Exploitation for Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Update Software
Quick Info
- Technique ID
- T1679
- Tactic
- Impact
- Mitigations
- 1
