Permission verification vulnerability in the system module. Impact: Successful exploitation of this vulnerability will affect availability.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.