CAPEC-480: Escaping Virtualization

Standard Draft 严重程度: Very High 攻击可能性: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary gains access to an application, service, or device with the privileges of an authorized or privileged user by escaping the confines of a virtualized environment. The adversary is then able to access resources or execute unauthorized code within the host environment, generally with the privileges of the user running the virtualized process. Successfully executing an attack of this type is often the first step in executing more complex attacks.

执行流程

步骤 1 Explore

[Probing] The adversary probes the target application, service, or device to find a possible weakness that would allow escaping the virtualized environment.

技术:
  • Probing applications, services, or devices for virtualization weaknesses.
步骤 2 Experiment

[Verify the exploitable security weaknesses] Using the found weakness, the adversary attempts to escape the virtualized environment.

技术:
  • Using an application weakness to escape a virtualized environment
步骤 3 Exploit

[Execute more complex attacks] Once outside of the virtualized environment, the adversary attempts to perform other more complex attacks such as accessing system resources or executing unauthorized code within the host environment.

技术:
  • Executing complex attacks when given higher permissions by escaping a virtualized environment

后果影响

影响范围: Access Control Authorization

技术影响: Bypass Protection Mechanism

影响范围: Authorization

技术影响: Execute Unauthorized Commands

说明: Run Arbitrary Code

影响范围: Accountability Authentication Authorization Non-Repudiation

技术影响: Gain Privileges

缓解措施

Ensure virtualization software is current and up-to-date.

Abide by the least privilege principle to avoid assigning users more privileges than necessary.

分类映射

分类名称 条目ID 条目名称
ATTACK 1611 Escape to Host
关键信息

CAPEC ID: CAPEC-480

抽象级别: Standard

状态: Draft

典型严重程度: Very High

攻击可能性: Low

相关攻击模式
相关CWE弱点