The weakness provokes protection mechanisms failure of the software, used for prevention the product from attacks.
There are 3 cases of the vulnerability:
1. "Missing" protection mechanisms are found in case of detection no mechanisms for fight with a certain attack.
2. "Insufficient" protection mechanisms can guard the system only from the most common threats but it is not enough.
3. "Ignored" protection mechanisms are accessible and acting but the developer didn't use it before for preventing attacks.
The weakness is introduced during Operation, Architecture and Design, Implementation stages. Vulnerability allows attackers easily bypass protection mechanisms.
Latest vulnerabilities for CWE-693
Description of CWE-693 on Mitre website