Cyber Posture

CWE · MITRE source

CWE-285Improper Authorization

Abstraction: Class · CVEs in our corpus: 1,225

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (103)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
AC-1Policy and ProceduresACDocumented procedures facilitate correct implementation and ongoing management of authorization decisions.
AC-13Supervision and Review — Access ControlACPeriodic reviews identify and correct flaws in authorization decisions or enforcement.
AC-14Permitted Actions Without Identification or AuthenticationACThe control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.
PM-1Information Security Program PlanPMThe control requires authorization mechanisms and senior approval to prevent unauthorized viewing or alteration of the plan.
PM-10Authorization ProcessPMThe control explicitly manages authorization decisions and integrates them into risk management, making incorrect or incomplete authorization decisions less likely to persist.
PM-11Mission and Business Process DefinitionPMBy determining authorization and protection needs arising from business processes, the control reduces improper authorization weaknesses in how operations are structured.
SC-14Public Access ProtectionsSCMandates authorization checks so public access cannot perform disallowed operations or modifications.
SC-15Collaborative Computing Devices and ApplicationsSCRequires explicit authorization decisions before any remote activation of collaborative hardware or apps.
SC-16Transmission of Security and Privacy AttributesSCSecurity attributes carried with data allow consistent authorization decisions between components and external systems.
PS-1Policy and ProceduresPSProcedures define authorization decisions tied to hiring, transfer, and termination, reducing the likelihood of improper authorization decisions.
PS-3Personnel ScreeningPSScreening verifies trustworthiness prior to granting rights, making it harder for attackers to exploit improper authorization by placing malicious or unqualified personnel in authorized roles.
PS-4Personnel TerminationPSTerminating authorizations and privileges ensures that access rights no longer apply to the individual, reducing improper authorization risks.
CM-12Information LocationCMDocumenting access to processing and storage locations helps ensure correct authorization for information resources.
CM-13Data Action MappingCMDocumenting data actions helps ensure proper authorization is enforced for each action involving sensitive data.
CM-3Configuration Change ControlCMMandates explicit authorization and approval for configuration-controlled changes with security considerations.
Show 88 more broadly-applicable controls
AC-16Security and Privacy AttributesACEstablishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.
AC-17Remote AccessACExplicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.
AC-18Wireless AccessACThe control explicitly requires authorization of each wireless access type prior to permitting connections.
AC-19Access Control for Mobile DevicesACMandating explicit authorization of mobile device connections reduces the risk of improper authorization decisions for system access.
AC-2Account ManagementACSpecifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.
AC-20Use of External SystemsACRequires explicit authorization for individuals to use external systems to access or handle organization-controlled information.
AC-21Information SharingACIt mandates explicit checks to confirm the sharing partner's authorizations align with the information's access and use restrictions.
AC-22Publicly Accessible ContentACAuthorization checks via training and content reviews ensure only approved information is released to public systems.
AC-23Data Mining ProtectionACDetects and blocks data mining attempts that violate intended authorization boundaries for data access.
AC-24Access Control DecisionsACThe control mandates authorization decisions for each access request, reducing the ability to exploit improper authorization weaknesses.
AC-25Reference MonitorACEnsures authorization decisions are always performed by a complete and analyzable reference monitor.
AC-3Access EnforcementACThe control requires checking and applying authorization decisions per policy, preventing improper authorization.
AC-4Information Flow EnforcementACRequires and applies authorization decisions specifically to control information flows based on policy.
AC-5Separation of DutiesACThe control requires authorizations to be structured around separated duties, mitigating improper authorization that would otherwise allow one user to perform conflicting operations.
AC-6Least PrivilegeACRequires authorization to grant only the minimal privileges needed for tasks.
AC-8System Use NotificationACMandating user acknowledgment of usage conditions prior to access strengthens authorization by ensuring consent is obtained as part of the decision to grant entry.
PM-12Insider Threat ProgramPMIncident handling team identifies and mitigates authorization failures that allow insiders to perform unauthorized actions.
PM-18Privacy Program PlanPMBy requiring documented privacy program management controls, role assignments, and senior-official approval, the control ensures authorization decisions for personal information are planned, coordinated, and periodically updated rather than left ad-hoc.
PM-19Privacy Program Leadership RolePMLeadership role coordinates development of authorization policies and mechanisms required to meet privacy requirements.
PM-2Information Security Program Leadership RolePMCentralized security program leadership ensures authorization rules and checks are defined, implemented, and sustained.
PM-23Data Governance BodyPMEstablishes accountability for authorization decisions and enforcement on data handling and access.
PM-24Data Integrity BoardPMMandatory review of matching proposals catches and prevents authorization decisions that would allow data use beyond permitted purposes.
PM-26Complaint ManagementPMComplaints about authorization failures are logged, acknowledged, and resolved within defined time bounds, making it harder for attackers to rely on long-lived authorization weaknesses.
