TID-204: Untrusted Programs Can Access Privileged OS Functions
Threat Description
Without a correctly enforced operating system privilege model, a compromised or untrusted application program could access to data, memory, or programs associated with the underlying OS or other applications. This could also be used to further manipulate the underlying OS.
Threat Maturity and Evidence
Proof of Concept
Security Issues In Compiled PLC Logic (CoDeSys & ProConOs) - Reid Wightman (Dragos) (at S4x23)
Researcher Reid Wightman demonstrated that it is possible to compromise a given feature of a controller, in this example the network protocol handler, and leverage that to overwrite memory in other critical portions of the CoDeSys and ProConOs runtime environments.
CWE
CWE-693: Protection Mechanisms Failure (Pillar)
“The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.”