Vulnerability Discussion
Without reauthentication, users may access resources or perform tasks for which they do not have authorization.
When operating systems provide the capability to change security roles, it is critical the user reauthenticate.
Check
Verify the operating system requires users to reauthenticate when changing roles. If it does not, this is a finding.
Fix
Configure the operating system to require users to reauthenticate when changing roles.