A privilege attack is a cyberattack technique designed to gain access to elevated rights, permissions, entitlements, or privileges beyond what is assigned for an identity, account, user, or machine. This type of attack is a key stage of the cyberattack chain and typically involves the exploitation of a privilege escalation vulnerability, such as a system bug, misconfiguration, or inadequate access controls.