Attack Scenario #1: Remove Code Execution in OS to Ransomware
Software with system-level permissions, such as your operating system or internet browser, has easy access to your data and device features. If a vulnerability is discovered, it can be exploited to gain control over these access rights and permissions, potentially leading to significant security risks. This is why hackers actively target even the smallest vulnerabilities in such software.