@blamejs/exceptd-skills 0.12.24 → 0.12.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +12 -4
- package/CHANGELOG.md +127 -0
- package/data/_indexes/_meta.json +44 -43
- package/data/_indexes/activity-feed.json +54 -47
- package/data/_indexes/catalog-summaries.json +20 -20
- package/data/_indexes/chains.json +561 -6
- package/data/_indexes/currency.json +19 -10
- package/data/_indexes/frequency.json +207 -55
- package/data/_indexes/handoff-dag.json +4 -0
- package/data/_indexes/jurisdiction-clocks.json +2 -2
- package/data/_indexes/jurisdiction-map.json +25 -12
- package/data/_indexes/section-offsets.json +490 -396
- package/data/_indexes/stale-content.json +14 -2
- package/data/_indexes/summary-cards.json +57 -3
- package/data/_indexes/token-budget.json +129 -74
- package/data/_indexes/trigger-table.json +66 -0
- package/data/_indexes/xref.json +58 -8
- package/data/atlas-ttps.json +528 -19
- package/data/attack-techniques.json +198 -84
- package/data/cve-catalog.json +1309 -9
- package/data/exploit-availability.json +300 -10
- package/data/framework-control-gaps.json +557 -1
- package/data/global-frameworks.json +44 -19
- package/data/rfc-references.json +94 -1
- package/data/zeroday-lessons.json +475 -13
- package/lib/schemas/cve-catalog.schema.json +24 -3
- package/manifest-snapshot.json +68 -2
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +145 -59
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/ai-attack-surface/skill.md +11 -2
- package/skills/ai-c2-detection/skill.md +3 -1
- package/skills/ai-risk-management/skill.md +3 -1
- package/skills/api-security/skill.md +4 -0
- package/skills/attack-surface-pentest/skill.md +1 -0
- package/skills/container-runtime-security/skill.md +3 -1
- package/skills/dlp-gap-analysis/skill.md +1 -1
- package/skills/exploit-scoring/skill.md +2 -2
- package/skills/incident-response-playbook/skill.md +1 -1
- package/skills/kernel-lpe-triage/skill.md +6 -1
- package/skills/mcp-agent-trust/skill.md +7 -2
- package/skills/mlops-security/skill.md +1 -1
- package/skills/rag-pipeline-security/skill.md +4 -2
- package/skills/sector-financial/skill.md +1 -1
- package/skills/sector-telecom/skill.md +259 -0
- package/skills/skill-update-loop/skill.md +1 -1
- package/skills/supply-chain-integrity/skill.md +3 -1
- package/skills/threat-model-currency/skill.md +1 -1
- package/skills/webapp-security/skill.md +2 -0
- package/skills/zeroday-gap-learn/skill.md +2 -2
package/data/cve-catalog.json
CHANGED
|
@@ -59,6 +59,8 @@
|
|
|
59
59
|
"poc_available": true,
|
|
60
60
|
"poc_description": "Published by Johann Rehberger (Embrace the Red, August 2025). Hidden instructions in any agent-readable content (source comments, README, GitHub issues, tool-call responses) coerce Copilot agent mode to write \"chat.tools.autoApprove\": true to .vscode/settings.json, flipping the agent into 'YOLO mode' where every subsequent shell tool call auto-approves without user confirmation. Demo executes calc.exe / Calculator.app via the autoapproved run_in_terminal tool.",
|
|
61
61
|
"ai_discovered": false,
|
|
62
|
+
"ai_discovery_source": "unknown",
|
|
63
|
+
"ai_discovery_notes": "Disclosure provenance for the original bug discovery is unattributed in published references. Distinct from ai_assisted_weaponization (set true) — ai_assisted_weaponization=AI used to develop the exploit; ai_discovered=AI found the bug. The two fields are NOT interchangeable; clarified here to reconcile with data/exploit-availability.json's ai_discovery_confirmed=false + ai_tool_enabled=true on this CVE.",
|
|
62
64
|
"ai_assisted_weaponization": true,
|
|
63
65
|
"ai_assisted_notes": "The vulnerability IS in an AI tool (Copilot agent mode). Attack chain bottlenecks on a structural settings-file write — converts the 'any text could be injection' fuzzy detection problem into a one-line filesystem IoC.",
|
|
64
66
|
"active_exploitation": "suspected",
|
|
@@ -154,7 +156,7 @@
|
|
|
154
156
|
],
|
|
155
157
|
"forensic_note": "The .vscode/settings.json modification is silent and persistent — no in-editor diff is shown to the user. Defenders investigating suspected compromise should snapshot workspace + user-global settings.json BEFORE remediating; the file IS the primary forensic artifact."
