input
stringlengths 30
54
| output
stringlengths 69
4.21k
|
---|---|
Describe the vulnerability CVE-2019-1458 | CVE-2019-1458, State: PUBLISHED, Published: 2019-12-10T21:40:57, Updated: 2024-08-04T18:20:28.010Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2014-6287 | CVE-2014-6287 in Rejetto HTTP File Server. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2018-10657 | CVE-2018-10657, State: PUBLISHED, Published: 2018-05-02T16:00:00Z, Updated: 2024-09-16T22:51:25.550Z, Description: Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2^63 - 1 render rooms unusable, related to federation/federation_base.py and handlers/message.py, as exploited in the wild in April 2018., No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1531 | MITRE T1531 : Account Access Removal from enterprise Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or perform a [System Shutdown/Reboot](T1529) to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)
In Windows, [Net](S0039) utility, `Set-LocalUser` and `Set-ADAccountPassword` [PowerShell](T1059.001) cmdlets may be used by adversaries to modify user accounts. In Linux, the `passwd` utility may be used to change passwords. Accounts could also be disabled by Group Policy.
Adversaries who use ransomware or similar attacks may first perform this and other Impact behaviors, such as [Data Destruction](T1485) and [Defacement](T1491), in order to impede incident response/recovery before completing the [Data Encrypted for Impact](T1486) objective. |
Describe the vulnerability CVE-2020-16211 | CVE-2020-16211, State: PUBLISHED, Published: 2020-08-06T18:21:40, Updated: 2024-08-04T13:37:53.848Z, Description: Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. An out-of-bounds read vulnerability may be exploited by processing specially crafted project files, which may allow an attacker to read information., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2012-2520 | CVE-2012-2520, State: PUBLISHED, Published: 2012-10-09T21:00:00, Updated: 2024-08-06T19:34:25.841Z, Description: Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Communicator 2007 R2, Lync 2010 and 2010 Attendee, SharePoint Server 2007 SP2 and SP3 and 2010 SP1, Groove Server 2010 SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-3731 | CVE-2019-3731 in RSA BSAFE Crypto-C Micro Edition. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe MITRE technique T1068 | MITRE T1068 : Exploitation for Privilege Escalation from enterprise Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions.
When initially gaining access to a system, an adversary may be operating within a lower privileged process which will prevent them from accessing certain resources on the system. Vulnerabilities may exist, usually in operating system components and software commonly running at higher permissions, that can be exploited to gain higher levels of access on the system. This could enable someone to move from unprivileged or user level permissions to SYSTEM or root permissions depending on the component that is vulnerable. This could also enable an adversary to move from a virtualized environment, such as within a virtual machine or container, onto the underlying host. This may be a necessary step for an adversary compromising an endpoint system that has been properly configured and limits other privilege escalation methods.
Adversaries may bring a signed vulnerable driver onto a compromised machine so that they can exploit the vulnerability to execute code in kernel mode. This process is sometimes referred to as Bring Your Own Vulnerable Driver (BYOVD).(Citation: ESET InvisiMole June 2020)(Citation: Unit42 AcidBox June 2020) Adversaries may include the vulnerable driver with files delivered during Initial Access or download it to a compromised system via [Ingress Tool Transfer](T1105) or [Lateral Tool Transfer](T1570). |
Techniques related with vulnerability CVE-2020-11021 | CVE-2020-11021 in http-client. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2016-9684 | CVE-2016-9684 in SonicWall Secure Remote Access server. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059.004 : Unix Shell. |
Techniques related with vulnerability CVE-2018-8353 | CVE-2018-8353 in Internet Explorer. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has secondary impact with T1005 : Data from Local System. Has secondary impact with T1565 : Data Manipulation. Has secondary impact with T1485 : Data Destruction. Has secondary impact with T1136 : Create Account. Has an exploitation technique T1204.002 : Malicious File. Has an exploitation technique T1566 : Phishing. |
Techniques related with vulnerability CVE-2015-1641 | CVE-2015-1641 in Microsoft Word. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1055 : Process Injection. |
