Cyber Posture

CWE · MITRE source

CWE-1220Insufficient Granularity of Access Control

Abstraction: Base · CVEs in our corpus: 79

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets.

Integrated circuits and hardware engines can expose accesses to assets (device configuration, keys, etc.) to trusted firmware or a software module (commonly set by BIOS/bootloader). This access is typically access-controlled. Upon a power reset, the hardware or system usually starts with default values in registers, and the trusted firmware (Boot firmware) configures the necessary access-control protection. A common weakness that can exist in such protection schemes is that access controls or policies are not granular enough. This condition allows agents beyond trusted agents to access assets and could lead to a loss of functionality or the ability to set up the device securely. This further results in security risks from leaked, sensitive, key material to modification of device configuration.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (5)AI

Control Title Family Why it addresses this CWE
SC-2Separation of System and User FunctionalitySCProvides the necessary granularity by placing system management functions outside the reach of user-level access controls.
SC-3Security Function IsolationSCIsolation supplies an explicit, enforceable granularity boundary between security and non-security functions that coarser access-control schemes lack.
AC-16Security and Privacy AttributesACUse of granular security and privacy attributes enables finer access control than coarse permission models alone.
CA-9Internal System ConnectionsCADocumenting interface characteristics enables more granular control over internal access.
SA-17Developer Security and Privacy Architecture and DesignSARequires the architecture to describe granularity and placement of controls, preventing insufficiently fine-grained access decisions.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2025-31201 KEV4.19.80.02252025-04-16
CVE-2026-33825 KEV3.97.80.04852026-04-14
CVE-2024-423653.47.40.31952024-08-08
CVE-2022-24752.09.80.00252022-10-28
CVE-2026-63561.99.60.00032026-04-22
CVE-2022-361101.88.80.00302022-09-09
CVE-2023-400701.88.80.00162024-05-16
CVE-2023-452171.88.80.00162024-05-16
CVE-2025-299871.88.80.00412025-04-03
CVE-2025-44041.89.10.00292025-06-17
CVE-2025-74931.89.10.00112025-09-30
CVE-2025-80491.88.80.00052025-10-20
CVE-2025-80531.89.10.00042025-10-20
CVE-2026-63881.89.10.00032026-04-15
CVE-2023-331271.78.10.01642023-07-11
CVE-2023-442851.67.80.00062023-12-14
CVE-2023-430401.66.50.05752024-05-14
CVE-2024-53891.68.10.00132024-06-09
CVE-2024-527991.68.20.00052024-11-21
CVE-2024-532951.67.80.00092025-02-01
CVE-2021-313841.57.20.00372021-10-19
CVE-2023-275911.57.50.00492023-03-17
CVE-2024-89271.57.50.00452024-10-08
CVE-2024-132561.57.50.00302025-01-09
CVE-2023-313421.57.50.00032025-02-11