Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-274:Improper Handling of Insufficient Privileges
Weakness ID:274
Version:v4.17
Weakness Name:Improper Handling of Insufficient Privileges
Vulnerability Mapping:Discouraged
Abstraction:Base
Structure:Simple
Status:Draft
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading to resultant weaknesses.

▼Extended Description

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
CanAlsoBeAllowedB280Improper Handling of Insufficient Permissions or Privileges
ChildOfDiscouragedC755Improper Handling of Exceptional Conditions
ChildOfDiscouragedC269Improper Privilege Management
PeerOfAllowed-with-ReviewC271Privilege Dropping / Lowering Errors
Nature: CanAlsoBe
Mapping: Allowed
Type: Base
ID: 280
Name: Improper Handling of Insufficient Permissions or Privileges
Nature: ChildOf
Mapping: Discouraged
Type: Class
ID: 755
Name: Improper Handling of Exceptional Conditions
Nature: ChildOf
Mapping: Discouraged
Type: Class
ID: 269
Name: Improper Privilege Management
Nature: PeerOf
Mapping: Allowed-with-Review
Type: Class
ID: 271
Name: Privilege Dropping / Lowering Errors
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC265Privilege Issues
MemberOfProhibitedC901SFP Primary Cluster: Privilege
MemberOfProhibitedC1011Authorize Actors
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 265
Name: Privilege Issues
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 901
Name: SFP Primary Cluster: Privilege
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1011
Name: Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-312Other (impact)
MemberOfProhibitedBSBOSS-330Alter Execution Logic (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-312
Name: Other (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-330
Name: Alter Execution Logic (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1011Authorize Actors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1011
Name: Authorize Actors
Relevant to the view"Software Development - (699)"
NatureMappingTypeIDName
MemberOfProhibitedC265Privilege Issues
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 265
Name: Privilege Issues
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC901SFP Primary Cluster: Privilege
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 901
Name: SFP Primary Cluster: Privilege
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
OtherN/AOtherAlter Execution Logic
N/A
Scope: Other
Likelihood: N/A
Impact: Other, Alter Execution Logic
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
Phase: Implementation
Note:

REALIZATION: This weakness is caused during implementation of an architectural security tactic.

Phase: Operation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
CVE-2001-1564
System limits are not properly enforced after privileges are dropped.
CVE-2005-3286
Firewall crashes when it can't read a critical memory block that was protected by a malicious process.
CVE-2005-1641
Does not give admin sufficient privileges to overcome otherwise legitimate user actions.
Reference: CVE-2001-1564
Description:
System limits are not properly enforced after privileges are dropped.
Reference: CVE-2005-3286
Description:
Firewall crashes when it can't read a critical memory block that was protected by a malicious process.
Reference: CVE-2005-1641
Description:
Does not give admin sufficient privileges to overcome otherwise legitimate user actions.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Primary
      N/A
      Ordinality: Primary
      Description:
      N/A
      ▼Detection Methods
      Automated Static Analysis
      Detection Method ID:DM-14
      Description:

      Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

      Effectiveness:High
      Note:

      N/A

      ▼Vulnerability Mapping Notes
      Usage:Discouraged
      Reason:Potential Deprecation, CWE Overlap
      Rationale:

      This CWE entry could be deprecated in a future version of CWE.

      Comments:

      See maintenance notes.

      Suggestions:
      ▼Notes
      Maintenance

      CWE-280 and CWE-274 are too similar. It is likely that CWE-274 will be deprecated in the future.

      N/A

      Relationship

      Overlaps dropped privileges, insufficient permissions.

      N/A

      Theoretical

      This has a layering relationship with Unchecked Error Condition and Unchecked Return Value.

      N/A

      Theoretical

      Within the context of vulnerability theory, privileges and permissions are two sides of the same coin. Privileges are associated with actors, and permissions are associated with resources. To perform access control, at some point the product makes a decision about whether the actor (and the privileges that have been assigned to that actor) is allowed to access the resource (based on the permissions that have been specified for that resource).

      N/A

      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/AInsufficient privileges
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Insufficient privileges
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found