ID | Name |
---|---|
T2046.001 | Inter-Task Compromise |
T2046.002 | Inter-Application Compromise |
This attack path involves compromising a single task within an RTOS and leveraging inadequate memory isolation to influence or control other tasks. In a proof of concept, this was demonstrated through the attack that exploited the lack of access control in  vTaskPrioritySet system call, enabling a compromised task could manipulate the scheduling and execution of others.Â
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.