AC-2
|
Account Management
| Protects |
T1574
|
Hijack Execution Flow
|
AC-3
|
Access Enforcement
| Protects |
T1574
|
Hijack Execution Flow
|
AC-4
|
Information Flow Enforcement
| Protects |
T1574
|
Hijack Execution Flow
|
AC-5
|
Separation of Duties
| Protects |
T1574
|
Hijack Execution Flow
|
AC-6
|
Least Privilege
| Protects |
T1574
|
Hijack Execution Flow
|
CA-7
|
Continuous Monitoring
| Protects |
T1574
|
Hijack Execution Flow
|
CA-8
|
Penetration Testing
| Protects |
T1574
|
Hijack Execution Flow
|
CM-2
|
Baseline Configuration
| Protects |
T1574
|
Hijack Execution Flow
|
CM-5
|
Access Restrictions for Change
| Protects |
T1574
|
Hijack Execution Flow
|
CM-6
|
Configuration Settings
| Protects |
T1574
|
Hijack Execution Flow
|
CM-7
|
Least Functionality
| Protects |
T1574
|
Hijack Execution Flow
|
CM-8
|
System Component Inventory
| Protects |
T1574
|
Hijack Execution Flow
|
IA-2
|
Identification and Authentication (organizational Users)
| Protects |
T1574
|
Hijack Execution Flow
|
RA-5
|
Vulnerability Monitoring and Scanning
| Protects |
T1574
|
Hijack Execution Flow
|
SI-10
|
Information Input Validation
| Protects |
T1574
|
Hijack Execution Flow
|
SI-2
|
Flaw Remediation
| Protects |
T1574
|
Hijack Execution Flow
|
SI-3
|
Malicious Code Protection
| Protects |
T1574
|
Hijack Execution Flow
|
SI-4
|
System Monitoring
| Protects |
T1574
|
Hijack Execution Flow
|
SI-7
|
Software, Firmware, and Information Integrity
| Protects |
T1574
|
Hijack Execution Flow
|
CVE-2019-12660
|
Cisco IOS XE Software 3.2.11aSG
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-15376
|
Cisco IOS Software
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3198
|
Cisco IOS 12.2(60)EZ16
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-3309
|
Cisco Firepower Threat Defense Software
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-3723
|
OpenManage Server Administrator
| secondary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-11049
|
Pivotal Operations Manager
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5210
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15211
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15100
|
freewvs
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5254
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-4068
|
APNSwift
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15208
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-11039
|
FreeRDP
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-15199
|
tensorflow
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-11068
|
LoRaMac-node
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-5253
|
NetHack
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-7499
|
WebAccess
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-10980
|
LCDS LAquis SCADA
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-6538
|
Medtronic Conexus Radio Frequency Telemetry Protocol
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-14819
|
V-Server
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-10610
|
LeviStudioU
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-14809
|
V-Server
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-10636
|
CNCSoft with ScreenEditor
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-7494
|
Delta Electronics WPLSoft
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-13522
|
EZ PLC Editor
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-17910
|
WebAccess Versions 8.3.2 and prior.
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8835
|
Advantech WebAccess HMI Designer
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-10620
|
InduSoft Web Studio
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-18987
|
n/a
| secondary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0911
|
Internet Explorer 11
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8355
|
ChakraCore
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-0671
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-0898
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1118
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1109
|
Windows
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0576
|
Windows 7
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1495
|
Microsoft SharePoint Server 2010 Service Pack 2
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1425
|
Windows 10 Version 2004 for x64-based Systems
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8248
|
Microsoft Office
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8111
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-1569
|
Microsoft Edge (EdgeHTML-based)
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-16874
|
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0609
|
Internet Explorer 11
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8353
|
n/a
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2018-8110
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1106
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1035
|
Microsoft Office
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-0926
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2019-1052
|
Microsoft Edge
| primary_impact |
T1574
|
Hijack Execution Flow
|
CVE-2020-4100
|
"HCL Verse for Android"
| uncategorized |
T1574
|
Hijack Execution Flow
|
CVE-2020-0688
|
Microsoft Exchange Server 2013
| uncategorized |
T1574
|
Hijack Execution Flow
|
CVE-2019-0708
|
Windows
| uncategorized |
T1574
|
Hijack Execution Flow
|
action.hacking.variety.Unknown
|
Unknown
| related-to |
T1574
|
Hijack Execution Flow
|
action.hacking.variety.XML injection
|
XML injection. Child of 'Exploit vuln'.
| related-to |
T1574
|
Hijack Execution Flow
|
action.hacking.vector.Backdoor or C2
|
Backdoor or command and control channel
| related-to |
T1574
|
Hijack Execution Flow
|
action.malware.variety.Backdoor
|
Backdoor (enable remote access). Child of 'RAT' when combined with 'Trojan'
| related-to |
T1574
|
Hijack Execution Flow
|