The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. This weakness covers three distinct situations. A "missing" protection mechanism occurs when the application does not define any mechanism against a certain class of attack. An "insufficient" protection mechanism might provide some defenses - for example, against the most common attacks - but it does not protect against everything that is intended. Finally, an "ignored" mechanism occurs when a mechanism is available and in active use within the product, but the developer has not applied it in some code path. 699 Category ChildOf 254 888 Category ChildOf 907 This is a fairly high-level concept, although it covers a number of weaknesses in CWE that were more scattered throughout the natural hierarchy before Draft 9 was released. Architecture and Design Implementation Operation Access_Control Bypass protection mechanism The concept of protection mechanisms is well established, but protection mechanism failures have not been studied comprehensively. It is suspected that protection mechanisms can have significantly different types of weaknesses than the weaknesses that they are intended to prevent. 1 103 107 127 16 17 20 22 237 36 49 51 55 56 57 59 65 70 74 87 97 Eric Dalci Cigital 2008-07-01 updated Time_of_Introduction CWE Content Team MITRE 2008-09-08 updated Description, Relationships, Other_Notes CWE Content Team MITRE 2009-01-12 updated Relationships CWE Content Team MITRE 2009-03-10 updated Related_Attack_Patterns, Relationships CWE Content Team MITRE 2009-05-27 updated Description, Related_Attack_Patterns CWE Content Team MITRE 2009-07-27 updated Relationships CWE Content Team MITRE 2009-10-29 updated Relationships CWE Content Team MITRE 2010-02-16 updated Relationships CWE Content Team MITRE 2011-03-29 updated Maintenance_Notes, Other_Notes, Relationships CWE Content Team MITRE 2011-06-01 updated Common_Consequences CWE Content Team MITRE 2012-05-11 updated Related_Attack_Patterns, Relationships