Describe the vulnerability CVE-2013-3918 | CVE-2013-3918, State: PUBLISHED, Published: 2013-11-12T01:00:00, Updated: 2024-08-06T16:22:01.629Z, Description: The InformationCardSigninHelper Class ActiveX control in icardie.dll in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via a crafted web page that is accessed by Internet Explorer, as exploited in the wild in November 2013, aka "InformationCardSigninHelper Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-15095 | CVE-2020-15095, State: PUBLISHED, Published: 2020-07-07T18:55:12, Updated: 2024-08-04T13:08:21.646Z, Description: Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: LOCAL, Availability Impact: NONE, Base Score: 4.4, Base Severity: MEDIUM, Confidentiality Impact: HIGH, Integrity Impact: NONE, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: REQUIRED, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-18263 | CVE-2019-18263 in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router. Has an exploitation technique T1110 : Brute Force. |
Techniques related with vulnerability CVE-2020-9804 | CVE-2020-9804 in macOS. Is related with T1091 : Replication Through Removable Media. Is related with T1499.004 : Application or System Exploitation. |
Techniques related with vulnerability CVE-2013-0707 | CVE-2013-0707 in Ichitaro. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2010-1165 | CVE-2010-1165, State: PUBLISHED, Published: 2010-04-20T15:00:00, Updated: 2024-08-07T01:14:06.696Z, Description: Atlassian JIRA 3.12 through 4.1 allows remote authenticated administrators to execute arbitrary code by modifying the (1) attachment (aka attachments), (2) index (aka indexing), or (3) backup path and then uploading a file, as exploited in the wild in April 2010., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-15243 | CVE-2019-15243 in Cisco SPA112 2-Port Phone Adapter. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2019-11219 | CVE-2019-11219 in Shenzhen Yunni Technology iLnkP2P. Is related with T1110 : Brute Force. Is related with T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-3510 | CVE-2020-3510, State: PUBLISHED, Published: 2020-09-24T17:51:44.121872Z, Updated: 2024-11-13T18:00:31.250Z, Description: A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error handling when parsing DNS requests. An attacker could exploit this vulnerability by sending a series of malicious DNS requests to an Umbrella Connector client interface of an affected device. A successful exploit could allow the attacker to cause a crash of the iosd process, which triggers a reload of the affected device., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: HIGH, Base Score: 8.6, Base Severity: HIGH, Confidentiality Impact: NONE, Integrity Impact: NONE, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2014-3566 | CVE-2014-3566 in SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products. Is related with T1557 : Man-in-the-Middle. |
Describe the vulnerability CVE-2018-11749 | CVE-2018-11749, State: PUBLISHED, Published: 2018-08-24T13:00:00Z, Updated: 2024-09-16T22:44:55.842Z, Description: When users are configured to use startTLS with RBAC LDAP, at login time, the user's credentials are sent via plaintext to the LDAP server. This affects Puppet Enterprise 2018.1.3, 2017.3.9, and 2016.4.14, and is fixed in Puppet Enterprise 2018.1.4, 2017.3.10, and 2016.4.15. It scored an 8.5 CVSS score., No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1553 | MITRE T1553 : Subvert Trust Controls from enterprise Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features would include a program being allowed to run because it is signed by a valid code signing certificate, a program prompting the user with a warning because it has an attribute set from being downloaded from the Internet, or getting an indication that you are about to connect to an untrusted site.
Adversaries may attempt to subvert these trust mechanisms. The method adversaries use will depend on the specific mechanism they seek to subvert. Adversaries may conduct [File and Directory Permissions Modification](T1222) or [Modify Registry](T1112) in support of subverting these controls.(Citation: SpectorOps Subverting Trust Sept 2017) Adversaries may also create or steal code signing certificates to acquire trust on target systems.(Citation: Securelist Digital Certificates)(Citation: Symantec Digital Certificates) |
Describe MITRE technique T1548 | MITRE T1548 : Abuse Elevation Control Mechanism from enterprise Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk.(Citation: TechNet How UAC Works)(Citation: sudo man page 2018) An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.(Citation: OSX Keydnap malware)(Citation: Fortinet Fareit) |
Techniques related with vulnerability CVE-2020-3397 | CVE-2020-3397 in Cisco NX-OS Software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2012-6081 | CVE-2012-6081 in MoinMoin before 1.9.6. Is related with T1190 : Exploit Public-Facing Application. Is related with T1505.003 : Web Shell. |
Techniques related with vulnerability CVE-2017-12637 | CVE-2017-12637 in SAP NetWeaver Application Server Java 7.5. Is related with T1190 : Exploit Public-Facing Application. Is related with T1083 : File and Directory Discovery. |
Describe MITRE technique T1040 | MITRE T1040 : Network Sniffing from enterprise Adversaries may passively sniff network traffic to capture information about an environment, including authentication material passed over the network. Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.
