T1068 Exploitation for Privilege Escalation Mappings

Adversaries may exploit software vulnerabilities in an attempt to collect elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions.

When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This may be a necessary step for an adversary compromising a endpoint system that has been properly configured and limits other privilege escalation methods.

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-2 Account Management Protects T1068 Exploitation for Privilege Escalation
AC-4 Information Flow Enforcement Protects T1068 Exploitation for Privilege Escalation
AC-6 Least Privilege Protects T1068 Exploitation for Privilege Escalation
CA-7 Continuous Monitoring Protects T1068 Exploitation for Privilege Escalation
CA-8 Penetration Testing Protects T1068 Exploitation for Privilege Escalation
CM-2 Baseline Configuration Protects T1068 Exploitation for Privilege Escalation
CM-6 Configuration Settings Protects T1068 Exploitation for Privilege Escalation
CM-8 System Component Inventory Protects T1068 Exploitation for Privilege Escalation
RA-10 Threat Hunting Protects T1068 Exploitation for Privilege Escalation
RA-5 Vulnerability Monitoring and Scanning Protects T1068 Exploitation for Privilege Escalation
SC-18 Mobile Code Protects T1068 Exploitation for Privilege Escalation
SC-2 Separation of System and User Functionality Protects T1068 Exploitation for Privilege Escalation
SC-26 Decoys Protects T1068 Exploitation for Privilege Escalation
SC-29 Heterogeneity Protects T1068 Exploitation for Privilege Escalation
SC-3 Security Function Isolation Protects T1068 Exploitation for Privilege Escalation
SC-30 Concealment and Misdirection Protects T1068 Exploitation for Privilege Escalation
SC-35 External Malicious Code Identification Protects T1068 Exploitation for Privilege Escalation
SC-39 Process Isolation Protects T1068 Exploitation for Privilege Escalation
SC-7 Boundary Protection Protects T1068 Exploitation for Privilege Escalation
SI-2 Flaw Remediation Protects T1068 Exploitation for Privilege Escalation
SI-3 Malicious Code Protection Protects T1068 Exploitation for Privilege Escalation
SI-4 System Monitoring Protects T1068 Exploitation for Privilege Escalation
SI-5 Security Alerts, Advisories, and Directives Protects T1068 Exploitation for Privilege Escalation
SI-7 Software, Firmware, and Information Integrity Protects T1068 Exploitation for Privilege Escalation
alerts_for_windows_machines Alerts for Windows Machines technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
azure_security_center_recommendations Azure Security Center Recommendations technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control's "Container with privilege escalation should be avoided", "Least privileged Linux capabilities should be enforced for containers", "Privileged containers should be avoided", "Running containers as root user should be avoided" and "Containers sharing sensitive host namespaces should be avoided" recommendations can make it difficult for adversaries to advance their operation through exploitation of undiscovered or unpatched vulnerabilities. Because this is a recommendation, the assessed score has been capped at Partial.
References
linux_auditd_alerts_and_log_analytics_agent_integration Linux auditd alerts and Log Analytics agent integration technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control may alert on suspicious arguments used to exploit Xorg vulnerabilities for privilege escalation.
References
azure_defender_for_resource_manager Azure Defender for Resource Manager technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control may alert on escalation attempts from Azure AD to Azure accounts by specific exploitation toolkits. Consequently, its Coverage score is Minimal resulting in an overall Minimal score. The following alerts may be generated: "PowerZure exploitation toolkit used to elevate access from Azure AD to Azure".
References
azure_sentinel Azure Sentinel technique_scores T1068 Exploitation for Privilege Escalation
Comments
The Azure Sentinel Analytics "Powershell Empire cmdlets seen in command line" query can detect the use of Empire, which can exploit known system vulnerabilities, but does not explicitly address other procedures.
References
azure_defender_for_kubernetes Azure Defender for Kubernetes technique_scores T1068 Exploitation for Privilege Escalation
azure_automation_update_management Azure Automation Update Management technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control provides significant coverage of methods that leverage vulnerabilities in unpatched software since it enables automated updates of software and rapid configuration change management
References
azure_policy Azure Policy technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control may provide recommendations for vulnerability assessment and outdated applications and cloud services. This control covers a wide range of Azure cloud services to help reduce the surface area for exploitation.
References
azure_defender_for_app_service Azure Defender for App Service technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate.
References
azure_defender_for_container_registries Azure Defender for Container Registries technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control may provide recommendations to avoid privileged containers and running containers as root.
References
sql_vulnerability_assessment SQL Vulnerability Assessment technique_scores T1068 Exploitation for Privilege Escalation
integrated_vulnerability_scanner_powered_by_qualys Integrated Vulnerability Scanner Powered by Qualys technique_scores T1068 Exploitation for Privilege Escalation
Comments
Once this control is deployed, it can detect known vulnerabilities in Windows and various Linux endpoints. This information can be used to patch, isolate, or remove vulnerable software and machines. This control does not directly protect against exploitation and it is not effective against zero day attacks, vulnerabilities with no available patch, and software that may not be analyzed by the scanner. As a result, the score is capped at Partial.
References
docker_host_hardening Docker Host Hardening technique_scores T1068 Exploitation for Privilege Escalation
Comments
This control may provide recommendations on how to reduce the surface area and mechanisms by which an attacker could escalate privileges.
References