Read Time:15 Second

Description

The product’s architecture mirrors regions without ensuring that their contents always stay in sync.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1250

 

Consequences

Confidentiality, Integrity, Availability, Access Control, Accountability, Authentication, Authorization, Non-Repudiation: Varies by Context

 

Potential Mitigations

Phase: Architecture and Design

Effectiveness: Moderate

Description: 

CVE References