Threat H.M.HmACPAC.4

URI: H.M.HmACPAC.4

Package: VulnerabilityCVSS

< prev | next >

Description: Attacker exploit at Process in location Space gains admin rights at Host: the attacker exploits a vulnerability in the process Process when its host Host is in Space, and is able to escalate privileges to gain admin rights on Host in that context.

Threat Type: Primary Threat

Matching Pattern:

H.M.HmACPAC.4
MP-HmACPAC

Finds a process running on a host in a space and an associated process location access context, plus related host access contexts and optionally the host manager and process user.

        (empty)

        (empty)

CSG-SuspendVulnerableProcess

Process Process may be temporarily disabled by the manager of its host HostManager to prevent vulnerabilities being exploited by potential attackers. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it may triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-SuspendVulnerableProcess-Implementation-Runtime

Process Process has been disabled by the manager of its host HostManager to prevent a known vulnerability being exploited by an attacker. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user HostManager who is responsible for managing device Host where Process is running. The Disabled Process control should be deselected only when the process has been restarted.