| ID | Name |
|---|---|
| T2046.001 | Inter-Task Compromise |
| T2046.002 | Inter-Application Compromise |
A compromised task is able to exploit inadequate memory isolation policies and compromise the Confidentiality, Integrity and/or Availability of another task's assets. The two tasks are running in the same execution environment. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.