Cyber Posture

CWE · MITRE source

CWE-276Incorrect Default Permissions

Abstraction: Base · CVEs in our corpus: 1,488

During installation, installed file permissions are set to allow anyone to modify those files.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (11)AI

Showing the 10 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
CM-1Policy and ProceduresCMEstablishes requirements for appropriate default permissions on system resources as part of configuration management.
CM-2Baseline ConfigurationCMBaseline establishment and updates on install/upgrade ensure correct default permissions rather than insecure ones.
CM-6Configuration SettingsCMRequiring the most restrictive settings instead of defaults prevents incorrect default permissions on resources.
AC-1Policy and ProceduresACAccess control policy can specify and enforce secure default permissions for resources.
AC-6Least PrivilegeACGuides setting of default permissions to the minimum required level.
PL-11Baseline TailoringPLTailoring explicitly overrides or scopes default permission assignments in the baseline to match the system's actual risk and operational needs.
PL-9Central ManagementPLA central authority can define and push correct default permissions, eliminating the common practice of leaving insecure defaults on individual hosts.
SA-16Developer-provided TrainingSATraining covers proper setting of permissions on resources, reducing incorrect default or inherited permissions after deployment.
SA-5System DocumentationSAAdministrator documentation on secure configuration and default settings prevents incorrect default permissions from remaining in place.
PE-1Policy and ProceduresPERequires addressing secure default permissions in physical and environmental protection controls.
Show 1 more broadly-applicable controls
CM-9Configuration Management PlanCMRequires documented processes that include setting and maintaining correct default permissions for configuration items.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2013-0632 KEV9.59.80.92682013-01-17
CVE-2017-116107.48.80.93832017-08-23
CVE-2023-299197.39.10.91852023-05-23
CVE-2023-299236.25.30.85442023-04-19
CVE-2017-86255.98.80.69822017-08-08
CVE-2020-90395.99.80.66112020-02-22
CVE-2020-79435.47.50.65372020-03-11
CVE-2020-114445.38.80.58752020-04-02
CVE-2022-22948 KEV4.96.50.26012022-03-29
CVE-2020-128344.79.80.45812020-05-15
CVE-2019-171243.49.80.23812019-10-09
CVE-2023-201783.27.80.27742023-06-28
CVE-2021-409042.98.80.19132022-03-25
CVE-2023-270352.96.50.26272023-05-01
CVE-1999-04262.49.80.08121999-03-01
CVE-2022-366402.49.80.06792022-09-02
CVE-2022-277732.49.80.06882022-12-05
CVE-2023-253552.48.80.10772023-04-04
CVE-2023-269182.49.80.07172023-04-14
CVE-2016-54252.37.80.11552016-10-13
CVE-2024-552152.39.80.04872025-02-07
CVE-2019-198962.29.90.03442020-01-23
CVE-2021-441402.29.10.05872021-11-24
CVE-2021-450032.29.80.03372022-01-10
CVE-2022-259432.27.80.09862022-03-09