Escape to Host

If containers or hypervisors are used, an attacker could overcome the container fences and gain access to the host system. Separations between applications may be defeated, and malicious operations could affect other functionalities. This attack can leverage common utilities, schedulers, shared memory, or vulnerabilities. [1]

"Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command-and-control channel on the host." [2]

ID: T1611
Sub-techniques:  T1611.001
Platforms: Ground Segment, Space Segment
Version: 2.0
Created: 23 September 2022
Last Modified: 05 February 2025

Mitigations

References