Detection tooling has a structural handicap. To find threats, it must accept inputs no other part of the network will accept: executable files, unknown file formats, network traffic from the worst neighborhoods, scripts pulled from phishing emails. To analyze those inputs, it must parse them. Parse implementations have bugs. Parse implementations at the edge of file format weirdness have concentrated bug density. The detector parses the worst inputs with the most complex code and runs with enough privilege to do meaningful analysis. That is a vulnerability profile most products would never be allowed to have.
The pattern: an attacker does not try to evade the detector. The attacker submits a crafted input that exploits the detector itself. The detector ingests as designed. The exploit fires on the ingestion path. The attacker now has code execution inside the detection infrastructure, with the detection infrastructure's network position, with the detection infrastructure's implicit trust across every tool in the security fabric that queries it.
What makes this pattern specific is the INVERSION of role. A normal vulnerability in a normal product is a problem for the users of that product. A vulnerability in a detector is a problem for the people the detector is supposed to protect. The blast radius is inverse to the customer's intent: the more they trusted the tool to find threats, the more access they gave it, the more the vulnerability pays out.