Mettle Analyse

IOB - Indicator of Behavior (27)

Zeitverlauf

Sprache

en26
fr2

Land

us20
vn8

Akteure

Aktivitäten

Interesse

Zeitverlauf

Typ

Hersteller

Produkt

Dnsmasq4
Microsoft Windows2
PHP2
WordPress2
Google Android2

Schwachstellen

#SchwachstelleBaseTemp0dayHeuteAusMasCTIEPSSCVE
1Dnsmasq extract_name Pufferüberlauf5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00144CVE-2021-45954
2TP-LINK TL-WR841N Firmware Directory Traversal7.57.5$0-$5k$0-$5kHighNot Defined0.000.02952CVE-2012-5687
3devise-two-factor Information Disclosure5.45.4$0-$5k$0-$5kNot DefinedNot Defined0.020.00043CVE-2024-0227
4pfSense diag_command.php csrf_callback Cross Site Request Forgery6.56.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00180CVE-2019-16667
5Apache Superset REST API Get Endpoint erweiterte Rechte5.85.8$5k-$25k$5k-$25kNot DefinedNot Defined0.030.00270CVE-2022-45438
6WordPress Scheduled Task wp-cron.php Denial of Service6.56.5$5k-$25k$5k-$25kNot DefinedNot Defined0.040.00080CVE-2023-22622
7Dnsmasq fuzz_rfc1035.c resize_packet Pufferüberlauf5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.020.00144CVE-2021-45955
8Dnsmasq print_mac Pufferüberlauf5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.030.00144CVE-2021-45956
9Dnsmasq rfc1035.c extract_name Pufferüberlauf7.77.3$0-$5k$0-$5kNot DefinedOfficial Fix0.030.10872CVE-2020-25682
10Dnsmasq fuzz_rfc1035.c answer_request Pufferüberlauf5.55.5$0-$5k$0-$5kNot DefinedNot Defined0.040.00144CVE-2021-45957
11PHP FPM SAPI Pufferüberlauf8.07.7$25k-$100k$0-$5kNot DefinedOfficial Fix0.040.00148CVE-2021-21703
12Magento Deserialization erweiterte Rechte8.08.0$0-$5k$0-$5kNot DefinedNot Defined0.000.00587CVE-2020-3716
13Magento SQL Injection8.58.4$0-$5k$0-$5kNot DefinedOfficial Fix0.030.00582CVE-2019-7139
14Google Android file_input_stream.cc Read Pufferüberlauf7.57.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00105CVE-2019-2105
15Google Android TQS App memscpy Pufferüberlauf8.58.2$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000.00187CVE-2015-9173
16nginx HTTP/2 Denial of Service6.06.0$0-$5k$0-$5kNot DefinedOfficial Fix0.000.02974CVE-2018-16844
17Moodle Installation Information Disclosure5.35.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.030.00187CVE-2012-4403
18NoneCms App.php erweiterte Rechte8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.040.96678CVE-2018-20062
19Creolabs Gravity gravity_lexer.c Pufferüberlauf8.58.5$0-$5k$0-$5kNot DefinedNot Defined0.000.00331CVE-2017-1000172
20Squid Proxy HTTP Request schwache Authentisierung8.78.1$5k-$25k$0-$5kUnprovenOfficial Fix0.030.52868CVE-2016-4553

IOC - Indicator of Compromise (2)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

IDIP-AdresseHostnameAkteurKampagnenIdentifiziertTypAkzeptanz
1118.70.80.143Mettle12.02.2022verifiziertHigh
2XXX.XXX.XX.XXXXxxxxx12.02.2022verifiziertHigh

TTP - Tactics, Techniques, Procedures (6)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueSchwachstellenZugriffsartTypAkzeptanz
1T1006CWE-22Path TraversalprädiktivHigh
2T1059.007CWE-80Cross Site ScriptingprädiktivHigh
3TXXXXCWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxprädiktivHigh
4TXXXX.XXXCWE-XXXXxxx-xxxxx XxxxxxxxxxxprädiktivHigh
5TXXXXCWE-XXXxx XxxxxxxxxprädiktivHigh
6TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxprädiktivHigh

IOA - Indicator of Attack (11)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasseIndicatorTypAkzeptanz
1Filediag_command.phpprädiktivHigh
2Filefile_input_stream.ccprädiktivHigh
3Filexxxx_xxxxxxx.xprädiktivHigh
4Filexxxxxxx_xxxxx.xprädiktivHigh
5Filexxxxxxx.xprädiktivMedium
6Filexxxxxxxx/xxxxxxxxprädiktivHigh
7Filexx-xxxx.xxxprädiktivMedium
8Libraryxxxxxxxx/xxxxxxx/xxxxx/xxx.xxxprädiktivHigh
9Argumentxxxxxxxx_xxprädiktivMedium
10ArgumentxxxxxxprädiktivLow
11Argumentxxxxxxxxxx/xxxxxxxxxxxxxxxprädiktivHigh

Referenzen (2)

The following list contains external sources which discuss the actor and the associated activities:

Might our Artificial Intelligence support you?

Check our Alexa App!