| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes | 
|---|---|---|---|---|---|
| CVE-2018-4878 | Adobe Flash Player Use-After-Free Vulnerability | secondary_impact | T1041 | Exfiltration Over C2 Channel | Comments The exploitation technique for this vulnerability is based on a vulnerability in Client software.  In the wild, this was seen to be exploited by a malicious excel file.
The observed goals of this exploit from Group 123 are remote access and data exfiltration. References | 
| CVE-2018-4878 | Adobe Flash Player Use-After-Free Vulnerability | primary_impact | T1219 | Remote Access Software | Comments The exploitation technique for this vulnerability is based on a vulnerability in Client software.  In the wild, this was seen to be exploited by a malicious excel file.
The observed goals of this exploit from Group 123 are remote access and data exfiltration.
Installation of the remote access software could allow for a number of different secondary impacts. See the MITRE ATT&CK reference on the DOGCALL software for more information. References | 
| CVE-2018-4878 | Adobe Flash Player Use-After-Free Vulnerability | exploitation_technique | T1204.002 | Malicious File | Comments The exploitation technique for this vulnerability is based on a vulnerability in Client software.  In the wild, this was seen to be exploited by a malicious excel file.
The observed goals of this exploit from Group 123 are remote access and data exfiltration. References |