Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Abuse Elevation Control Mechanism: TCC Manipulation Defense Evasion Adversaries can manipulate or abuse the Transparency, Consent, & Control (TCC) service or database t… Edit
Abuse Elevation Control Mechanism Privilege Escalation Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level pe… Edit
Abuse Elevation Control Mechanism: Bypass User Account Control Privilege Escalation Adversaries may bypass UAC mechanisms to elevate process privileges on system. Windows User Account … Edit
Abuse Elevation Control Mechanism: Elevated Execution with Prompt Privilege Escalation Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompt… Edit
Abuse Elevation Control Mechanism: Setuid and Setgid Privilege Escalation An adversary may abuse configurations where an application has the setuid or setgid bits set in orde… Edit
Abuse Elevation Control Mechanism: Sudo and Sudo Caching Privilege Escalation Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges. Adversaries … Edit
Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access Privilege Escalation Adversaries may abuse permission configurations that allow them to gain temporarily elevated access … Edit