Vulnerability Discussion
Without reauthentication, users may access resources or perform tasks for which they do not have authorization.
When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate.
Check
Verify the operating system requires users to reauthenticate for privilege escalation. If it does not, this is a finding.
Fix
Configure the operating system to require users to reauthenticate for privilege escalation.