PM-27Privacy ReportingPMRegular privacy compliance dissemination and review detect authorization failures that allow unauthorized access to protected information.
PM-29Risk Management Program Leadership RolesPMOrganization-level risk governance improves authorization consistency and prevents authorization decisions made without enterprise risk context.
PM-32PurposingPMEnforces that authorization rules remain consistent with the documented intended purpose of each resource.
PM-4Plan of Action and Milestones ProcessPMEnsures authorization weaknesses discovered via assessments are captured with concrete remediation plans aligned to organizational risk strategy.
PM-7Enterprise ArchitecturePMArchitecture planning establishes authorization policies and enforcement points across systems, reducing improper authorization flaws.
PM-8Critical Infrastructure PlanPMThe plan mandates documented authorization rules and checks to govern who can perform actions on key infrastructure components.
PM-9Risk Management StrategyPMComprehensive risk strategy includes authorization requirements and reviews, making improper authorization harder to overlook or exploit.
SC-26DecoysSCDecoys identify and block exploitation of improper authorization by providing monitored targets that mimic protected functions.
SC-32System PartitioningSCPartitioning limits authorization scope by confining subjects and objects to distinct environments.
SC-43Usage RestrictionsSCExplicit authorization step before component use prevents actions that bypass intended authorization checks.
SC-46Cross Domain Policy EnforcementSCThe control enforces explicit authorization policies on all traffic and data flows between domains, mitigating improper or missing authorization decisions.
SC-50Software-enforced Separation and Policy EnforcementSCEnforces policy-based authorization decisions between the separated subjects and objects.
SC-51Hardware-based ProtectionSCRequires explicit authorization (via manual hardware procedures) before any write is possible, preventing unauthorized modifications.
SC-7Boundary ProtectionSCCommunications are authorized only through managed boundary devices and segmented subnetworks.
PS-5Personnel TransferPSTriggers modification of authorizations to reflect changed operational need, directly addressing improper authorization after role changes.
PS-6Access AgreementsPSThe control enforces explicit authorization via signed agreements and periodic re-authorization, reducing the chance that access is granted or retained without proper approval.
PS-7External Personnel SecurityPSDefines authorization boundaries and revocation procedures for external providers, limiting improper or lingering authorization decisions.
PS-8Personnel SanctionsPSDeters improper authorization decisions by personnel via a formal sanctions and notification process.
PS-9Position DescriptionsPSExplicitly stated responsibilities per position improve the accuracy and consistency of authorization decisions tied to those roles.
CM-4Impact AnalysesCMEvaluating change impacts helps avoid deployment of incorrect or missing authorization logic.
CM-5Access Restrictions for ChangeCMRequiring definition, approval, and enforcement of access rules for changes addresses improper authorization of modifications.
CM-7Least FunctionalityCMBy limiting enabled features to only those needed, the control strengthens authorization by removing opportunities for unauthorized use of excess functionality.
CM-9Configuration Management PlanCMEstablishes roles, responsibilities, and authorization processes for all configuration management activities.
PT-1Policy and ProceduresPTDocumented procedures and management commitment directly support consistent authorization decisions during PII processing.
PT-2Authority to Process Personally Identifiable InformationPTMandates determining authority and limiting processing to what is authorized, preventing improper authorization over personal data.
PT-3Personally Identifiable Information Processing PurposesPTRequires authorization decisions for PII processing to be limited to explicitly documented compatible purposes.
PT-4ConsentPTRequiring affirmative consent implements an authorization decision for each instance of PII collection or use.
PT-5Privacy NoticePTMandating disclosure of the specific authority that authorizes PII processing and the exact purposes directly surfaces authorization decisions, reducing the viability of hidden or improper authorization.
PT-8Computer Matching RequirementsPTMandates explicit authorization via agreements and board approval, preventing unauthorized or out-of-scope use of personal data in matching programs.
CA-1Policy and ProceduresCARequiring documented authorization policy and procedures ensures authorization decisions follow defined, consistent processes instead of ad-hoc practices.
CA-3Information ExchangeCADocumenting authorization requirements and responsibilities for each exchange ensures authorization decisions are explicitly defined and managed.
CA-4Security CertificationCAThe process verifies authorization mechanisms function as intended before system approval.
CA-6AuthorizationCAMandates explicit acceptance and authorization of controls by a senior official, directly reducing improper authorization configurations.
CA-9Internal System ConnectionsCADocumenting security requirements and authorizing connections ensures correct authorization decisions.
MP-1Policy and ProceduresMPProcedures enforce authorization rules for media handling, making unauthorized actions harder to perform without detection.
MP-2Media AccessMPLimiting media access to authorized parties addresses improper authorization for resource access.
MP-3Media MarkingMPSecurity markings on media enable correct authorization decisions by indicating required protections before media is accessed, transferred, or reused.
MP-5Media TransportMPRequiring authorization for media transport activities prevents improper authorization of resource handling.
