This vulnerability occurs when software incorrectly uses functions that require special permissions. Attackers can exploit these mistakes to gain unauthorized access, elevate their privileges, or steal sensitive data.
Functions that require elevated privileges (privileged APIs) demand careful handling. As a developer, you must validate all arguments, understand the API's internal security assumptions, and only call it from a secure, controlled context. Failing to meet the API's specific requirements creates an opening for attackers to hijack the process or its permissions. Privileged functions often maintain their high-level access after execution or make critical assumptions about the data you provide. You must thoroughly review the API's behavior—knowing when and how to call it—to ensure its power cannot be misdirected. Always account for known weaknesses in the API's own design to prevent your correct usage from being bypassed.
Impact: Gain Privileges or Assume Identity
An attacker may be able to elevate privileges.
Impact: Read Application Data
An attacker may be able to obtain sensitive information.
Impact: Execute Unauthorized Code or Commands
An attacker may be able to execute code.
Low