Broken Access Control


Broken Access Control vulnerabilities exist when a user can access resource or perform an action that they are not supposed to be able to access or do. The typical impact of Broken Access Control is attackers acting as a user without being logged in or acting as an admin when logged in as a user. Broken Access Control failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia