Exploitation for Evasion

Description

Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to evade detection. Vulnerabilities may exist in software that can be used to disable or circumvent security features.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementComputerActive vulnerabilities detected by Tenable Vulnerability Management plugins
Tenable OT SecurityOT DeviceActive vulnerabilities detected by detected by Tenable OT Security plugins

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Evasion

Platform: None

Tenable Release Date: 2024 Q2