|
|
156
158
|
},
|
|
157
|
-
"last_updated": "2026-05-
|
|
159
|
+
"last_updated": "2026-05-15"
|
|
158
160
|
},
|
|
159
161
|
"CVE-2026-30615": {
|
|
160
162
|
"name": "Windsurf MCP Local-Vector RCE via Adversarial Tool Response",
|
|
@@ -167,6 +169,8 @@
|
|
|
167
169
|
"poc_available": true,
|
|
168
170
|
"poc_description": "Partial — MCP client vulnerability in Windsurf allows malicious MCP server to achieve code execution without user interaction",
|
|
169
171
|
"ai_discovered": false,
|
|
172
|
+
"ai_discovery_source": "human_researcher",
|
|
173
|
+
"ai_discovery_notes": "Human security research by Trail of Bits (2026-04-29 tool-poisoning analysis) and Johann Rehberger (Embrace the Red) on the MCP adversarial-tool-response surface class. No agentic-AI discovery component reported by either party.",
|
|
170
174
|
"ai_assisted_weaponization": false,
|
|
171
175
|
"active_exploitation": "suspected",
|
|
172
176
|
"affected": "Windsurf IDE users with MCP servers installed. Architectural attack surface affects all MCP-capable AI coding assistants (Cursor, VS Code, Claude Code, Gemini CLI). 150M+ combined downloads.",
|
|
@@ -264,7 +268,7 @@
|
|
|
264
268
|
"Compromised legitimate publisher key — malicious update from previously-trusted maintainer; signature-based controls do not fire"
|
|
265
269
|
]
|
|
266
270
|
},
|
|
267
|
-
"last_updated": "2026-05-
|
|
271
|
+
"last_updated": "2026-05-15"
|
|
268
272
|
},
|
|
269
273
|
"CVE-2026-31431": {
|
|
270
274
|
"name": "Copy Fail",
|
|
@@ -421,6 +425,8 @@
|
|
|
421
425
|
"poc_available": true,
|
|
422
426
|
"poc_description": "GHSA-4xqg-gf5c-ghwq publishes the PoC: invoke port_forward tool with resourceName containing space-delimited kubectl flags. Attacker-controllable args reach kubectl via .split(' ') concatenation in startPortForward() / executeKubectlCommandAsync().",
|
|
423
427
|
"ai_discovered": false,
|
|
428
|
+
"ai_discovery_source": "human_researcher",
|
|
429
|
+
"ai_discovery_notes": "Human security research surfaced the .split(' ') vs argv-array boundary; GHSA-4xqg-gf5c-ghwq documents the sink shape directly without an AI-tooling provenance trail. The AI angle is in the *exploitation channel* (prompt-injection-mediated tool call), not the *discovery* of the underlying argv-injection.",
|
|
424
430
|
"ai_assisted_weaponization": false,
|
|
425
431
|
"active_exploitation": "suspected",
|
|
426
432
|
"active_exploitation_notes": "No public exploitation evidence as of 2026-05-13, but the MCP-server ecosystem has known opportunistic-scan history. Treated as suspected.",
|
|
@@ -500,7 +506,7 @@
|
|
|
500
506
|
"Network listener bound to 0.0.0.0:<port> by a kubectl process on a host that should only port-forward to localhost"
|
|
501
507
|
]
|
|
502
508
|
},
|
|
503
|
-
"last_updated": "2026-05-
|
|
509
|
+
"last_updated": "2026-05-15"
|
|
504
510
|
},
|
|
505
511
|
"CVE-2026-42208": {
|
|
506
512
|
"name": "BerriAI LiteLLM Proxy Auth SQL Injection",
|
|
@@ -515,6 +521,8 @@
|
|
|
515
