Known Exploited Vulnerabilities Security Feature Bypass Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-21715 Microsoft Office Publisher Security Feature Bypass Vulnerability exploitation_technique T1204.002 Malicious File
Comments
CVE-2023-21715 is a security feature bypass vulnerability exploitable when a user opens a specially-crafted file bypassing macro policies.
References
CVE-2021-31207 Microsoft Exchange Server Security Feature Bypass Vulnerability primary_impact T1565 Data Manipulation
CVE-2021-31207 Microsoft Exchange Server Security Feature Bypass Vulnerability exploitation_technique T1548.002 Bypass User Account Control
CVE-2015-0310 Adobe Flash Player ASLR Bypass Vulnerability exploitation_technique T1189 Drive-by Compromise
Comments
This vulnerability is exploited with maliciously-crafted code hosted on a website via drive-by compromise. It has been seen used in the wild by exploit kits.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability exploitation_technique T1203 Exploitation for Client Execution
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability secondary_impact T1562 Impair Defenses
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability secondary_impact T1106 Native API
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability secondary_impact T1001 Data Obfuscation
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability secondary_impact T1557 Adversary-in-the-Middle
Comments
A strategic zero-click iMessage exploit chain (CVE-2025-31200 / 31201) has been reported as compromising targeted devices with Paragon's Graphite spyware. Observed impacts include Secure Enclave key exfiltration, silent wallet theft, C2 infrastructure, and persistent C2 communication.
References
CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability exploitation_technique T1566.001 Spearphishing Attachment
Comments
Attackers can double-archive malicious payloads with 7-Zip to bypass Windows's Mark-of-the-Web security feature, further allowing the bypassing of Microsoft Defender SmartScreen. This allows attackers to disseminate these payloads via methods like email attachments, which would normally be subject to additional scrutiny by the service's protective measures. This flaw was patched in 7-Zip version 24.09.
References
CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability exploitation_technique T1553.005 Mark-of-the-Web Bypass
Comments
Attackers can double-archive malicious payloads with 7-Zip to bypass Windows's Mark-of-the-Web security feature, further allowing the bypassing of Microsoft Defender SmartScreen. This allows attackers to disseminate these payloads via methods like email attachments, which would normally be subject to additional scrutiny by the service's protective measures. This flaw was patched in 7-Zip version 24.09.
References
CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability primary_impact T1588.001 Malware
Comments
Attackers can double-archive malicious payloads with 7-Zip to bypass Windows's Mark-of-the-Web security feature, further allowing the bypassing of Microsoft Defender SmartScreen. This allows attackers to disseminate these payloads via methods like email attachments, which would normally be subject to additional scrutiny by the service's protective measures. This flaw was patched in 7-Zip version 24.09.
References
CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability exploitation_technique T1566.002 Spearphishing Link
Comments
Attackers can send a specially crafted email that uses the file:// protocol to reference a server that they own, ending the file:// link with an exclamation mark to bypass Outlook's security features, leading to remote code execution.
References
CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
Attackers can send a specially crafted email that uses the file:// protocol to reference a server that they own, ending the file:// link with an exclamation mark to bypass Outlook's security features, leading to remote code execution.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2021-31207 Microsoft Exchange Server Security Feature Bypass Vulnerability 2
CVE-2024-21413 Microsoft Outlook Improper Input Validation Vulnerability 2
CVE-2025-31201 Apple Multiple Products Arbitrary Read and Write Vulnerability 7
CVE-2025-0411 7-Zip Mark of the Web Bypass Vulnerability 3
CVE-2015-0310 Adobe Flash Player ASLR Bypass Vulnerability 1
CVE-2023-21715 Microsoft Office Publisher Security Feature Bypass Vulnerability 1