Data Access Operations Outside of Expected Data Manager Component

Incomplete Base
Structure: Simple
Description

This weakness occurs when an application bypasses its dedicated, central data manager component and performs data access operations through other code paths.

Extended Description

When developers create a central data manager, they typically optimize it for performance, security, and consistency. Bypassing this component forces the application to use less efficient, unoptimized data access methods, which can degrade performance and introduce inconsistencies in how data is handled. This performance degradation isn't just a maintenance issue—it can become a security vulnerability. If an attacker can trigger these inefficient bypass paths, they might cause resource exhaustion, denial of service, or exploit inconsistencies that the central manager was designed to prevent.

Common Consequences 1
Scope: Other

Impact: Reduce Performance

References 1
Automated Source Code Performance Efficiency Measure (ASCPEM)
Object Management Group (OMG)
01-2016
ID: REF-959
Related Weaknesses
Taxonomy Mapping
  • OMG ASCPEM