521
|
"poc_available": true,
|
|
516
522
|
"poc_description": "GHSA-r75f-5x8p-qvmc documents the sink shape — crafted Authorization header to any LLM API route reaches the vulnerable query through error-handling paths. KEV-listed implies in-wild exploitation evidence.",
|
|
517
523
|
"ai_discovered": false,
|
|
524
|
+
"ai_discovery_source": "human_researcher",
|
|
525
|
+
"ai_discovery_notes": "Conventional human security research by Sysdig Threat Research Team. SQLi sink discovery did not use AI-agentic tooling per the published disclosure. AI relevance is downstream — LiteLLM is AI-gateway infrastructure but the bug class is classical SQLi.",
|
|
518
526
|
"ai_assisted_weaponization": false,
|
|
519
527
|
"active_exploitation": "confirmed",
|
|
520
528
|
"active_exploitation_notes": "CISA KEV listing criterion is in-wild exploitation evidence.",
|
|
@@ -606,7 +614,7 @@
|
|
|
606
614
|
"Environment variables LITELLM_MASTER_KEY, DATABASE_URL on the proxy host"
|
|
607
615
|
]
|
|
608
616
|
},
|
|
609
|
-
"last_updated": "2026-05-
|
|
617
|
+
"last_updated": "2026-05-15"
|
|
610
618
|
},
|
|
611
619
|
"CVE-2026-43284": {
|
|
612
620
|
"name": "Dirty Frag (ESP/IPsec component)",
|
|
@@ -621,6 +629,8 @@
|
|
|
621
629
|
"poc_available": true,
|
|
622
630
|
"poc_description": "Chain component — exploits page-cache write primitive in ESP/IPsec subsystem. Part of two-CVE chain with CVE-2026-43500.",
|
|
623
631
|
"ai_discovered": false,
|
|
632
|
+
"ai_discovery_source": "human_researcher",
|
|
633
|
+
"ai_discovery_notes": "Disclosed via netdev upstream + Sysdig writeup. Sysdig speculated AI-assistance given 9-year latency in upstream skb_try_coalesce path, but no vendor advisory or researcher claim confirms AI discovery. Reverted to human_researcher until upstream attribution clarifies.",
|
|
624
634
|
"ai_assisted_weaponization": false,
|
|
625
635
|
"active_exploitation": "suspected",
|
|
626
636
|
"affected": "Linux systems using IPsec/ESP kernel subsystem — all major distributions with kernel IPsec support",
|
|
@@ -656,7 +666,7 @@
|
|
|
656
666
|
"live_patch_available": 0,
|
|
657
667
|
"reboot_required": 5
|
|
658
668
|
},
|
|
659
|
-
"epss_score":
|
|
669
|
+
"epss_score": 0.00007,
|
|
660
670
|
"epss_percentile": 0.0051,
|
|
661
671
|
"epss_date": "2026-05-13",
|
|
662
672
|
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-43284",
|
|
@@ -755,7 +765,7 @@
|
|
|
755
765
|
"Re-sample 60s after lsmod-loaded-no-policy fires; persistent absence of `ip xfrm state` for >120s with loaded modules indicates non-startup-race anomaly"
|
|
756
766
|
]
|
|
757
767
|
},
|
|
758
|
-
"last_updated": "2026-05-
|
|
768
|
+
"last_updated": "2026-05-15"
|
|
759
769
|
},
|
|
760
770
|
"CVE-2026-43500": {
|
|
761
771
|
"name": "Dirty Frag (RxRPC component)",
|
|
@@ -767,6 +777,8 @@
|
|
|
767
777
|
"poc_available": true,
|
|
768
778
|
"poc_description": "Chain component — exploits page-cache write primitive in RxRPC subsystem. Used in combination with CVE-2026-43284.",
