Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Exploit TEE Vulnerability

A malicious app or other attack vector could be used to exploit vulnerabilities in code running within the Trusted Execution Environment (TEE) [1]. The adversary could then obtain privileges held by the TEE potentially including the ability to access cryptographic keys or other sensitive data [2]. Escalated operating system privileges may be first required in order to have the ability to attack the TEE [3]. If not, privileges within the TEE can potentially be used to exploit the operating system [4].

ID: T1405
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactics: Credential Access, Privilege Escalation
Platforms: Android
MTC ID: APP-27
Version: 1.0
Created: 25 October 2017
Last Modified: 17 October 2018

Mitigations

Mitigation Description
Application Vetting
Security Updates
Use Recent OS Version

References