Data captured via this technique may include user credentials, especially those sent over an insecure, unencrypted protocol. Techniques for name service resolution poisoning, such as [LLMNR/NBT-NS Poisoning and SMB Relay](T1557.001), can also be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary.
Network sniffing may reveal configuration details, such as running services, version numbers, and other network characteristics (e.g. IP addresses, hostnames, VLAN IDs) necessary for subsequent [Lateral Movement](TA0008) and/or [Defense Evasion](TA0005) activities. Adversaries may likely also utilize network sniffing during [Adversary-in-the-Middle](T1557) (AiTM) to passively gain additional knowledge about the environment.
In cloud-based environments, adversaries may still be able to use traffic mirroring services to sniff network traffic from virtual machines. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to.(Citation: AWS Traffic Mirroring)(Citation: GCP Packet Mirroring)(Citation: Azure Virtual Network TAP) Often, much of this traffic will be in cleartext due to the use of TLS termination at the load balancer level to reduce the strain of encrypting and decrypting traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)(Citation: SpecterOps AWS Traffic Mirroring) The adversary can then use exfiltration techniques such as Transfer Data to Cloud Account in order to access the sniffed traffic.(Citation: Rhino Security Labs AWS VPC Traffic Mirroring)
On network devices, adversaries may perform network captures using [Network Device CLI](T1059.008) commands such as `monitor capture`.(Citation: US-CERT-TA18-106A)(Citation: capture_embedded_packet_on_software) |
Describe MITRE technique T1589 | MITRE T1589 : Gather Victim Identity Information from enterprise Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may include a variety of details, including personal data (ex: employee names, email addresses, security question responses, etc.) as well as sensitive details such as credentials or multi-factor authentication (MFA) configurations.
Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](T1598). Information about users could also be enumerated via other active means (i.e. [Active Scanning](T1595)) such as probing and analyzing responses from authentication services that may reveal valid usernames in a system or permitted MFA /methods associated with those usernames.(Citation: GrimBlog UsernameEnum)(Citation: Obsidian SSPR Abuse 2023) Information about victims may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](T1593.001) or [Search Victim-Owned Websites](T1594)).(Citation: OPM Leak)(Citation: Register Deloitte)(Citation: Register Uber)(Citation: Detectify Slack Tokens)(Citation: Forbes GitHub Creds)(Citation: GitHub truffleHog)(Citation: GitHub Gitrob)(Citation: CNET Leaks)
Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](T1593) or [Phishing for Information](T1598)), establishing operational resources (ex: [Compromise Accounts](T1586)), and/or initial access (ex: [Phishing](T1566) or [Valid Accounts](T1078)). |
Techniques related with vulnerability CVE-2020-5225 | CVE-2020-5225 in SimpleSAMLphp. Has primary impact with T1190 : Exploit Public-Facing Application. Has secondary impact with T1565 : Data Manipulation. Has an exploitation technique T1133 : External Remote Services. |
Describe the vulnerability CVE-2017-2404 | CVE-2017-2404, State: PUBLISHED, Published: 2017-04-02T01:36:00, Updated: 2024-08-05T13:55:04.784Z, Description: An issue was discovered in certain Apple products. iOS before 10.3 is affected. The issue involves the "Quick Look" component. It allows remote attackers to trigger telephone calls to arbitrary numbers via a tel: URL in a PDF document, as exploited in the wild in October 2016., No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1087 | MITRE T1087 : Account Discovery from enterprise Adversaries may attempt to get a listing of valid accounts, usernames, or email addresses on a system or within a compromised environment. This information can help adversaries determine which accounts exist, which can aid in follow-on behavior such as brute-forcing, spear-phishing attacks, or account takeovers (e.g., [Valid Accounts](T1078)).
Adversaries may use several methods to enumerate accounts, including abuse of existing tools, built-in commands, and potential misconfigurations that leak account names and roles or permissions in the targeted environment.
For examples, cloud environments typically provide easily accessible interfaces to obtain user lists.(Citation: AWS List Users)(Citation: Google Cloud - IAM Servie Accounts List API) On hosts, adversaries can use default [PowerShell](T1059.001) and other command line functionality to identify accounts. Information about email addresses and accounts may also be extracted by searching an infected system’s files. |
Techniques related with vulnerability CVE-2015-2424 | CVE-2015-2424 in Microsoft PowerPoint. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-15105 | CVE-2020-15105 in django-two-factor-auth. Has primary impact with T1552 : Unsecured Credentials. Has secondary impact with T1078 : Valid Accounts. |
Describe the vulnerability CVE-2018-7494 | CVE-2018-7494, State: PUBLISHED, Published: 2018-05-04T19:00:00Z, Updated: 2024-09-16T19:46:54.978Z, Description: WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length stack buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-1086 | CVE-2019-1086, State: PUBLISHED, Published: 2019-07-15T18:56:21, Updated: 2024-08-04T18:06:31.755Z, Description: An elevation of privilege exists in Windows Audio Service, aka 'Windows Audio Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1087, CVE-2019-1088., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-11078 | CVE-2020-11078, State: PUBLISHED, Published: 2020-05-20T16:00:16, Updated: 2024-08-04T11:21:14.627Z, Description: In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `httplib2.Http.request()` could change request headers and body, send additional hidden requests to same server. This vulnerability impacts software that uses httplib2 with uri constructed by string concatenation, as opposed to proper urllib building with escaping. This has been fixed in 0.18.0., CVSS v3.1 - Attack Complexity: HIGH, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 6.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: HIGH, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2012-3213 | CVE-2012-3213 in Oracle Java SE 7 through Update 11 and 6 through Update 38. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-11045 | CVE-2020-11045 in FreeRDP. Has primary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2018-15869 | CVE-2018-15869, State: PUBLISHED, Published: 2018-08-25T00:00:00, Updated: 2024-08-05T10:10:05.047Z, Description: An Amazon Web Services (AWS) developer who does not specify the --owners flag when describing images via AWS CLI, and therefore not properly validating source software per AWS recommended security best practices, may unintentionally load an undesired and potentially malicious Amazon Machine Image (AMI) from the uncurated public community AMI catalog., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2013-3163 | CVE-2013-3163 in Internet Explorer 8 through 10. Is related with T1203 : Exploitation for Client Execution. |
Describe MITRE technique T1557 | MITRE T1557 : Adversary-in-the-Middle from enterprise Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](T1040), [Transmitted Data Manipulation](T1565.002), or replay attacks ([Exploitation for Credential Access](T1212)). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics)
For example, adversaries may manipulate victim DNS settings to enable other malicious activities such as preventing/redirecting users from accessing legitimate sites and/or pushing additional malware.(Citation: ttint_rat)(Citation: dns_changer_trojans)(Citation: ad_blocker_with_miner) Adversaries may also manipulate DNS and leverage their position in order to intercept user credentials, including access tokens ([Steal Application Access Token](T1528)) and session cookies ([Steal Web Session Cookie](T1539)).(Citation: volexity_0day_sophos_FW)(Citation: Token tactics) [Downgrade Attack](T1562.010)s can also be used to establish an AiTM position, such as by negotiating a less secure, deprecated, or weaker version of communication protocol (SSL/TLS) or encryption algorithm.(Citation: mitm_tls_downgrade_att)(Citation: taxonomy_downgrade_att_tls)(Citation: tlseminar_downgrade_att)
Adversaries may also leverage the AiTM position to attempt to monitor and/or modify traffic, such as in [Transmitted Data Manipulation](T1565.002). Adversaries can setup a position similar to AiTM to prevent traffic from flowing to the appropriate destination, potentially to [Impair Defenses](T1562) and/or in support of a [Network Denial of Service](T1498). |
Describe the vulnerability CVE-2018-15376 | CVE-2018-15376, State: PUBLISHED, Published: 2018-10-05T14:00:00Z, Updated: 2024-09-16T18:55:48.263Z, Description: A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2017-0176 | CVE-2017-0176, State: PUBLISHED, Published: 2017-06-22T14:00:00, Updated: 2024-08-05T12:55:19.141Z, Description: A buffer overflow in Smart Card authentication code in gpkcsp.dll in Microsoft Windows XP through SP3 and Server 2003 through SP2 allows a remote attacker to execute arbitrary code on the target computer, provided that the computer is joined in a Windows domain and has Remote Desktop Protocol connectivity (or Terminal Services) enabled., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-18641 | CVE-2018-18641 in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. Is related with T1552 : Unsecured Credentials. Is related with T1528 : Steal Application Access Token. |
Describe the vulnerability CVE-2019-0808 | CVE-2019-0808, State: PUBLISHED, Published: 2019-04-09T02:31:32, Updated: 2024-08-04T17:58:59.081Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797., No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1078 | MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access, network devices, and remote desktop.(Citation: volexity_0day_sophos_FW) Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence.
In some cases, adversaries may abuse inactive accounts: for example, those belonging to individuals who are no longer part of an organization. Using these accounts may allow the adversary to evade detection, as the original account user will not be present to identify any anomalous activity taking place on their account.(Citation: CISA MFA PrintNightmare)
The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise.(Citation: TechNet Credential Theft) |
Describe the vulnerability CVE-2017-6922 | CVE-2017-6922, State: PUBLISHED, Published: 2019-01-22T15:00:00Z, Updated: 2024-09-16T19:04:17.971Z, Description: In Drupal core 8.x prior to 8.3.4 and Drupal core 7.x prior to 7.56; Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core did not previously provide this protection, allowing an access bypass vulnerability to occur. This issue is mitigated by the fact that in order to be affected, the site must allow anonymous users to upload files into a private file system., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2019-15994 | CVE-2019-15994 in Cisco Stealthwatch Enterprise. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1557 : Man-in-the-Middle. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2014-1776 | CVE-2014-1776 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. Is related with T1499 : Endpoint Denial of Service. |
Describe the vulnerability CVE-2020-8648 | CVE-2020-8648, State: PUBLISHED, Published: 2020-02-06T00:06:36, Updated: 2024-08-04T10:03:46.257Z, Description: There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2013-5211 | CVE-2013-5211 in NTP before 4.2.7p26. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2019-3784 | CVE-2019-3784 in Stratos. Has primary impact with T1563 : Remote Service Session Hijacking. |
Techniques related with vulnerability CVE-2019-12696 | CVE-2019-12696 in Cisco FireSIGHT System Software. Has primary impact with T1190 : Exploit Public-Facing Application. Has an exploitation technique T1204.002 : Malicious File. |
Techniques related with vulnerability CVE-2014-6352 | CVE-2014-6352 in Windows. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.002 : Malicious File. |
Describe the vulnerability CVE-2014-7169 | CVE-2014-7169, State: PUBLISHED, Published: 2014-09-25T01:00:00, Updated: 2024-08-06T12:40:19.217Z, Description: GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2020-11651 | CVE-2020-11651, State: PUBLISHED, Published: 2020-04-30T16:58:09, Updated: 2024-08-04T11:35:13.426Z, Description: An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2010-3971 | CVE-2010-3971 in Cascading Style Sheets (CSS) parser in mshtml.dll. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-5281 | CVE-2020-5281 in perun. Has primary impact with T1059 : Command and Scripting Interpreter. |
Techniques related with vulnerability CVE-2020-3177 | CVE-2020-3177 in Cisco Unified Communications Manager. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1190 : Exploit Public-Facing Application. |
Describe the vulnerability CVE-2020-3312 | CVE-2020-3312, State: PUBLISHED, Published: 2020-05-06T16:40:32.460160Z, Updated: 2024-11-15T17:26:51.732Z, Description: A vulnerability in the application policy configuration of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data on an affected device. The vulnerability is due to insufficient application identification. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to gain unauthorized read access to sensitive data., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: NETWORK, Availability Impact: NONE, Base Score: 5.8, Base Severity: MEDIUM, Confidentiality Impact: NONE, Integrity Impact: LOW, Privileges Required: NONE, Scope: CHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2015-0984 | CVE-2015-0984 in FTP server on Honeywell Excel Web. Is related with T1005 : Data from Local System. Is related with T1190 : Exploit Public-Facing Application. Is related with T1552 : Unsecured Credentials. |
Techniques related with vulnerability CVE-2020-12038 | CVE-2020-12038 in EDS Subsystem, FactoryTalk Linx software. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1204.001 : Malicious Link. |
Techniques related with vulnerability CVE-2018-12520 | CVE-2018-12520 in ntopng 3.4 before 3.4. Is related with T1110 : Brute Force. |
Describe the vulnerability CVE-2020-14059 | CVE-2020-14059, State: PUBLISHED, Published: 2020-06-30T18:23:39, Updated: 2024-08-04T12:32:14.706Z, Description: An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot management list., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2020-12659 | CVE-2020-12659 in Linux kernel before 5.6.7. Is related with T1068 : Exploitation for Privilege Escalation. |
