Description
Adversaries may abuse container technologies used in telecom cloud infrastructure to execute malicious code.
Sub-techniques
Specific variations of this technique
MOT3024.301Container Escape
4G
5G-SA: Demonstrated
Adversaries may escape from a container to gain access to the host system or other containers.
MOT3024.302Malicious Container Image
4G
5G-SA: Demonstrated
Adversaries may use malicious container images to execute unauthorized code in telecom cloud infrastructure.
Related Software
Software tools associated with this technique
No related software found
Network Generations
Mobile network generations this technique applies to
2G
Not Applicable
3G
Not Applicable
4G
Used
5G-SA
Demonstrated
5G-NSA
Not Applicable