Exploit OS Vulnerability
TID
ATE-044
Attackers exploit a vulnerability in the operating system (OS) to gain higher permissions or privileges on a computer system. This could be a security hole, a software malfunction or unexpected behavior in the operating system. The attacker develops an exploit that is specifically tailored to the identified vulnerability. Once executed, the attacker can gain access to system resources, administrative accounts, or other sensitive information.
Tactic
Type
Technique
Severity of Impact
Critical
Severity of Feasibility
Medium
Domain
Automotive
Rail