Cyber Posture

CWE · MITRE source

CWE-1263Improper Physical Access Control

Abstraction: Class · CVEs in our corpus: 13

The product is designed with access restricted to certain information, but it does not sufficiently protect against an unauthorized actor with physical access to these areas.

Sections of a product intended to have restricted access may be inadvertently or intentionally rendered accessible when the implemented physical protections are insufficient. The specific requirements around how robust the design of the physical protection mechanism needs to be depends on the type of product being protected. Selecting the correct physical protection mechanism and properly enforcing it through implementation and manufacturing are critical to the overall physical security of the product.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (22)AI

Showing the 10 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
PE-10Emergency ShutoffPEPlacement for authorized access and protection against unauthorized activation specifically address improper physical access control.
PE-12Emergency LightingPEAutomatic emergency lighting ensures visibility on exits and evacuation routes during power outages, reducing an attacker's ability to exploit improper physical access controls by using darkness to navigate or access restricted areas.
PE-16Delivery and RemovalPEDirectly implements authorization and control of physical items entering and exiting the facility to prevent improper physical access.
MP-2Media AccessMPRestricting access to media directly implements controls to prevent improper physical access to storage media.
MP-4Media StorageMPPhysically controlling and securely storing media directly implements proper physical access controls for system media.
MP-7Media UseMPProhibiting portable storage devices without identifiable owners is a direct physical access control measure limiting untraceable media interaction with systems.
SC-41Port and I/O Device AccessSCReduces physical access attack surface by disabling physical ports and I/O devices.
SC-48Sensor RelocationSCPhysical or environmental sensor movement directly mitigates weaknesses in physical access control by eliminating fixed, tamperable, or avoidable sensor placements.
MA-7Field MaintenanceMAField maintenance requires physical or on-site access, and restricting it mitigates improper physical access control.
SR-10Inspection of Systems or ComponentsSRPhysical inspection directly detects tampering that occurs when physical access controls are absent or bypassed.
Show 12 more broadly-applicable controls
PE-17Alternate Work SitePERequiring documentation of allowed sites plus implementation and assessment of controls at alternate work sites directly prevents improper physical access to systems and data.
PE-18Location of System ComponentsPEPositioning components to minimize unauthorized physical access directly strengthens physical access controls and reduces exploitability of weaknesses allowing physical intrusion or tampering.
PE-2Physical Access AuthorizationsPEThis control directly develops, approves, maintains, reviews, and revokes physical facility access authorizations and credentials, preventing improper physical access control.
PE-20Asset Monitoring and TrackingPEAsset location and movement monitoring detects unauthorized physical relocation or access to protected assets.
PE-23Facility LocationPESelecting facility sites to avoid physical and environmental hazards directly reduces the exploitability of improper physical access controls.
PE-3Physical Access ControlPEDirectly implements physical access authorizations, ingress/egress controls, visitor escorting, and key/combination management to prevent unauthorized physical entry.
PE-4Access Control for TransmissionPEDirectly implements physical access restrictions to transmission lines and media, preventing unauthorized physical tampering or interception.
PE-5Access Control for Output DevicesPEDirectly implements physical access controls on output devices to block unauthorized retrieval of their outputs.
PE-6Monitoring Physical AccessPEDirect monitoring, logging, and incident-response coordination for physical facility access tangibly detects and deters unauthorized entry or tampering that would exploit missing or weak physical access controls.
PE-7Visitor ControlPEDirectly addresses physical access by mandating visitor registration, escorting, and logging to prevent unauthorized presence.
PE-8Visitor Access RecordsPEMaintaining, reviewing, and reporting anomalies in visitor access records directly detects and deters exploitation of improper physical access controls to the facility containing the system.
PE-9Power Equipment and CablingPEDirectly implements physical barriers, enclosures, and access restrictions that prevent unauthorized actors from reaching and damaging power equipment or cabling.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-489731.99.30.00122024-11-14
CVE-2023-382901.67.80.00052024-04-22
CVE-2024-364381.57.30.00032024-07-15
CVE-2024-283261.46.80.00102024-04-26
CVE-2025-87621.46.80.00022025-08-13
CVE-2025-43861.46.80.00022026-05-07
CVE-2022-325061.36.40.00052024-05-14
CVE-2024-395121.36.60.00152024-07-10
CVE-2022-37281.26.10.00132023-10-09
CVE-2022-481821.26.10.00132023-10-09
CVE-2022-481831.26.10.00132023-10-09
CVE-2025-596960.63.20.00022025-12-02
CVE-2025-67850.00.00.00032025-09-04