CAPEC-480

Escaping Virtualization
Niedrig
Draft
2019-09-30
00h00 +00:00
2021-10-21
00h00 +00:00
Benachrichtigung für ein CAPEC
Bleiben Sie über alle Änderungen zu einem bestimmten CAPEC informiert.
Benachrichtigungen verwalten

CAPEC-Beschreibungen

An adversary gains access to an application, service, or device with the privileges of an authorized or privileged user by escaping the confines of a virtualized environment. The adversary is then able to access resources or execute unauthorized code within the host environment, generally with the privileges of the user running the virtualized process. Successfully executing an attack of this type is often the first step in executing more complex attacks.

CAPEC-Informationen

Ausführungsablauf

1) Explore

[Probing] The adversary probes the target application, service, or device to find a possible weakness that would allow escaping the virtualized environment.

Technik
  • Probing applications, services, or devices for virtualization weaknesses.
2) Experiment

[Verify the exploitable security weaknesses] Using the found weakness, the adversary attempts to escape the virtualized environment.

Technik
  • Using an application weakness to escape a virtualized environment
3) Exploit

[Execute more complex attacks] Once outside of the virtualized environment, the adversary attempts to perform other more complex attacks such as accessing system resources or executing unauthorized code within the host environment.

Technik
  • Executing complex attacks when given higher permissions by escaping a virtualized environment

Gegenmaßnahmen

Ensure virtualization software is current and up-to-date.
Abide by the least privilege principle to avoid assigning users more privileges than necessary.

Verwandte Schwachstellen

CWE-ID Name der Schwachstelle

CWE-693

Protection Mechanism Failure
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.

Einreichung

Name Organisation Datum Veröffentlichungsdatum
CAPEC Content Team The MITRE Corporation 2019-09-30 +00:00

Änderungen

Name Organisation Datum Kommentar
CAPEC Content Team The MITRE Corporation 2020-12-17 +00:00 Updated Resources_Required
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00 Updated Taxonomy_Mappings
CAPEC Content Team The MITRE Corporation 2021-10-21 +00:00 Updated Execution_Flow