Privilege Escalation

The adversary is trying to gain higher-level permissions in your AI system.

2 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the privilege escalation phase of AI attacks.

1
AML.T0053

Exploitation for Privilege Escalation

Adversaries may exploit software vulnerabilities to escalate privileges in AI systems.

Examples:

  • Exploiting AI system vulnerabilities
  • Abusing model access controls
  • Manipulating AI service permissions

Mitigations:

  • Regular security updates
  • Principle of least privilege
  • Vulnerability management
2
AML.T0054

Exploitation for Privilege Escalation

Adversaries may exploit software vulnerabilities to escalate privileges in AI systems.

Examples:

  • Exploiting AI system vulnerabilities
  • Abusing model access controls
  • Manipulating AI service permissions

Mitigations:

  • Regular security updates
  • Principle of least privilege
  • Vulnerability management