A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.