| Name | 
    Privilege Escalation | 
  
  
     | 
    
      
        
        
          | Likelyhood of attack | 
          Typical severity | 
         
        
        
        
          | Medium | 
          High | 
         
        
       
   | 
  
    | Summary | 
    An adversary exploits a weakness enabling them to elevate their privilege and perform an action that they are not supposed to be authorized to perform. | 
  
  
    | Prerequisites | 
     | 
  
  
   | Solutions          |      |  
  
   | Related Weaknesses | 
    
      
        
          
            | 
              CWE ID
             | 
            
              Description
             | 
           
        
        
        
          | CWE-269 | 
          Improper Privilege Management | 
         
        
        
          | CWE-1264 | 
          Hardware Logic with Insecure De-Synchronization between Control and Data Channels | 
         
        
        
          | CWE-1311 | 
          Improper Translation of Security Attributes by Fabric Bridge | 
         
        
       
     | 
  
  
  
  
  
   | Taxonomy: ATTACK | 
    
      
        
        
          | 
            Entry ID
           | 
          
            Entry Name
           | 
         
        
        
        
        
          | 1548 | 
          Abuse Elevation Control Mechanism | 
         
        
        
       
     |