セクター Government

Timeframe: -28 days

Default Categories (63): Access Management Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Automation Software, Backup Software, Billing Software, Calendar Software, Cloud Software, Communications System, Connectivity Software, Customer Relationship Management System, Database Administration Software, Database Software, Directory Service Software, Document Management Software, Document Processing Software, Document Reader Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Groupware Software, Hardware Driver Software, Information Management Software, IP Phone Software, Knowledge Base Software, Log Management Software, Mail Server Software, Middleware, Multimedia Player Software, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Office Suite Software, Operating System, Policy Management Software, Presentation Software, Printing Software, Product Lifecycle Management Software, Project Management Software, Remote Access Software, Reporting Software, Router Operating System, Security Testing Software, Server Management Software, Service Management Software, Software Library, Software Management Software, Spreadsheet Software, SSH Server Software, Supply Chain Management Software, Ticket Tracking Software, Unified Communication Software, Video Surveillance Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Wireless LAN Software, Word Processing Software

タイムライン

ベンダー

製品

Linux Kernel292
Apple macOS38
Google Chrome38
Microsoft Windows36
Mozilla Firefox18

修復

Official Fix578
Temporary Fix0
Workaround2
Unavailable0
Not Defined102

悪用可能性

High4
Functional0
Proof-of-Concept18
Unproven36
Not Defined624

アクセスベクター

Not Defined0
Physical0
Local80
Adjacent324
Network278

認証

Not Defined0
High18
Low448
None216

ユーザー操作

Not Defined0
Required148
None534

C3BM Index

CVSSv3 Base

≤10
≤20
≤314
≤476
≤5132
≤6186
≤7112
≤8132
≤920
≤1010

CVSSv3 Temp

≤10
≤20
≤318
≤472
≤5140
≤6224
≤782
≤8128
≤910
≤108

VulDB

≤10
≤20
≤320
≤486
≤5152
≤6178
≤7106
≤8112
≤916
≤1012

NVD

≤1626
≤20
≤30
≤40
≤52
≤610
≤78
≤814
≤922
≤100

CNA

≤1494
≤20
≤30
≤46
≤524
≤624
≤740
≤858
≤924
≤1012

ベンダー

≤1638
≤20
≤30
≤40
≤52
≤64
≤710
≤820
≤96
≤102

0dayエクスプロイト

<1k28
<2k138
<5k30
<10k272
<25k136
<50k62
<100k16
≥100k0

本日のエクスプロイト

<1k224
<2k196
<5k112
<10k66
<25k74
<50k10
<100k0
≥100k0

闇ツールの市場規模

IOB - Indicator of Behavior (1000)

タイムライン

言語

en808
fr60
es40
de34
ja34

国・地域

アクター

アクティビティ

関心

タイムライン

タイプ

ベンダー

製品

Linux Kernel48
Google Chrome14
Microsoft Windows10
IBM Security Access Manager Docker6
Apple macOS6

脆弱性

#脆弱性BaseTemp0day本日修復EPSSCTICVE
1Parsec Automation TrakSYS Export Page contentpage 特権昇格5.35.0$0-$5k$0-$5kProof-of-ConceptNot Defined0.0000010.00CVE-2024-6414
2Microsoft Edge Remote Code Execution6.36.0$25k-$100k$5k-$25kNot DefinedOfficial Fix0.000000.14CVE-2024-34122
3Juniper Networks Session Smart Router 弱い認証9.99.7$5k-$25k$0-$5kNot DefinedOfficial Fix0.000910.27CVE-2024-2973
4Dell Integrated Remote Access Controller 9 弱い暗号化5.95.8$5k-$25k$0-$5kNot DefinedOfficial Fix0.000000.96CVE-2024-25943
5mitmproxy pdoc polyfill.io Remote Code Execution6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.14CVE-2024-38526
6Google Cloud Storage XML API/Cloud IAM HMAC Key 未知の脆弱性2.72.7$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.27
7DataDog dd-trace-cpp サービス拒否6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.41CVE-2024-38525
8Gonic Gin-Gonic CORS Middleware 特権昇格4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.000450.41CVE-2019-25211
9pendulum-project ntpd-rs NTS Protocol サービス拒否7.57.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.21CVE-2024-38528
10IBM Security Verify Access Docker 特権昇格4.74.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.34CVE-2024-35139
11Google Cloud Storage XML API/Cloud IAM HMAC Key 特権昇格3.83.8$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.07
12Microsoft Windows Wi-Fi Driver 特権昇格8.88.1$25k-$100k$5k-$25kUnprovenOfficial Fix0.000520.27CVE-2024-30078
13OpenSSL Client Protocol SSL_select_next_proto メモリ破損7.37.0$5k-$25k$5k-$25kNot DefinedOfficial Fix0.000440.00CVE-2024-5535
14Elastic Cloud Enterprise API Key 特権昇格6.86.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.07CVE-2024-37282
15VMware Cloud Director Object Storage Extension Web Proxy Server Logging 情報の漏洩4.24.1$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.00CVE-2024-22276
16IBM Security Verify Access Docker Configuration 情報の漏洩4.74.7$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.21CVE-2024-35137
17IBM Cloud Pak for Security/QRadar Suite 情報の漏洩3.63.6$0-$5k$0-$5kNot DefinedOfficial Fix0.000430.27CVE-2022-38383
18Google Cloud Storage XML API/Cloud IAM HMAC Key 未知の脆弱性2.72.7$5k-$25k$5k-$25kNot DefinedNot Defined0.000000.07
19MIT Kerberos 5 GSS Message Token Privilege Escalation5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.07CVE-2024-37370
20MIT Kerberos 5 GSS Message Token Privilege Escalation5.55.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.000430.27CVE-2024-37371

