Read Time:23 Second
Description
A product’s hardware-based access control check occurs after the asset has been accessed.
Modes of Introduction:
– Implementation
Related Weaknesses
Consequences
Access Control, Confidentiality, Integrity: Modify Memory, Read Memory, Modify Application Data, Read Application Data, Gain Privileges or Assume Identity, Bypass Protection Mechanism
Potential Mitigations
Phase: Implementation
Description:
Implement the access control check first. Access should only be given to asset if agent is authorized.