| Name |
Privilege Escalation |
|
| Likelyhood of attack |
Typical severity |
| Medium |
High |
|
| Summary |
An adversary exploits a weakness enabling them to elevate their privilege and perform an action that they are not supposed to be authorized to perform. |
| Prerequisites |
|
| Solutions | |
| Related Weaknesses |
|
CWE ID
|
Description
|
| CWE-269 |
Improper Privilege Management |
| CWE-1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
| CWE-1311 |
Improper Translation of Security Attributes by Fabric Bridge |
|
| Taxonomy: ATTACK |
|
Entry ID
|
Entry Name
|
| 1548 |
Abuse Elevation Control Mechanism |
|