Describe the vulnerability CVE-2019-0911 | CVE-2019-0911, State: PUBLISHED, Published: 2019-05-16T18:17:02, Updated: 2024-08-04T17:58:59.897Z, Description: A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-18234 | CVE-2019-18234, State: PUBLISHED, Published: 2019-12-23T18:36:38, Updated: 2024-08-05T01:47:14.035Z, Description: Equinox Control Expert all versions, is vulnerable to an SQL injection attack, which may allow an attacker to remotely execute arbitrary code., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2017-8759 | CVE-2017-8759, State: PUBLISHED, Published: 2017-09-13T01:00:00Z, Updated: 2024-09-17T01:56:49.985Z, Description: Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2015-7756 | CVE-2015-7756, State: PUBLISHED, Published: 2015-12-19T11:00:00, Updated: 2024-08-06T07:58:59.847Z, Description: The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 makes it easier for remote attackers to discover the plaintext content of VPN sessions by sniffing the network for ciphertext data and conducting an unspecified decryption attack., No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1525 | MITRE T1525 : Implant Internal Image from enterprise Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. Unlike [Upload Malware](T1608.001), this technique focuses on adversaries implanting an image in a registry within a victim’s environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019)
A tool has been developed to facilitate planting backdoors in cloud container images.(Citation: Rhino Labs Cloud Backdoor September 2019) If an adversary has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as a [Web Shell](T1505.003).(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019) |
Describe the vulnerability CVE-2011-1752 | CVE-2011-1752, State: PUBLISHED, Published: 2011-06-06T19:00:00, Updated: 2024-08-06T22:37:25.754Z, Description: The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2016-5195 | CVE-2016-5195, State: PUBLISHED, Published: 2016-11-10T21:00:00, Updated: 2024-08-06T00:53:48.930Z, Description: Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1190 | MITRE T1190 : Exploit Public-Facing Application from enterprise Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.
Exploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may also involve [Exploitation for Defense Evasion](T1211) or [Exploitation for Client Execution](T1203).
If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](T1611), or take advantage of weak identity and access management policies.
Adversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)
For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25) |
Describe the vulnerability CVE-2018-7259 | CVE-2018-7259, State: PUBLISHED, Published: 2018-02-20T00:00:00, Updated: 2024-08-05T06:24:11.388Z, Description: The FSX / P3Dv4 installer 2.0.1.231 for Flight Sim Labs A320-X sends a user's Google account credentials to http://installLog.flightsimlabs.com/LogHandler3.ashx if a pirated serial number has been entered, which allows remote attackers to obtain sensitive information, e.g., by sniffing the network for cleartext HTTP traffic. This behavior was removed in 2.0.1.232., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2013-5576 | CVE-2013-5576, State: PUBLISHED, Published: 2013-10-09T14:44:00, Updated: 2024-08-06T17:15:21.417Z, Description: administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5 allows remote authenticated users or remote attackers to bypass intended access restrictions and upload files with dangerous extensions via a filename with a trailing . (dot), as exploited in the wild in August 2013., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2013-5057 | CVE-2013-5057 in Microsoft Office 2007 SP3 and 2010 SP1 and SP2. Is related with T1190 : Exploit Public-Facing Application. |
Techniques related with vulnerability CVE-2013-4854 | CVE-2013-4854 in ISC BIND 9 and DNSco BIND. Is related with T1499.004 : Application or System Exploitation. |
Describe MITRE technique T1053.005 | MITRE T1053.005 : Scheduled Task from enterprise Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](S0111) utility can be run directly on the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel. In some cases, adversaries have used a .NET wrapper for the Windows Task Scheduler, and alternatively, adversaries have used the Windows netapi32 library to create a scheduled task.