IOC - Indicator of Compromise (57)

These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.

IDIP rangeアクタータイプ信頼度
12.58.56.0/24RecordBreakerpredictive
25.255.124.0/24IcedIDpredictive
323.137.253.0/24FAKEUPDATESpredictive
431.223.49.0/24Confickerpredictive
534.204.10.0/24Cobalt Strikepredictive
645.80.158.0/24AsyncRATpredictive
7XX.XX.XX.X/XXXxxxx Xxxpredictive
8XX.XXX.XXX.X/XXXxxxxxxxpredictive
9XX.XXX.XXX.X/XXXxxxxxxxpredictive
10XX.XXX.XXX.X/XXXxxxxpredictive
11XX.XXX.XX.X/XXXxxxxxxxpredictive
12XX.XXX.XXX.X/XXXxxxxxxxpredictive
13XX.XXX.XXX.X/XXXxxxxxx Xxxxxxxpredictive
14XX.XXX.XXX.X/XXXxxxxxxpredictive
15XX.XX.XXX.X/XXXxxxxxxxpredictive
16XX.XX.XXX.X/XXXxxxxxxxpredictive
17XX.XXX.XXX.X/XXXxxxxx Xxxpredictive
18XX.XX.XXX.X/XXXxxxxpredictive
19XX.XXX.XXX.X/XXXxxxxxxxpredictive
20XX.XXX.XXX.X/XXXxxxxxxxpredictive
21XX.XXX.XXX.X/XXXxxxxxxxxxpredictive
22XXX.XX.XXX.X/XXXxxxxxxxxxxpredictive
23XXX.XXX.XXX.X/XXXxxxxxxxpredictive
24XXX.XXX.XX.X/XXXxxxxxxxpredictive
25XXX.XXX.XX.X/XXXxxxxxpredictive
26XXX.XXX.XXX.X/XXXxxxxx Xxxxxxpredictive
27XXX.XXX.X.X/XXXxxxxx Xxxxxxpredictive
28XXX.XXX.X.X/XXXxxxxxxxpredictive
29XXX.XXX.X.X/XXXxxxxxxxxpredictive
30XXX.XXX.X.X/XXXxxxxx Xxxxxxpredictive
31XXX.XXX.X.X/XXXxxxxx Xxxxxxpredictive
32XXX.XXX.XX.X/XXXxxxxxxxpredictive
33XXX.XXX.XX.X/XXXxxxxpredictive
34XXX.XXX.XX.X/XXXxxxxpredictive
35XXX.XXX.XX.X/XXXxxxxxpredictive
36XXX.XXX.XX.X/XXXxxxxpredictive
37XXX.XXX.XXX.X/XXXxxxxx Xxxxxxpredictive
38XXX.XXX.XXX.X/XXXxxxxx Xxxxxxpredictive
39XXX.XX.XXX.X/XXXxxxxxxxpredictive
40XXX.XX.XXX.X/XXXxxxxxxxxpredictive
41XXX.XXX.XX.X/XXXxxxxxpredictive
42XXX.XXX.XXX.X/XXXxxxxxxx Xxxxxxpredictive
43XXX.XXX.XXX.X/XXXxxxxxxpredictive
44XXX.XX.XXX.X/XXXxxxxxx Xxxxxxpredictive
45XXX.XX.XX.X/XXXxxxxxx Xxxxxxpredictive
46XXX.XXX.XXX.X/XXXxxxx Xxxxxxxpredictive
47XXX.XXX.XXX.X/XXXxxxxxxxpredictive
48XXX.XXX.XXX.X/XXXxxxxxxxpredictive
49XXX.XXX.XXX.X/XXXxxxxxxxx Xxxxxxpredictive
50XXX.XX.XXX.X/XXXxxxxpredictive
51XXX.XXX.XXX.X/XXXxxxpredictive
52XXX.XXX.XXX.X/XXXxxxxxxxpredictive
53XXX.XXX.XXX.X/XXXxxxxxx Xxxxxxxpredictive
54XXX.XX.XX.X/XXXxxxxxxxxpredictive
55XXX.XXX.XXX.X/XXXxxxxxx Xxxxxxxpredictive
56XXX.XXX.XXX.X/XXXxxxxxxx Xxxpredictive
57XXX.XXX.XX.X/XXXxxxxxpredictive

