CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1203Execution3 Mitigations

Exploitation for Client Execution

Adversaries may exploit software vulnerabilities in client applications to execute code.

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Application Isolation and SandboxingExploit ProtectionUpdate Software

Quick Info

Technique ID
T1203
Tactic
Execution
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.