The deprecated [at](S0110) utility could also be abused by adversaries (ex: [At](T1053.002)), though `at.exe` can not access tasks created with `schtasks` or the Control Panel.
An adversary may use Windows Task Scheduler to execute programs at system startup or on a scheduled basis for persistence. The Windows Task Scheduler can also be abused to conduct remote Execution as part of Lateral Movement and/or to run a process under the context of a specified account (such as SYSTEM). Similar to [System Binary Proxy Execution](T1218), adversaries have also abused the Windows Task Scheduler to potentially mask one-time execution under signed/trusted system processes.(Citation: ProofPoint Serpent)
Adversaries may also create "hidden" scheduled tasks (i.e. [Hide Artifacts](T1564)) that may not be visible to defender tools and manual queries used to enumerate tasks. Specifically, an adversary may hide a task from `schtasks /query` and the Task Scheduler by deleting the associated Security Descriptor (SD) registry value (where deletion of this value must be completed using SYSTEM permissions).(Citation: SigmaHQ)(Citation: Tarrask scheduled task) Adversaries may also employ alternate methods to hide tasks, such as altering the metadata (e.g., `Index` value) within associated registry keys.(Citation: Defending Against Scheduled Task Attacks in Windows Environments) |
Describe the vulnerability CVE-2010-0842 | CVE-2010-0842, State: PUBLISHED, Published: 2010-04-01T16:00:00, Updated: 2024-08-07T00:59:39.402Z, Description: Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the March 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2010-2568 | CVE-2010-2568, State: PUBLISHED, Published: 2010-07-22T10:00:00, Updated: 2024-08-07T02:39:36.528Z, Description: Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-15761 | CVE-2018-15761 in UAA. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1078 : Valid Accounts. |
Describe MITRE technique T0842 | MITRE T0842 : Network Sniffing from ics Network sniffing is the practice of using a network interface on a computer system to monitor or capture information (Citation: Enterprise ATT&CK January 2018) regardless of whether it is the specified destination for the information.
An adversary may attempt to sniff the traffic to gain information about the target. This information can vary in the level of importance. Relatively unimportant information is general communications to and from machines. Relatively important information would be login information. User credentials may be sent over an unencrypted protocol, such as Telnet, that can be captured and obtained through network packet analysis.
In addition, ARP and Domain Name Service (DNS) poisoning can be used to capture credentials to websites, proxies, and internal systems by redirecting traffic to an adversary. |
Describe the vulnerability CVE-2013-0629 | CVE-2013-0629, State: PUBLISHED, Published: 2013-01-09T01:00:00, Updated: 2024-08-06T14:33:05.630Z, Description: Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10, when a password is not configured, allows attackers to access restricted directories via unspecified vectors, as exploited in the wild in January 2013., No CVSS metrics available, Exploit Info: No exploit information available |
Describe the vulnerability CVE-2019-15249 | CVE-2019-15249, State: PUBLISHED, Published: 2019-10-16T18:36:35.562077Z, Updated: 2024-11-20T17:05:44.745Z, Description: Multiple vulnerabilities in Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, adjacent attacker to execute arbitrary code with elevated privileges. The vulnerabilities are due to improper validation of user-supplied input to the web-based management interface. An attacker could exploit these vulnerabilities by authenticating to the web-based management interface and sending crafted requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code with elevated privileges. Note: The web-based management interface is enabled by default., CVSS v3.0 - Attack Complexity: LOW, Attack Vector: ADJACENT_NETWORK, Availability Impact: HIGH, Base Score: 8, Base Severity: HIGH, Confidentiality Impact: HIGH, Integrity Impact: HIGH, Privileges Required: LOW, Scope: UNCHANGED, User Interaction: NONE, Exploit Info: The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory. |
Techniques related with vulnerability CVE-2018-11069 | CVE-2018-11069 in RSA BSAFE SSL-J. Has primary impact with T1600 : Weaken Encryption. Has an exploitation technique T1110 : Brute Force. |
Techniques related with vulnerability CVE-2013-2465 | CVE-2013-2465 in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise. |
