Description
This weaknesses are related to the management of permissions (something that must be requested and granted every time you perform the action). Granting of it depends on the circumstances of the situation, for example, the ability of the users to view, change, navigate, and execute the contents of the filesystem), privileges (allows a user to perform an action, for example, the ability to create a file in a directory, or to read or delete a file, access a device) and other security features that are used to perform access control.
Latest vulnerabilities for CWE-264
References
Description of CWE-264 on Mitre website