Command and Scripting Interpreter

Adversaries may abuse command and scripting interpreters to execute unauthorized commands, scripts, or binaries within vehicle systems. These interfaces provide a way for adversaries to interact with the vehicle's computer systems and execute arbitrary commands, potentially leading to unauthorized access and control over critical vehicle functions.

One common example of this technique in vehicle cybersecurity is when adversaries leverage the command line interpreter to execute malicious commands, such as '/bin/bash', allowing them to gain unauthorized access to the vehicle's systems and potentially manipulate its functions. This method of attack can provide adversaries with the ability to execute commands and scripts, ultimately leading to unauthorized control over the vehicle's operations.

ID: T2012
Sub-techniques:  No sub-techniques
Tactic: Execution
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1059

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.