REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Common Consequences
Impact: Gain Privileges or Assume Identity — Notes:
Potential Mitigations
Architecture and Design: Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software. (N/A)
Applicable Platforms
None (Not Language-Specific, Undetermined)
Demonstrative Examples
Intro: This function is part of a privileged program that takes input from users with potentially lower privileges.
Body: This code does not confirm that the process to be killed is owned by the requesting user, thus allowing an attacker to kill arbitrary processes.
Maintenance: The relationships between privileges, permissions, and actors (e.g. users and groups) need further refinement within the Research view. One complication is that these concepts apply to two different pillars, related to control of resources (CWE-664) and protection mechanism failures (CWE-693).