A vulnerability was found in Backdoor.Win32.Serman.a. It has been classified as critical. This affects an unknown part of the component Service Port 21422. The manipulation leads to backdoor. The CWE definition for the vulnerability is CWE-912. The weakness was presented 11/24/2022 as MVID-2022-0659. It is possible to read the advisory at malvuln.com. It is possible to initiate the attack remotely. There are no technical details available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The pricing for an exploit might be around USD $0-$5k at the moment. The attack technique deployed by this issue is T1588.001 according to MITRE ATT&CK. It is declared as proof-of-concept. The exploit is shared for download at malvuln.com. We expect the 0-day to have been worth approximately $0-$5k. It is recommended to applying a restrictive firewalling. A possible mitigation has been published before and not just after the disclosure of the vulnerability.
The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.
21 more entries are not shown
Are you interested in using VulDB?
Download the whitepaper to learn more about our service!