Exfiltration via C-V2X

Attackers utilize C-V2X communication channels to siphon off vehicle data, exploiting the broader connectivity features of modern vehicles.

Technique_ID
ATE-081
Type
Technique
Severity of Impact
High
Severity of Feasibility
Medium
Scalability
Highly
Domain
Automotive