This vulnerability occurs when a system with multiple independent components (like distributed services or separate hardware units) each maintain their own copy of shared data—such as user state, cache, or configuration—but the system fails to keep all these local copies synchronized and consistent with each other.
In modern distributed architectures—think cloud services, multiplayer games, or systems with parallel processing units—different components often need local snapshots of critical data to operate efficiently. However, if updates to this shared state aren't properly coordinated across all copies, each component starts working with different versions of the truth. This breakdown in synchronization is where the vulnerability takes root. When local representations drift apart, the system's behavior becomes unpredictable. Users might see outdated information, transactions can process in the wrong order, or security controls might fail because one component grants access based on stale data. Essentially, any mechanism that assumes all parts of the system share the same view of data—like authentication, inventory management, or game state—becomes unreliable and potentially exploitable.