Description
Identification scheme and realization relies on using of unchangeable data. Despite information is considered to be unaltered, the weakness allows attackers to bypass protection mechanism and gain ability to monitor and change data.
The vulnerability is introduced during Architecture and Design, Implementation stages.
Latest vulnerabilities for CWE-302
References
Description of CWE-302 on Mitre website