Threat Event
An adversary exploits a weakness enabling them to elevate their privilege and perform an action that they are not supposed to be authorized to perform.
|
|
| ID | CAPEC-233 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 233 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | |
| Typical Severity | |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | |
| Skills Required | |
| Resources Required | |
| Indicators | |
| Consequences | |
| Mitigations | |
| Example Instances | |
| Related Weaknesses | ::269::1264::1311:: |
| Taxonomy Mappings | TAXONOMY NAME:ATTACK:ENTRY ID:1548:ENTRY NAME:Abuse Elevation Control Mechanism:: |
| Notes | |