 7.5 -2019-01-24
CVE-2019-1647 Cisco SD-WAN Solution Unauthorized Access Vulnerability — Cisco SD-WAN Solution 8.0 -2019-01-24
CVE-2018-15459 Cisco Identity Services Engine Privilege Escalation Vulnerability — Cisco Identity Services Engine Software 7.2 -2019-01-23
CVE-2018-19634 CA Service Desk Manager 访问控制错误漏洞 — CA Service Desk Manager 7.5 -2019-01-22
CVE-2018-15466 Cisco Policy Suite Graphite Unauthenticated Read-Only Access Vulnerability — Cisco Policy Suite (CPS) Software 3.7 -2019-01-11
CVE-2018-0484 Cisco IOS and IOS XE Software Secure Shell Connection on VRF Vulnerability — Cisco IOS 6.5 -2019-01-10
CVE-2018-13816 Siemens TIM 1531 IRC 授权问题漏洞 — TIM 1531 IRC 9.8 -2018-12-12
CVE-2018-7364 ZTE ZXIN10 输入验证错误漏洞 — ZXIN10-European region 9.8 -2018-12-07
CVE-2018-16476 Active Job 代码问题漏洞 — https://github.com/rails/rails 6.5 -2018-11-30
CVE-2018-17953 pam_access does not handle netmask matches correctly — pam 7.7 -2018-11-27
CVE-2018-15394 Cisco Stealthwatch Management Console Authentication Bypass Vulnerability — Cisco Stealthwatch Enterprise 9.8 -2018-11-08
CVE-2018-16466 Nextcloud Server 访问控制错误漏洞 — Nextcloud Server 8.1 -2018-10-30
CVE-2018-17931 Vecna VGo Robot 安全漏洞 — VGo Robot 6.8 -2018-10-30
CVE-2018-17908 Advantech WebAccess 访问控制错误漏洞 — WebAccess Versions 8.3.2 and prior. 7.8 -2018-10-29
CVE-2018-17921 GAIN SAGA1-L8B 访问控制错误漏洞 — SAGA1-L8B 8.8 -2018-10-24
CVE-2018-15395 Cisco Wireless LAN Controller Software Privilege Escalation Vulnerability — Cisco Wireless LAN Controller (WLC) 5.4 -2018-10-17
CVE-2018-0436 Cisco Webex Teams Information Disclosure and Modification Vulnerability — Cisco Webex Teams 6.5 -2018-10-05
CVE-2018-0447 Cisco Email Security Appliance URL Filtering Bypass Vulnerability — Cisco Email Security Appliance (ESA) 5.3 -2018-10-05
CVE-2018-15371 Cisco IOS XE Software Shell Access Authentication Bypass Vulnerability — Cisco IOS XE Software 6.7 -2018-10-05
CVE-2018-15372 Cisco IOS XE Software MACsec MKA Using EAP-TLS Authentication Bypass Vulnerability — Cisco IOS XE Software 6.8 -2018-10-05
CVE-2018-15398 Cisco Adaptive Security Appliance Access Control List Bypass Vulnerability — Cisco Adaptive Security Appliance (ASA) Software 4.0 -2018-10-05
CVE-2018-14804 Emerson Electric AMS Device Manager 访问控制错误漏洞 — AMS Device Manager 8.8 -2018-10-01
CVE-2018-15611 Communication Manager Local Administrator PrivEsc — Communication Manager 6.7 -2018-09-27
CVE-2018-10500 Samsung Galaxy Apps 权限许可和访问控制漏洞 — Samsung Galaxy Apps 7.0 -2018-09-24

Vulnerabilities classified as CWE-284 (访问控制不恰当) represent 2062 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.