Exploit Chaining
Exploit chaining is a cyberattack technique in which an attacker combines multiple vulnerabilities in sequence to compromise a system step-by-step. Each individual vulnerability in the chain may have limited impact on its own, but together they enable a higher level of access or control than any single vulnerability could provide. This technique is typically associated with sophisticated threat actors because it requires identifying and coordinating multiple weaknesses.
Exploit chaining is an adversarial technique in which two or more distinct vulnerabilities are sequenced and combined such that the successful exploitation of one vulnerability enables, facilitates, or escalates the exploitation of the next. The aggregate impact of the chain typically exceeds what any constituent vulnerability could achieve in isolation, commonly allowing attackers to bypass layered security controls, escalate privileges, or achieve remote code execution in contexts where individual vulnerabilities would be insufficient. Each link in the chain may target different system components, security boundaries, or vulnerability classes, and the technique is commonly employed when no single high-severity vulnerability is available or exploitable on its own.
Why it matters
Exploit chaining is significant because it fundamentally undermines the premise that patching or mitigating any single vulnerability is sufficient to prevent a breach. When attackers combine multiple lower-severity vulnerabilities in sequence, each individually addressed weakness may still leave the overall system exposed if the remaining links in the chain are intact. This forces defenders to think holistically about vulnerability management rather than treating each finding in isolation.
Who it's relevant to
Inside Exploit Chaining
Common questions
Answers to the questions practitioners most commonly ask about Exploit Chaining.