Techniques related with vulnerability CVE-2020-12653 | CVE-2020-12653 in Linux kernel before 5.5.4. Is related with T1499.004 : Application or System Exploitation. Is related with T1068 : Exploitation for Privilege Escalation. |
Techniques related with vulnerability CVE-2019-15249 | CVE-2019-15249 in Cisco SPA112 2-Port Phone Adapter. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application. Has an exploitation technique T1078 : Valid Accounts. |
Techniques related with vulnerability CVE-2018-8160 | CVE-2018-8160 in Word. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1110 : Brute Force. Has an exploitation technique T1566 : Phishing. |
Techniques related with vulnerability CVE-2009-1800 | CVE-2009-1800 in Chinagames CGAgent ActiveX control. Is related with T1203 : Exploitation for Client Execution. |
Techniques related with vulnerability CVE-2015-3864 | CVE-2015-3864 in mediaserver in Android before 5.1.1 LMY48M. Is related with T1203 : Exploitation for Client Execution. |
Describe the vulnerability CVE-2017-0022 | CVE-2017-0022, State: PUBLISHED, Published: 2017-03-17T00:00:00, Updated: 2024-08-05T12:47:57.582Z, Description: Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability.", No CVSS metrics available, Exploit Info: No exploit information available |
Describe MITRE technique T1491 | MITRE T1491 : Defacement from enterprise Adversaries may modify visual content available internally or externally to an enterprise network, thus affecting the integrity of the original content. Reasons for [Defacement](T1491) include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of [Defacement](T1491) in order to cause user discomfort, or to pressure compliance with accompanying messages.
|
Describe MITRE technique T1110.001 | MITRE T1110.001 : Password Guessing from enterprise Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to attempt access to accounts. Without knowledge of the password for an account, an adversary may opt to systematically guess the password using a repetitive or iterative mechanism. An adversary may guess login credentials without prior knowledge of system or environment passwords during an operation by using a list of common passwords. Password guessing may or may not take into account the target's policies on password complexity or use policies that may lock accounts out after a number of failed attempts.
Guessing passwords can be a risky option because it could cause numerous authentication failures and account lockouts, depending on the organization's login failure policies. (Citation: Cylance Cleaver)
Typically, management services over commonly used ports are used when guessing passwords. Commonly targeted services include the following:
* SSH (22/TCP)
* Telnet (23/TCP)
* FTP (21/TCP)
* NetBIOS / SMB / Samba (139/TCP & 445/TCP)
* LDAP (389/TCP)
* Kerberos (88/TCP)
* RDP / Terminal Services (3389/TCP)
* HTTP/HTTP Management Services (80/TCP & 443/TCP)
* MSSQL (1433/TCP)
* Oracle (1521/TCP)
* MySQL (3306/TCP)
* VNC (5900/TCP)
* SNMP (161/UDP and 162/TCP/UDP)
In addition to management services, adversaries may "target single sign-on (SSO) and cloud-based applications utilizing federated authentication protocols," as well as externally facing email applications, such as Office 365.(Citation: US-CERT TA18-068A 2018). Further, adversaries may abuse network device interfaces (such as `wlanAPI`) to brute force accessible wifi-router(s) via wireless authentication protocols.(Citation: Trend Micro Emotet 2020)
In default environments, LDAP and Kerberos connection attempts are less likely to trigger events over SMB, which creates Windows "logon failure" event ID 4625. |
Describe the vulnerability CVE-2020-12014 | CVE-2020-12014, State: PUBLISHED, Published: 2020-05-08T11:46:31, Updated: 2024-08-04T11:48:57.629Z, Description: Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands., No CVSS metrics available, Exploit Info: No exploit information available |
Techniques related with vulnerability CVE-2018-6112 | CVE-2018-6112 in Chrome. Is related with T1211 : Exploitation for Defense Evasion. |
Techniques related with vulnerability CVE-2018-7526 | CVE-2018-7526 in TotalAlert Web Application in BeaconMedae. Has primary impact with T1005 : Data from Local System. |
Describe the vulnerability CVE-2013-0640 | CVE-2013-0640, State: PUBLISHED, Published: 2013-02-14T01:00:00, Updated: 2024-08-06T14:33:05.574Z, Description: Adobe Reader and Acrobat 9.x before 9.5.4, 10.x before 10.1.6, and 11.x before 11.0.02 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document, as exploited in the wild in February 2013., No CVSS metrics available, Exploit Info: No exploit information available |