Exploit OS Vulnerability

Attackers exploit a vulnerability in the operating system (OS) to gain higher permissions or privileges on a computer system. This could be a security hole, a software malfunction or unexpected behavior in the operating system. The attacker develops an exploit that is specifically tailored to the identified vulnerability. Once executed, the attacker can gain access to system resources, administrative accounts, or other sensitive information.

Technique_ID
ATE-044
Type
Technique
Severity of Impact
Critical
Severity of Feasibility
Medium
Domain
Automotive
Rail