Privilege Escalation
The adversary is trying to gain higher-level permissions.
Technique-ID | Title | Description |
---|---|---|
ATE-043 | Exploit Application Vulnerability |
Attackers use this technique to gain higher privileges on a computer system by exploiting a vulnerability in application software. The attacker looks for vulnerabilities in application software installed on the target system. This could be a security vulnerability in any application such as web browsers, office programs, PDF viewers or other software. After the vulnerability is identified, the attacker develops a special "exploit" that targets the vulnerability. The attacker executes the exploit on the target system using the application affected by the vulnerability. After successful execution, the attacker can gain higher privileges on the system. |
ATE-044 | Exploit OS Vulnerability |
Attackers exploit a vulnerability in the operating system (OS) to gain higher permissions or privileges on a computer system. This could be a security hole, a software malfunction or unexpected behavior in the operating system. The attacker develops an exploit that is specifically tailored to the identified vulnerability. Once executed, the attacker can gain access to system resources, administrative accounts, or other sensitive information. |
ATE-045 | Hardware Fault Injection |
Refers to the deliberate introduction of faults into a vehicle's hardware components to exploit vulnerabilities and escalate privileges. This technique manipulates the hardware's normal operations, potentially granting attackers unauthorized access or control over vehicle systems. |
ATE-047 | Reprogram ECU for privilege escalation |
An attacker installs a new firmware that grants him more rights on the systems. |