CWE-283

Unverified Ownership

Weakness Description

The product does not properly verify that a critical resource is owned by the proper entity.

Potential Mitigations

Architecture and DesignOperation

Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.

Architecture and Design

Consider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.

Common Consequences

Access Control
Gain Privileges or Assume Identity

An attacker could gain unauthorized access to system resources.

Advertisement

Related Weaknesses