AC-2 |
Account Management |
Protects |
T1068 |
Exploitation for Privilege Escalation |
AC-4 |
Information Flow Enforcement |
Protects |
T1068 |
Exploitation for Privilege Escalation |
AC-6 |
Least Privilege |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CA-7 |
Continuous Monitoring |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CA-8 |
Penetration Testing |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CM-2 |
Baseline Configuration |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CM-6 |
Configuration Settings |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CM-7 |
Least Functionality |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CM-8 |
System Component Inventory |
Protects |
T1068 |
Exploitation for Privilege Escalation |
RA-10 |
Threat Hunting |
Protects |
T1068 |
Exploitation for Privilege Escalation |
RA-5 |
Vulnerability Monitoring and Scanning |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-18 |
Mobile Code |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-2 |
Separation of System and User Functionality |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-26 |
Decoys |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-29 |
Heterogeneity |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-3 |
Security Function Isolation |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-30 |
Concealment and Misdirection |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-35 |
External Malicious Code Identification |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-39 |
Process Isolation |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SC-7 |
Boundary Protection |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SI-2 |
Flaw Remediation |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SI-3 |
Malicious Code Protection |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SI-4 |
System Monitoring |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SI-5 |
Security Alerts, Advisories, and Directives |
Protects |
T1068 |
Exploitation for Privilege Escalation |
SI-7 |
Software, Firmware, and Information Integrity |
Protects |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-15976 |
Cisco Data Center Network Manager |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1753 |
Cisco IOS XE Software |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1879 |
Cisco Unified Computing System (Management Software) |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1863 |
Cisco Unified Computing System E-Series Software (UCSE) |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-3403 |
Cisco IOS XE Software |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-3216 |
Cisco IOS XE SD-WAN Software |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1889 |
Cisco Application Policy Infrastructure Controller (APIC) |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1764 |
Cisco Wireless IP Phone 8821 and 8821-EX |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-3387 |
Cisco SD-WAN vManage |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1876 |
Cisco Wide Area Application Services (WAAS) |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1612 |
Nexus 3000 Series Switches |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1609 |
MDS 9000 Series Multilayer Switches |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1611 |
Firepower 4100 Series Next-Generation Firewalls |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1915 |
Cisco Unified Communications Manager |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1790 |
Cisco NX-OS Software |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-3735 |
Dell SupportAssist for Business PCs |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-15782 |
RSA Authentication Manager |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5326 |
Dell Client Consumer and Commercial Platforms |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-3727 |
RecoverPoint |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-3704 |
VNX Control Station in Dell EMC VNX2 OE for File |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5358 |
Dell Encryption Enterprise |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5371 |
Isilon OneFS |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-15761 |
UAA |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-15797 |
NFS Volume Release |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5362 |
Dell Client Consumer and Commercial platforms |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-11088 |
Application Service |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-15758 |
Spring Security OAuth |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-3780 |
Cloud Foundry Container Runtime (CFCR) |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5369 |
Isilon OneFS |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-3798 |
CAPI-release |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-11060 |
RSA Archer |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5328 |
Isilon OneFS |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-15774 |
iDRAC |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-16784 |
PyInstaller |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-10636 |
CNCSoft with ScreenEditor |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-7500 |
OSIsoft PI Web API |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-6964 |
GE CARESCAPE Telemetry Server,ApexPro Telemetry Server,CARESCAPE Central Station,Clinical Information Center systems,CARESCAPE B450,B650,B850 Monitors |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-14510 |
GateManager |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-7004 |
VBASE Editor |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-17908 |
WebAccess Versions 8.3.2 and prior. |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-1111 |
Windows |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1087 |
Windows |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1086 |
Windows |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-1347 |
Windows 10 Version 2004 for 32-bit Systems |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-0758 |
Team Foundation Server 2018 |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1021 |
Windows |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1423 |
Windows 10 Version 1903 for 32-bit Systems |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-1190 |
Windows |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-8575 |
Microsoft Project |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1402 |
Microsoft Office |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-0981 |
Windows 10 Version 1909 for 32-bit Systems |
secondary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-1471 |
Windows 10 Version 1803 |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-0636 |
Windows 10 Version 1903 for 32-bit Systems |
primary_impact |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-2945 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-4114 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-8835 |
Linux kernel |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-8467 |
Trend Micro OfficeScan, Trend Micro Apex One |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-12659 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-10751 |
kernel |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-1027 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1215 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-1214 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-0859 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-9862 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-9488 |
Android |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-8599 |
Microsoft Visual Studio |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-5463 |
LCDS - Leão Consultoria e Desenvolvimento de Sistemas LTDA ME LAquis SCADA |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-11776 |
Apache Struts |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-1274 |
Domino |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-0263 |
Microsoft Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2016-5195 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-7910 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-2387 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-2360 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-0016 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-4113 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-1807 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-0322 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2012-0181 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-2884 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-2743 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2009-1612 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5539 |
GRANDIT |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-13289 |
Android |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-15821 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2013-0707 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-10817 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-5786 |
Chrome |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-0213 |
Windows COM |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-2215 |
Android |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-0808 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-7533 |
Linux kernel through 4.12.4 |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-8649 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-12652 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-6324 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-5954 |
JR East Japan train operation information push notification App for Android |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2008-4996 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-15211 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2010-1592 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1769 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2016-6367 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1701 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2012-4681 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2011-1331 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2013-0640 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2017-5638 |
Apache Struts |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1494 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2015-1805 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-9081 |
|
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-12653 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-11608 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2014-4148 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-11651 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-5300 |
hydra |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2013-5065 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2008-0655 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2020-0688 |
Microsoft Exchange Server 2013 |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2019-0708 |
Windows |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-19831 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
CVE-2018-19830 |
n/a |
uncategorized |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Exploit misconfig |
Exploit a misconfiguration (vs vuln or weakness) |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Exploit vuln |
Exploit vulnerability in code (vs misconfig or weakness). This can be used with other hacking enumerations, (such as XSS when an XSS vuln exists.). Parent of many hacking varieties. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Format string attack |
Format string attack. Child of 'Exploit vuln'. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Fuzz testing |
Fuzz testing. Child of 'Exploit vuln'. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Insecure deserialization |
iterating over sequential or obvious values. https://www.owasp.org/index.php/Top_10-2017_A8-Insecure_Deserialization. Child of 'Exploit vuln'. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.Integer overflows |
Integer overflows. Child of 'Exploit vuln'. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.hacking.variety.LDAP injection |
LDAP injection. Child of 'Exploit vuln'. |
related-to |
T1068 |
Exploitation for Privilege Escalation |
action.malware.variety.Exploit misconfig |
Exploit a misconfiguration (vs vuln or weakness) |
related-to |
T1068 |
Exploitation for Privilege Escalation |
aws_config |
AWS Config |
technique_scores |
T1068 |
Exploitation for Privilege Escalation |
amazon_inspector |
Amazon Inspector |
technique_scores |
T1068 |
Exploitation for Privilege Escalation |
aws_security_hub |
AWS Security Hub |
technique_scores |
T1068 |
Exploitation for Privilege Escalation |