TTP - Tactics, Techniques, Procedures (27)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueクラス脆弱性アクセスベクタータイプ信頼度
1T1006CAPEC-126CWE-22, CWE-29, CWE-425Path Traversalpredictive
2T1040CAPEC-102CWE-319Authentication Bypass by Capture-replaypredictive
3T1055CAPEC-10CWE-74Improper Neutralization of Data within XPath Expressionspredictive
4T1059CAPEC-242CWE-94Argument Injectionpredictive
5T1059.007CAPEC-209CWE-79Cross Site Scriptingpredictive
6T1068CAPEC-104CWE-250, CWE-266, CWE-269, CWE-284Execution with Unnecessary Privilegespredictive
7TXXXX.XXXCAPEC-CWE-XXXXxx Xx Xxxx-xxxxx Xxxxxxxxpredictive
8TXXXXCAPEC-150CWE-XXXXxxx Xxx Xxxxxxxxx Xxxxxxxxxxx Xxxxxxxxpredictive
9TXXXX.XXXCAPEC-191CWE-XXXXxxx-xxxxx Xxxxxxxxxxxpredictive
10TXXXXCAPEC-136CWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxxpredictive
11TXXXXCAPEC-1CWE-XXX, CWE-XXXXxxxxxxxxx Xxxxxxpredictive
12TXXXXCAPEC-184CWE-XXXXxxxxxxx Xx Xxxx Xxxxxxx Xxxxxxxxx Xxxxxpredictive
13TXXXXCAPEC-108CWE-XXXxx Xxxxxxxxxpredictive
14TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxx Xxxxxxxxxxxxxpredictive
15TXXXXCAPEC-112CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxxx Xxxxxxxxxxpredictive
16TXXXX.XXXCAPEC-CWE-XXXXxxxxxxx Xx Xxxxxxxxxxxxx Xxxxpredictive
17TXXXXCAPEC-37CWE-XXXXxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxxpredictive
18TXXXX.XXXCAPEC-CWE-XXXXxxxxxxxxxxx Xxxxxxxpredictive
19TXXXX.XXXCAPEC-120CWE-XXXXxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxxpredictive
20TXXXX.XXXCAPEC-154CWE-XXXXxxxxxxxxxxxpredictive
21TXXXXCAPEC-38CWE-XXX, CWE-XXXXxxxxxxxx Xxxxxx Xxxxpredictive
22TXXXX.XXXCAPEC-459CWE-XXXXxxxxxxx Xxxxxxxxxxx Xxxxxxxxxxpredictive
23TXXXXCAPEC-116CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxxpredictive
24TXXXXCAPEC-20CWE-XXXXxxxxxxxxxxxx Xxxxxxpredictive
25TXXXX.XXXCAPEC-112CWE-XXXXxx Xxxxxxxxxx Xxxxxpredictive
26TXXXX.XXXCAPEC-1CWE-XXXXxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxxpredictive
27TXXXXCAPEC-CWE-XXXXxxxxxxxxxx Xxxxxxpredictive

