This vulnerability occurs when a system, upon encountering an error or failure, defaults to its least secure configuration instead of a safer alternative. Examples include reverting to the weakest encryption or the most permissive access rules.
Failing open creates a dangerous gap where the system operates with known, weaker security controls. This directly introduces the vulnerabilities associated with that permissive state, making it significantly easier for an attacker to exploit the system. Often, this design choice is made to prioritize uptime and reduce support overhead, mistakenly valuing continuous functionality over security. This approach fundamentally undermines security posture and provides administrators with a false sense of protection. The secure alternative is to "fail closed" or "fail safe," where the system denies access or stops operations until the issue can be safely resolved, ensuring security is never automatically compromised for convenience.
Impact: Bypass Protection Mechanism
Intended access restrictions can be bypassed, which is often contradictory to what the product's administrator expects.