Critical Infrastructure Cybersecurity Framework
T1679Impact1 Mitigations

Exploitation for Privilege Escalation

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Update Software

Quick Info

Technique ID
T1679
Tactic
Impact
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.