|
|
769
779
|
"ai_discovered": false,
|
|
780
|
+
"ai_discovery_source": "human_researcher",
|
|
781
|
+
"ai_discovery_notes": "Disclosed via netdev upstream + Sysdig writeup. Sysdig speculated AI-assistance given 9-year latency in upstream skb_try_coalesce path, but no vendor advisory or researcher claim confirms AI discovery. Reverted to human_researcher until upstream attribution clarifies.",
|
|
770
782
|
"ai_assisted_weaponization": false,
|
|
771
783
|
"active_exploitation": "suspected",
|
|
772
784
|
"affected": "Linux systems with RxRPC support",
|
|
@@ -904,7 +916,7 @@
|
|
|
904
916
|
]
|
|
905
917
|
},
|
|
906
918
|
"pairing_note": "CVE-2026-43500 only realizes its full primitive when chained with CVE-2026-43284. Detection of either subsystem being exercised on a host that should have neither is itself the chain-detection signal. Simultaneous match of esp-module-loaded-no-policy AND rxrpc-active-call-no-afs-config should escalate to a deterministic paired finding.",
|
|
907
|
-
"last_updated": "2026-05-
|
|
919
|
+
"last_updated": "2026-05-15"
|
|
908
920
|
},
|
|
909
921
|
"CVE-2026-45321": {
|
|
910
922
|
"name": "Mini Shai-Hulud TanStack npm worm",
|
|
@@ -918,6 +930,8 @@
|
|
|
918
930
|
"poc_available": true,
|
|
919
931
|
"poc_description": "Confirmed in-the-wild — 84 malicious versions published across 42 @tanstack/* packages between 2026-05-11 19:20-19:26 UTC. The worm itself IS the PoC; payload analysis published by multiple researchers within 20 minutes.",
|
|
920
932
|
"ai_discovered": false,
|
|
933
|
+
"ai_discovery_source": "threat_actor_ai_built",
|
|
934
|
+
"ai_discovery_notes": "Engineering-grade chained CI-trust-boundary attack attributed to TeamPCP. No AI-discovery component — the primitives (pull_request_target co-residency, actions/cache poisoning, /proc/<pid>/mem token-scraping) are documented human tradecraft. Tagged threat_actor_ai_built source enum to capture the AI-relevant impact-class framing without claiming AI-discovery of the underlying primitive.",
|
|
921
935
|
"ai_assisted_weaponization": false,
|
|
922
936
|
"ai_assisted_notes": "Attack methodology is engineering-grade — chained primitives across CI/CD, pnpm cache, and OIDC token handling. No evidence of AI-assisted exploit development; attribution: TeamPCP.",
|
|
923
937
|
"active_exploitation": "confirmed",
|
|
@@ -1068,7 +1082,7 @@
|
|
|
1068
1082
|
"Windows variant (original Shai-Hulud carry-forward): del /F /Q /S \"%USERPROFILE%*\" && cipher /W:%USERPROFILE%"
|
|
1069
1083
|
]
|
|
1070
1084
|
},
|
|
1071
|
-
"last_updated": "2026-05-
|
|
1085
|
+
"last_updated": "2026-05-15"
|
|
1072
1086
|
},
|
|
1073
1087
|
"MAL-2026-3083": {
|
|
1074
1088
|
"name": "Elementary-Data PyPI Worm (Forged Release via GitHub Actions Script Injection)",
|
|
@@ -1237,6 +1251,8 @@
|
|
|
1237
1251
|
"poc_available": true,
|
|
1238
1252
|
"poc_description": "Public PoC released alongside disclosure on the V12 security team's GitHub. One-line invocation against /usr/bin/su yields a root shell. No race condition — the page-cache write primitive is deterministic.",
