Privilege EscalationMOTA3006
The adversary is trying to gain higher-level permissions
Phase: Execution
2 Techniques
4 Sub-techniques
Exploit Telecom Element Vulnerability
MOT3027
Adversaries may exploit vulnerabilities in telecom network elements to gain higher privileges.
2G
3G
4G
Public
2 sub-techniques
Access Token Manipulation
MOT3028
Adversaries may manipulate access tokens to gain higher privileges in telecom systems.
4G
Public
2 sub-techniques