PE-1Policy and ProceduresPEProcedures establish authorization rules for physical and environmental access, limiting improper authorization.
PE-10Emergency ShutoffPEProtecting the shutoff from unauthorized activation enforces proper authorization for this critical operation.
PE-16Delivery and RemovalPERequires explicit authorization for items and components entering or leaving the facility.
PE-7Visitor ControlPERequires explicit authorization (badges, escorts, logs) before visitors can reach sensitive areas or equipment.
CP-10System Recovery and ReconstitutionCPReconstitution restores proper authorization policies and enforcement that may have been altered.
CP-13Alternative Security MechanismsCPSupplies backup authorization methods to block unauthorized actions when the primary authorization process is unavailable or compromised.
CP-6Alternate Storage SiteCPEnsuring equivalent authorization at the alternate site reduces the ability to exploit improper authorization for retrieving backup information.
MA-2Controlled MaintenanceMARequiring explicit approval for maintenance activities and component removal enforces proper authorization for critical system operations.
MA-5Maintenance PersonnelMARequires verification of access authorizations and designation of supervisors for maintenance personnel without proper authorizations.
MA-7Field MaintenanceMAThe control requires explicit authorization for maintenance activities, preventing unauthorized parties from performing them.
PL-2System Security and Privacy PlansPLRequires describing authorization-related controls, roles, and risk determinations to ensure proper enforcement of access decisions.
PL-7Concept of OperationsPLBy requiring a clear statement of how authorization decisions are made and enforced during operations, the control reduces gaps that allow improper authorization to be exploited.
PL-8Security and Privacy ArchitecturesPLThe control mandates describing authorization approaches integrated into the enterprise architecture, directly reducing improper authorization risks.
SA-14Criticality AnalysisSACriticality analysis identifies functions whose authorization decisions must be correct, making improper authorization flaws less likely to remain exploitable in those areas.
SA-16Developer-provided TrainingSATraining on authorization functions and controls reduces authorization bypasses stemming from incorrect setup or use.
SA-3System Development Life CycleSAIncorporating security considerations and risk management into every SDLC phase ensures authorization logic is properly specified, implemented, and tested rather than added ad hoc.
AT-3Role-based TrainingATRole-based training addresses authorization requirements and checks, lowering the risk of improper authorization.
AT-4Training RecordsATMonitoring training records supports enforcement of authorization rules by ensuring staff understand and follow authorization procedures before performing actions.
AU-14Session AuditAUAuditing session actions allows identification of improper authorization decisions and enforcement failures.
AU-6Audit Record Review, Analysis, and ReportingAUAudit analysis reports findings of improper authorization, reducing the impact of such weaknesses.
IA-13Identity Providers and Authorization ServersIADedicated authorization servers support policy-based decisions, mitigating improper authorization.
IA-4Identifier ManagementIAMandates authorization for identifier assignment, reducing risks of improper authorization.
RA-3Risk AssessmentRAThe control requires determining likelihood and impact of unauthorized actions, directly surfacing and mitigating authorization weaknesses.
RA-8Privacy Impact AssessmentsRAConducting PIAs before development forces review and improvement of authorization logic protecting personal data, reducing bypass opportunities.
SI-1Policy and ProceduresSIDocumented authorization procedures ensure consistent checks before allowing changes to system state or data, limiting exploitation of missing or incorrect authorization.
SI-9Information Input RestrictionsSIImplements authorization checks on who may supply information to the system.
SR-7Supply Chain Operations SecuritySRAuthorization decisions required by OPSEC prevent unauthorized actors from obtaining supply-chain details.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2021-28799 KEV9.510.00.90842021-05-13
CVE-2024-342577.39.80.89622024-05-08
CVE-2025-299277.39.10.92062025-03-21
CVE-2023-22277.29.10.90452023-04-21
CVE-2023-327076.78.80.82682023-06-01
CVE-2022-32296.39.80.72192023-02-06
CVE-2016-56766.17.50.76232016-08-31
CVE-2023-224806.07.30.75592023-01-14
CVE-2019-18985.85.30.78682019-06-20
CVE-2024-514795.87.50.71552024-12-17
CVE-2023-482415.77.50.69192023-11-20
CVE-2024-453875.09.90.50552024-12-23
CVE-2021-393414.38.20.44322021-11-01
CVE-2016-33523.78.80.32892016-09-14
CVE-2025-663013.59.60.26222025-12-01
CVE-2019-74893.29.80.21072019-12-23
CVE-2016-45312.77.30.20962016-07-28
CVE-2019-19122.69.10.12212019-08-07
CVE-2017-60442.49.80.07692017-06-30
CVE-2023-215492.38.80.09062023-01-10
CVE-2021-253742.28.60.07642021-04-09
CVE-2025-296592.29.80.04222025-04-21
CVE-2016-50632.15.30.16862017-05-02
CVE-2017-113982.18.80.05352018-01-19
CVE-2021-421262.18.80.05742021-12-07