Read Time:20 Second
Description
The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or resources.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Access Control: Bypass Protection Mechanism, Gain Privileges or Assume Identity
Potential Mitigations
Phase: Architecture and Design
Description:
Deploy different layers of protection to implement security in depth.