Go back

VulnCheck Initial Access Intelligence Update - September 2024

avatar
Patrick Garrityin/patrickmgarrity/

VulnCheck Initial Access Intelligence equips organizations and security teams with detection artifacts including Suricata signatures, YARA rules, PCAPs, and private exploit PoCs to defend against initial access vulnerabilities that are either already being exploited or likely to be exploited soon.

In September 2024, VulnCheck crossed 290+ Initial Access Intelligence (IAI) artifacts, developing artifacts for 16 CVEs, covering 14 different vendors and products. 7 of the 14 have confirmed exploitation activity as of October 7th, 2024.

Notably, we added IAI coverage for CVE-2023-50386, CVE-2019-7256, and CVE-2023-35843 which were discovered to be a target of the recently reported Flax Typhoon Botnet and continue to expand our coverage of the CVEs targeted by this botnet.

Initial Access Intelligence - September 2024

To provide better visibility into these updates, we’ve broken down September’s Initial Access Intelligence Artifacts by CVE. For each CVE, we provide a range of detection tools including:

  • Exploits
  • Version scanners
  • PCAPs
  • Suricata rules
  • Snort rules
  • YARA rules
  • Greynoise/Censys/Shodan queries

September 2024 Initial Access Artifacts

Artifact NameDate AddedCVEExploitVersion ScannerpcapSuricata RulesnortRuleyara
Traccar Image Upload Path Traversal RCE2024-09-05CVE-2024-24809βœ…βœ…βœ…βœ…βœ…
Traccar Unrestricted File Upload2024-09-05CVE-2024-31214βœ…βœ…βœ…βœ…βœ…
GiveWP Remote Code Execution2024-09-06CVE-2024-5932βœ…βœ…βœ…βœ…βœ…
Apache OFBiz CSV Data File Webshell2024-09-10CVE-2024-45195βœ…βœ…βœ…βœ…βœ…βœ…
Zyxel nebula_ap_redirect Crash2024-09-11CVE-2024-7261βœ…βœ…βœ…
ssssssss Spider Flow Command Injection2024-09-12CVE-2024-0195βœ…βœ…βœ…βœ…βœ…
Zyxel NAS Auth Bypass and Configuration Leak2024-09-12CVE-2024-6342βœ…βœ…βœ…βœ…βœ…
SPIP Bigup Plugin Remote Code Execution2024-09-12CVE-2024-8517βœ…βœ…βœ…βœ…βœ…
Apache OFBiz Stats Screen SSRF2024-09-18CVE-2024-45507βœ…βœ…βœ…βœ…βœ…
Progress WhatsUp Gold SQL Injection2024-09-20CVE-2024-6670βœ…βœ…βœ…βœ…βœ…
Sudo Heap-based Overflow "Baron Samedit" Local Privilege Escalation2024-09-25CVE-2021-3156βœ…βœ…
Apache Solr Configuration Backup RCE2024-09-25CVE-2023-50386βœ…βœ…βœ…βœ…βœ…βœ…
Linear eMerge e3-Series ReaderNo Command Injection2024-09-26CVE-2019-7256βœ…βœ…βœ…
Spring Cloud Data Flow Remote Code Execution2024-09-26CVE-2024-37084βœ…βœ…βœ…
NocoDB Path Traversal2024-09-27CVE-2023-35843βœ…βœ…βœ…βœ…
Zimbra RCPT TO Command Injection2024-09-30CVE-2024-45519βœ…βœ…βœ…βœ…βœ…βœ…

Go Exploit Framework

VulnCheck's exploit proof of concept (PoC) and version scanner code is written in the Go programming language. They are provided with a Dockerfile for ease of use. The exploits leverage an Open Source Software (OSS) shared library, which VulnCheck has authored and maintains, called go-exploit.

Learn More About VulnCheck Initial Access Intelligence

Learn more about how you can leverage Initial Access Intelligence detection artifacts to detect & respond to remote code execution (RCE) vulnerabilities here: https://docs.vulncheck.com/products/initial-access-intelligence/introduction