Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Broken Access Control – Penetration Testing

Broken Access control (BAC) is a common website vulnerability that allows cyber attacks to access pages/endpoints/resources that they shouldn’t have access to. In 2021 OWASP rated Broken Access control as the Number 1 vulnerability. This vulnerability will remain one of the most common and concerning vulnerabilities for all time as the protection is manual to implement, can be complicated and can be forgotten.

One way to think about Broken Access control is with the analogy of a lock on a door. If the lock wasn’t installed correctly, the lock is weak, it is not working correctly or the lock was accidentally forgotten, then that is Broken access control.

The reason it can be complicated could be related to how the code was structured or how the access needs to be provided in a complicated way for some people but not for others.

Broken Access can sometimes be referred to as IDOR (Insecure Direct Object Reference) as IDOR is Broken Access with a direct reference. The direct reference is typically a number that you can just change to access a resource on a page/endpoint. So combined with Broken Access, you can access all objects by trying all the numbers from 1 to 1million.

The way to fix Broken Access is to check the access has been granted. This is checking the user is authenticated (user/pass/2fa) and that this authenticated user is allowed access to the page/endpoint/resource.

In code this can be as simple as a single “If” to check if the USER has an access ROLE, or is part of a GROUP/ENTITY, or has the assigned PERMISSIONS.

We find Broken Access more than 70% of the time during our Website Penetration Tests. Therefore we expect that most websites will have Broken Access Control vulnerabilities.

If you need a Penetration Test to discover your Broken Access Controls contact Vertex Cyber Security.

CATEGORIES

Penetration Testing

TAGS

bac - broken access control - OWASP top 10

SHARE

PrevPreviousWhy you shouldn’t hire internal Cyber Security staff.
NextTLS1.2 End of LifeNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.