IOA - Indicator of Attack (100)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDクラスIndicatorタイプ信頼度
1File/api/v1/admin/restartpredictive
2File/api/v1/getbodyfilepredictive
3File/asn1/ber_encoder.cpredictive
4File/dev/vdbpredictive
5File/etc/passwdpredictive
6File/login/backup_codepredictive
7File/proc/net/ptypepredictive
8File/proc/sys/kernel/hung_task_timeout_secspredictive
9File/proc/vmallocinfopredictive
10File/proxypredictive
11File/sys/class/net/bonding_masterspredictive
12File/sys/kernel/config/nullb/nullb0predictive
13File/xxx/xxxxxx/xxxxxxxpredictive
14File/xx/xxxxxx/xxxxxxxxxxxxxxpredictive
15Filexxxx/xxx/xxx/xxx/xxx.xpredictive
16Filexxxx/xxx/xxx/xxx.xpredictive
17Filexxxxxxx_xxxx_xxxxxxx_xxxxxx_xxx.xpredictive
18Filexxxxx/xxx-xxxxxx.xpredictive
19Filexxxxxxx.xpredictive
20Filexxxxx.xxxxpredictive
21Filexxxxxxx/xxx/xxx/xxx-xxxxxxx-xxx.xpredictive
22Filexxxxxxx/xxx/xxx/xxx-xxxxxxxxxxx.xpredictive
23Filexxxxxxx/xxxx/xxxx/xxxxx.xpredictive
24Filexxxxxxx/xxx/xxxxxx/xxxxxx_xxxx.xpredictive
25Filexxxxxxx/xxx/xxxx/xxxxxx.xpredictive
26Filexxxxxxx/xxx/xxxx/xxx.xpredictive
27Filexxxxxxx.xxxpredictive
28Filexxxx_xxxxxx.xpredictive
29Filexxxxx_xxxx.xxpredictive
30Filexxxxx/xxxxpredictive
31Filexx/xxxxx/xxxxx.xpredictive
32Filexx/xxxx/xxxx.xpredictive
33Filexx/xxxx/xxx.xpredictive
34Filexx/xxxxxx/xxx.xpredictive
35Filexx/xxxxxxx.xpredictive
36Filexx/xxxxx/xxxxx.xpredictive
37Filexxxxx.xpredictive
38Filexx/xxxxxxxxxpredictive
39Filexxxxxx/xxx/xxx_xxxxxxxxx.xpredictive
40Filexxxxxx/xxx/xxxxxx.xpredictive
41Filexxxxxx/xxxxxxx/xxxxx.xpredictive
42Filexxxxxx/xxxxx/xxxx_xxxxxx.xpredictive
43Filexxxx/xx.xxpredictive
44Filexxx/xxxx/xxx.xpredictive
45Filexxx/xxxx/xxxx.xpredictive
46Filexxx/xxxxxxx/xxxx.xpredictive
47Filexxx/xxxx/xx_xxxx.xpredictive
48Filexxx/xxxxxxxxx/xxxxxxxxx_xxxxx.xpredictive
49Filexxx/xxx/xxx_xxxx.xpredictive
50Filexxxxx.xxxpredictive
51Filexxxxx/predictive
52Filexxxx/xxxxx/xxxxx.xxxpredictive
53Filexxxxxxx-xx.xpredictive
54Filexxxxxxx.xxxpredictive
55Filexxxxxxxxx.xpredictive
56Filexx/xxxxxx/xxxxxxxxxxxpredictive
57Filexxx.xpredictive
58Library/xxxx/xxx/xxxxxxx/xxx/xxxxxxxx.xpredictive
59Library/xxxxxxx/xxxxx/xxxx.xpredictive
60Libraryxxxxxxx/xxxxx/xxxxxxx-xxxxxx.xpredictive
61Libraryxxxxxxx/xxxxx/xxxxxx.xpredictive
62Libraryxxxxxxx/xxxxx/xxxx.xpredictive
63Libraryxxxxxxx/xxxxx/xxxxxx.xpredictive
64Libraryxxx/xxxx_xxxxxx.xpredictive
65Libraryxxx/xxxxxxxxxxxx.xpredictive
66Libraryxxx/xxx.xpredictive
67Libraryxxx/xxx_xxxx.xpredictive
68Libraryxxx/xxxx_xxx.xpredictive
69Libraryxxxxx/./xxxxxxx/xxx/xx/xxxxxx.xpredictive
70Libraryxxxxxx.xxxpredictive
71Libraryxxx/xxxxxx/xx_xxxxxxx.xpredictive
72Argumentxxxxxx/xxxxxx_xxxpredictive
73Argumentxxxpredictive
74Argumentxxxxxpredictive
75Argumentxxxx_xxxxxx_xxxxxxxxxpredictive
76Argumentx_x/x_x/xxxxxpredictive
77Argumentxxxxxx xxxxpredictive
78Argumentxxxxxxxxpredictive
79Argumentxxxxx/xxxxxpredictive
80Argumentxxxxpredictive
81Argumentxxpredictive
82Argumentxxpredictive
83Argumentxxxxxxxxxxpredictive
84Argumentxxxxxxpredictive
85Argumentxxxxxxxpredictive
86Argumentxxxxxpredictive
87Argumentxxxxpredictive
88Argumentxxxxx[]predictive
89Argumentxxxxxxxxpredictive
90Argumentxxxpredictive
91Argumentxxxx.xxxxxxx_xxxpredictive
92Argumentxxxxxxxxpredictive
93Argumentxxxxxxxxxxxxxxpredictive
94Argumentxxxxxxxpredictive
95Argumentxxxpredictive
96Argumentxxxpredictive
97Argumentxxxxxxpredictive
98Argumentxxxxxxxxpredictive
99Argumentxxxxxxxxxxxxxxpredictive
100Argumentx-xxxxx-xxxxxxxpredictive

Do you need the next level of professionalism?

Upgrade your account now!