File and directory permissions have been corrected to prevent unintended users from modifying or accessing resources. It would be more difficult for an authenticated attacker to now traverse through the files and directories. This can only be exploited once an attacker has already found a way to get authenticated access to the device.
Solution:
Weaknesses in this category are related to improper assignment or handling of permissions.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.