Software installed and run as a non-privileged user may conduct improper read/write operations on imported/exported DMA buffers.
Weakness
A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Potential Mitigations
References