The software fails to properly limit who can access a resource, allowing unauthorized users or systems to interact with it.
Access control is a security cornerstone built on three pillars: verifying identity (authentication), checking permissions (authorization), and logging actions (accountability). When any of these fails, attackers can steal data, escalate privileges, run commands, or hide their activity. Weaknesses typically arise in two ways: first, through faulty specification, where resources are misconfigured (like world-writable files) or users are given incorrect privileges. Second, through faulty enforcement, where errors in the code allow users to bypass the intended security rules, even if the policy was correctly defined.
Impact: Varies by Context
Strategy: Separation of Privilege