|T1404||Exploit OS Vulnerability|
A malicious app can exploit unpatched vulnerabilities in the operating system to obtain escalated privileges.
|T1405||Exploit TEE Vulnerability|
A malicious app or other attack vector could be used to exploit vulnerabilities in code running within the Trusted Execution Environment (TEE) . The adversary could then obtain privileges held by the TEE potentially including the ability to access cryptographic keys or other sensitive data . Escalated operating system privileges may be first required in order to have the ability to attack the TEE . If not, privileges within the TEE can potentially be used to exploit the operating system .