Alchimist Analiza

IOB - Indicator of Behavior (48)

Oś czasu

Język

en48

Kraj

cn28
us10

Aktorzy

Zajęcia

Wysiłek

Oś czasu

Rodzaj

Sprzedawca

Produkt

Microsoft IIS4
Lenovo Smart Camera X34
Lenovo Smart Camera X54
Lenovo Smart Camera C2E4
Siemens SIMATIC HMI panel2

Luki w zabezpieczeniach

#Słaby punktBaseTemp0dayDzisiajWykPrzEPSSCTICVE
1jforum User privilege escalation5.35.3$0-$5k$0-$5kNot DefinedNot Defined0.002890.06CVE-2019-7550
2Siemens SIMATIC HMI panel miniweb.exe directory traversal7.57.2$5k-$25k$0-$5kHighOfficial Fix0.010590.06CVE-2011-4878
3NCH Axon PBX cross site scripting3.53.2$0-$5k$0-$5kProof-of-ConceptNot Defined0.000580.00CVE-2021-37456
4Apache Tomcat HTTP/2 Execution denial of service6.46.3$5k-$25k$0-$5kNot DefinedOfficial Fix0.726650.04CVE-2019-0199
5Daimler Mercedes Me App Certificate Pinning information disclosure6.05.9$0-$5k$0-$5kHighOfficial Fix0.002380.03CVE-2018-18071
6Daimler Mercedes Comand Navigation Route Calculation denial of service6.26.2$0-$5k$0-$5kFunctionalUnavailable0.000610.00CVE-2018-18070
7laravel-jqgrid EloquentRepositoryAbstract.php getRows sql injection6.96.9$0-$5k$0-$5kNot DefinedOfficial Fix0.001480.00CVE-2021-4262
8ThinkPHP Driver.class.php parseOrder sql injection8.58.5$0-$5k$0-$5kNot DefinedOfficial Fix0.001630.02CVE-2018-18546
9SourceCodester Game Result Matrix System GET Parameter athlete-profile.php sql injection7.57.3$0-$5k$0-$5kProof-of-ConceptNot Defined0.000630.04CVE-2023-3383
10Oracle MySQL Server Packaging memory corruption9.89.6$25k-$100k$0-$5kNot DefinedOfficial Fix0.039920.00CVE-2016-0705
11react-native-reanimated Parser Colors.js privilege escalation6.06.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001050.03CVE-2022-24373
12Splunk Enterprise Forwarder Bundle weak authentication6.46.3$0-$5k$0-$5kNot DefinedOfficial Fix0.001380.02CVE-2022-32157
13Oracle MySQL Workbench privilege escalation9.89.6$25k-$100k$5k-$25kNot DefinedOfficial Fix0.106490.04CVE-2022-1292
14Itech News Portal information.php sql injection6.35.5$0-$5k$0-$5kProof-of-ConceptUnavailable0.003910.09CVE-2017-20131
15Realtek SDK miniigd SOAP Service privilege escalation7.37.3$0-$5k$0-$5kHighNot Defined0.968630.02CVE-2014-8361
16Mozilla Firefox Browser Engine memory corruption7.36.4$25k-$100k$0-$5kUnprovenOfficial Fix0.064470.03CVE-2015-4501
17Lenovo Smart Camera X3/Smart Camera X5/Smart Camera C2E privilege escalation7.37.0$0-$5k$0-$5kNot DefinedOfficial Fix0.001550.00CVE-2021-3616
18Lenovo ThinkPad SMM BIOS Write Protection privilege escalation3.23.2$0-$5k$0-$5kNot DefinedNot Defined0.000580.03CVE-2020-8341
19Ivanti Pulse Connect Secure File Resource Profiles memory corruption8.88.4$0-$5k$0-$5kNot DefinedOfficial Fix0.677010.00CVE-2021-22908
20Lenovo Smart Camera X3/Smart Camera X5/Smart Camera C2E SD Card privilege escalation4.34.1$0-$5k$0-$5kNot DefinedOfficial Fix0.001890.02CVE-2021-3615

IOC - Indicator of Compromise (7)

These indicators of compromise highlight associated network ressources which are known to be part of research and attack activities.

TTP - Tactics, Techniques, Procedures (10)

Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.

IDTechniqueLuki w zabezpieczeniachWektor dostępuRodzajPewność siebie
1T1006CWE-22Path TraversalpredictiveWysoki
2T1059CWE-94Argument InjectionpredictiveWysoki
3TXXXX.XXXCWE-XXXxxxx Xxxx XxxxxxxxxpredictiveWysoki
4TXXXXCWE-XXX, CWE-XXXXxxxxxxxx Xxxx Xxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
5TXXXXCWE-XX, CWE-XXXxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx XxxxxxxxxpredictiveWysoki
6TXXXXCWE-XXXxx XxxxxxxxxpredictiveWysoki
7TXXXX.XXXCWE-XXXXxxxxxxx XxxxxxxxxxxxxpredictiveWysoki
8TXXXXCWE-XXXXxxxxxxxxxx XxxxxxxxxxpredictiveWysoki
9TXXXXCWE-XXXXxxxxxxxx Xxxxxx XxxxpredictiveWysoki
10TXXXXCWE-XXXXxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx XxxxxxxxxxxpredictiveWysoki

IOA - Indicator of Attack (22)

These indicators of attack list the potential fragments used for technical activities like reconnaissance, exploitation, privilege escalation, and exfiltration. This data is unique as it uses our predictive model for actor profiling.

IDKlasaIndicatorRodzajPewność siebie
1File/dipam/athlete-profile.phppredictiveWysoki
2File/news-portal-script/information.phppredictiveWysoki
3File/uncpath/predictiveMedium
4Filexxxxxx.xxpredictiveMedium
5Filexxxxxxxxxx.xxxpredictiveWysoki
6Filexxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxxxxpredictiveWysoki
7Filexxxxxxxxxxxxxxxxxxx.xxxxpredictiveWysoki
8Filexxxxxxxx.xpredictiveMedium
9Filexxxxxxx/xxxxx/xx/xxxxxx.xxxxx.xxxpredictiveWysoki
10Filexxxxxxx.xxxpredictiveMedium
11Filexxxxxxxx/xxxxx/xxxxxxxx?xxxxxxxxpredictiveWysoki
12Filexxxxxxxxxxxx.xxxpredictiveWysoki
13Filexxx/xxxxxxxxx/xxxxxxxxxxxxx/xxxxxxxxxxxx/xxxxxxxxxxxxxxxxxxxxxxxxxx.xxxpredictiveWysoki
14Filexxxxxx.xxxpredictiveMedium
15LibraryxxxxpredictiveNiski
16Argumentxxxxxxxxx xx xxxxxxxpredictiveWysoki
17ArgumentxxxpredictiveNiski
18ArgumentxxpredictiveNiski
19ArgumentxxxpredictiveNiski
20ArgumentxxxpredictiveNiski
21Input Value::$xxxxx_xxxxxxxxxxpredictiveWysoki
22Network Portxxx xxxxxx xxxxpredictiveWysoki

Referencje (4)

The following list contains external sources which discuss the actor and the associated activities:

Interested in the pricing of exploits?

See the underground prices here!