Vulnerability Discussion
Without reauthentication, users may access resources or perform tasks for which they do not have authorization.
When operating systems provide the capability to change user authenticators, it is critical the user reauthenticate.
Check
Verify the operating system requires users to reauthenticate when changing authenticators. If it does not, this is a finding.
Fix
Configure the operating system to require users to reauthenticate when changing authenticators.