CAPEC 234 Hijacking a privileged process

Draft Standard Unknown Risk
Severity Medium

Description

An adversary gains control of a process that is assigned elevated privileges in order to execute arbitrary code with those privileges. Some processes are assigned elevated privileges on an operating system, usually through association with a particular user, group, or role. If an attacker can hijack this process, they will be able to assume its level of privilege in order to execute their own code.

Attack Execution Flow

3

Consequences

Relationships

Resources Required

1