ID | Name |
---|---|
T2046.001 | Inter-Task Compromise |
T2046.002 | Inter-Application Compromise |
In hypervisor environments, compromising one guest application could lead to unauthorized interactions with other applications, exploiting weaknesses in spatial or temporal isolation. This was evidenced by proof of concept attacks exploiting the hypervisor’s scheduling policies.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.