Boostwrite and RDFSniffer 解析

IOB - Indicator of Behavior (22)

タイムライン

言語

en18
sv4

国・地域

us18
ru2
cn2

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Shenzhen Hichip Vision Technology V62
Shenzhen Hichip Vision Technology V72
Shenzhen Hichip Vision Technology V82
Shenzhen Hichip Vision Technology V92
Shenzhen Hichip Vision Technology V102

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Microsoft Exchange Server Mail メモリ破損8.58.4$5k-$25k$0-$5kNot DefinedOfficial Fix0.383280.00CVE-2018-8302
2Delta Electronics ASDA-Soft Project File メモリ破損7.06.9$0-$5k$0-$5kNot DefinedOfficial Fix0.000690.00CVE-2022-1403
3Fujitsu ETERNUS CentricStor CS8000 grel.php grel_finfo 特権昇格6.36.0$0-$5k$0-$5kNot DefinedOfficial Fix0.007310.00CVE-2022-31795
4Oracle WebLogic Server Web Container 情報の漏洩7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.962870.02CVE-2022-21371
5Palo Alto PAN-OS Web Interface 特権昇格8.07.8$0-$5k$0-$5kNot DefinedOfficial Fix0.001280.05CVE-2021-3058
6Schneider Electric EcoStruxure Building Operation WebStation Web Page Generation クロスサイトスクリプティング4.84.8$0-$5k$0-$5kNot DefinedNot Defined0.000780.00CVE-2020-28210
7Tiandy IP Cameras Service Port 3001 情報の漏洩6.45.9$0-$5k$0-$5kProof-of-ConceptWorkaround0.005810.02CVE-2017-15236
8Shenzhen Hichip Vision Technology V20 P2P Service メモリ破損8.58.5$5k-$25k$5k-$25kNot DefinedNot Defined0.006270.04CVE-2020-9527
9Shenzhen Hichip Vision Technology V20 特権昇格8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.001710.03CVE-2020-9529
10ANNKE SP1 HD Wireless Camera SSID クロスサイトスクリプティング5.25.2$0-$5k$0-$5kNot DefinedNot Defined0.000870.02CVE-2017-18483
11Mobotix IP Network Camera クロスサイトスクリプティング3.53.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000000.00
12CeNova/Night OWL/Novo/Pulnix/QSee/Securus DVR download.rsp Credentials 特権昇格7.57.4$0-$5k$0-$5kNot DefinedWorkaround0.005510.00CVE-2018-10676
13Dahua Web P2P Key 情報の漏洩4.44.4$0-$5k$0-$5kNot DefinedNot Defined0.000440.04CVE-2020-9501
14AVTECH IP Camera/NVR/DVR PwdGrp.cgi 特権昇格9.89.2$5k-$25k$0-$5kHighUnavailable0.000000.04
15Microsoft Exchange Server 特権昇格8.07.9$5k-$25k$0-$5kHighOfficial Fix0.971510.06CVE-2020-0688
16Apple iCloud Foundation 特権昇格4.44.2$5k-$25k$0-$5kNot DefinedOfficial Fix0.000420.00CVE-2020-10002
17Go Doc Dot Org Package ディレクトリトラバーサル8.58.5$0-$5k$0-$5kNot DefinedOfficial Fix0.013260.03CVE-2018-12976
18Symantec Messaging Gateway 特権昇格7.37.3$5k-$25k$5k-$25kNot DefinedNot Defined0.000830.00CVE-2019-18379
19Cisco Embedded Device X.509 Certificate 弱い認証5.75.5$5k-$25k$0-$5kNot DefinedOfficial Fix0.003380.00CVE-2015-6358
20Orpak SiteOmat OrCU 特権昇格8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.005710.02CVE-2017-14853

IOC - Indicator of Compromise (1)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIPアドレスHostnameアクターキャンペーンIdentifiedタイプ信頼度
1109.230.199.227reserved07.theonlygreeting.comBoostwrite and RDFSniffer2019年10月10日verified

TTP - Tactics, Techniques, Procedures (8)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IOA - Indicator of Attack (5)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/cgi-bin/supervisor/PwdGrp.cgipredictive
2Filedownload.rsppredictive
3Filexxxx.xxxpredictive
4Argumentxxx_xxxxx_xxxx_xxxxxxxpredictive
5Argumentxxxx/xx/xxxxpredictive

参考 (2)

The following list contains external sources which discuss the actor and the associated activities:

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!