CWE-1280 - Access Control Check Implemented After Asset is Accessed
CWE-1280
- Abstraction:
- Base
- Structure:
- Simple
- Status:
- Incomplete
- Weakness Name
Access Control Check Implemented After Asset is Accessed
- Description
A product's hardware-based access control check occurs after the asset has been accessed.
The product implements a hardware-based access control check. The asset should be accessible only after the check is successful. If, however, this operation is not atomic and the asset is accessed before the check is complete, the security of the system may be compromised.
- Common Consequences
Scope: Access Control, Confidentiality, Integrity
Impact: Modify Memory, Read Memory, Modify Application Data, Read Application Data, Gain Privileges or Assume Identity, Bypass Protection Mechanism
- Related Weaknesses
- Release Date:
- 2020-02-24
- Latest Modification Date:
- 2023-10-26
Free security scan for your website