Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 115 | Authentication Bypass |
ParentOf | D | 237 | Escaping a Sandbox by Calling Code in Another Language |
Probing
The adversary probes the target application, service, or device to find a possible weakness that would allow escaping the virtualized environment.
Technique |
---|
Probing applications, services, or devices for virtualization weaknesses. |
Verify the exploitable security weaknesses
Using the found weakness, the adversary attempts to escape the virtualized environment.
Technique |
---|
Using an application weakness to escape a virtualized environment |
Execute more complex attacks
Once outside of the virtualized environment, the adversary attempts to perform other more complex attacks such as accessing system resources or executing unauthorized code within the host environment.
Technique |
---|
Executing complex attacks when given higher permissions by escaping a virtualized environment |
Scope | Likelihood | Impact | Note |
---|---|---|---|
Access ControlAuthorization | N/A | Bypass Protection Mechanism | N/A |
Authorization | N/A | Execute Unauthorized Commands | Run Arbitrary Code |
AccountabilityAuthenticationAuthorizationNon-Repudiation | N/A | Gain Privileges | N/A |
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
ATTACK | 1611 | Escape to Host |