logo
Home/CWEs/CWE-1280/

CWE-1280 - Access Control Check Implemented After Asset is Accessed

  • Abstraction:Base
  • Structure:Simple
  • Status:Incomplete
  • Release Date:2020-02-24
  • Latest Modification Date:2023-10-26

Weakness Name

Access Control Check Implemented After Asset is Accessed

Description

A product's hardware-based access control check occurs after the asset has been accessed.

The product implements a hardware-based access control check. The asset should be accessible only after the check is successful. If, however, this operation is not atomic and the asset is accessed before the check is complete, the security of the system may be compromised.

Common Consequences

Scope: Access Control, Confidentiality, Integrity

Impact: Modify Memory, Read Memory, Modify Application Data, Read Application Data, Gain Privileges or Assume Identity, Bypass Protection Mechanism

Related Weaknesses

CWE-284Improper Access Control

CWE-696Incorrect Behavior Order

Latest Security News