Exploitation of Remote Services

Description

Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to enable remote service abuse. A common goal for post-compromise exploitation of remote services is for initial access into and lateral movement throughout the ICS environment to enable access to targeted systems.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementComputerActive vulnerabilities detected by Tenable Vulnerability Management plugins
Tenable OT SecurityOT DeviceActive vulnerabilities detected by detected by Tenable OT Security plugins

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Initial Access, Lateral Movement

Platform: OT

Tenable Release Date: 2024 Q2