Common Information
Type Value
Value
Exploitation for Client Execution - T1658
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to insecure coding practices that can lead to unanticipated behavior. Adversaries may take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility. Adversaries may use device-based zero-click exploits for code execution. These exploits are powerful because there is no user interaction required for code execution. ### SMS/iMessage Delivery SMS and iMessage in iOS are common targets through [Drive-By Compromise](https://attack.mitre.org/techniques/T1456), [Phishing](https://attack.mitre.org/techniques/T1660), etc. Adversaries may use embed malicious links, files, etc. in SMS messages or iMessages. Mobile devices may be compromised through one-click exploits, where the victim must interact with a text message, or zero-click exploits, where no user interaction is required. ### AirDrop Unique to iOS, AirDrop is a network protocol that allows iOS users to transfer files between iOS devices. Before patches from Apple were released, on iOS 13.4 and earlier, adversaries may force the Apple Wireless Direct Link (AWDL) interface to activate, then exploit a buffer overflow to gain access to the device and run as root without interaction from the user.
Details Published Attributes CTI Title
Details Website 2024-11-12 6 Multiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution
Details Website 2024-11-12 49 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-11-07 2 A Vulnerability in Android OS Could Allow for Remote Code Execution
Details Website 2024-11-04 27 Jumpy Pisces Threat Intel
Details Website 2024-11-01 39 Dark Web Profile: Tropic Trooper (APT23) - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-10-27 77 Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Details Website 2024-10-16 13 UAC-0050 Attack Detection: russia-Backed APT Performs Cyber Espionage, Financial Crimes, and Disinformation Operations Against Ukraine - SOC Prime
Details Website 2024-10-11 13 Securing the Quantum Future: The Role of Confidential Computing in Blockchain Networks
Details Website 2024-10-08 53 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-10-07 27 Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Details Website 2024-09-30 8 Dark Web Profile: UserSec - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-09-30 8 Dark Web Profile: UserSec
Details Website 2024-09-16 97 Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Details Website 2024-09-10 29 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-09-03 46 Most interesting IR cases in 2023: insider threats and more
Details Website 2024-08-28 28 Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
Details Website 2024-08-12 73 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-07-30 76 Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Details Website 2024-07-22 5 Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
Details Website 2024-07-09 8 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-06-11 167 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-05-14 38 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-05-13 29 Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Details Website 2024-03-18 96 Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
Details Website 2024-03-18 96 Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks