Description
The software does not properly assign, modify, track, or check
privileges for an actor, creating an unintended sphere of control for
that actor.The weakness is introduced during Architecture and Design, Implementation and Operation stages. This weakness is caused during implementation of an architectural security tactic.
Latest vulnerabilities for CWE-269
References
Description of CWE-269 on Mitre website