Event Injection
mediumevent-injection
Attacker injects malicious events into event-driven systems to trigger unauthorized actions
TamperingSpoofingElevation of Privilege
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1059 | Command and Scripting Interpreter | Execution |
Common Weakness Enumeration
Mitigating controls
ctrl-event-1- Validate event schema and content before processing
ctrl-event-2- Implement event signing and verification
ctrl-event-3- Use IAM policies to restrict event sources
ctrl-event-4- Monitor event patterns for anomalies