CAPEC-40: Manipulating Writeable Terminal Devices

This attack exploits terminal devices that allow themselves to be written to by other users. The attacker sends command strings to the target terminal device hoping that the target user will hit enter and thereby execute the malicious command with their privileges. The attacker can send the results (such as copying /etc/passwd) to a known directory and collect once the attack has succeeded.

Severity
Very High
Likelihood
High
22
/ 100
low-risk
Active Threat 20/50 · Moderate
Exploit Availability 2/50 · Minimal