Exploit TEE Vulnerability
TID
ATE-046
An attacker can gain privileges held by the TEE by exploiting the Trusted Execution Environment (TEE) vulnerabilities. This can give him access to sensitive data and cryptography material or allow manipulation of the data.
Tactic
Type
Technique
Severity of Impact
Critical
Severity of Feasibility
High
Domain
Automotive
Rail