|
|
1239
1253
|
"ai_discovered": false,
|
|
1254
|
+
"ai_discovery_source": "human_researcher",
|
|
1255
|
+
"ai_discovery_notes": "Disclosed by William Bowling / V12 security team (human researcher). Earlier RULE7 backfill attributed to Zellic.io conflated Fragnesia with adjacent Dirty Frag commentary; the V12 PoC against /usr/bin/su is human-authored.",
|
|
1240
1256
|
"ai_assisted_weaponization": false,
|
|
1241
1257
|
"active_exploitation": "none",
|
|
1242
1258
|
"affected": "Linux kernel — all distributions shipping kernel >= 5.10 with the XFRM ESP-in-TCP path enabled (default on RHEL 8/9, Ubuntu 20.04+, Debian 11+, Amazon Linux 2/2023, SUSE 15, AlmaLinux 8/9, CloudLinux 8/9, Rocky Linux 8/9, Alpine, and derivatives). Containers inherit host-kernel exposure regardless of image patch level.",
|
|
@@ -1391,6 +1407,1290 @@
|
|
|
1391
1407
|
],
|
|
1392
1408
|
"forensic_note": "Fragnesia corrupts page-cache pages without touching disk. File-integrity tools that hash on-disk bytes (AIDE, Tripwire, IMA in measure-only mode) cannot detect the corruption — the on-disk file is unchanged. Detection requires either (a) reading the binary through the page cache (`vmtouch` + `sha256sum`) and comparing to a freshly-read-from-disk copy after `echo 3 > /proc/sys/vm/drop_caches`, or (b) the runtime_syscall + kernel_trace indicators above. Operators who blacklisted esp4 / esp6 / rxrpc for CVE-2026-43284 / CVE-2026-43500 (Dirty Frag) are already mitigated for Fragnesia — the mitigation set is identical."
|
|
1393
1409
|
},
|
|
1394
|
-
"last_updated": "2026-05-
|
|
1410
|
+
"last_updated": "2026-05-15"
|
|
1411
|
+
},
|
|
1412
|
+
"CVE-2024-21626": {
|
|
1413
|
+
"_draft": true,
|
|
1414
|
+
"_auto_imported": true,
|
|
1415
|
+
"ai_assisted_weaponization": false,
|
|
1416
|
+
"name": "runc /proc/self/fd leak (Leaky Vessels)",
|
|
1417
|
+
"type": "container-escape",
|
|
1418
|
+
"cvss_score": 8.6,
|
|
1419
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
1420
|
+
"cisa_kev": true,
|
|
1421
|
+
"cisa_kev_date": "2024-04-08",
|
|
1422
|
+
"poc_available": true,
|
|
1423
|
+
"poc_description": "Snyk Labs published PoC demonstrating container escape via leaked /proc/self/fd file descriptor pointing at host filesystem root.",
|
|
1424
|
+
"ai_discovered": false,
|
|
1425
|
+
"active_exploitation": "confirmed",
|
|
1426
|
+
"affected": "runc <= 1.1.11 — Docker, containerd, Kubernetes, podman, and every container runtime built on runc.",
|
|
1427
|
+
"affected_versions": [
|
|
1428
|
+
"runc <= 1.1.11"
|
|
1429
|
+
],
|
|
1430
|
+
"vector": "File descriptor leak in runc's WORKDIR / process.cwd handling — attacker container process inherits an fd to the host filesystem, executes against /proc/self/fd/N to escape.",
|
|
1431
|
+
"complexity": "low",
|
|
1432
|
+
"patch_available": true,
|
|
1433
|
+
"patch_required_reboot": false,
|
|
1434
|
+
"live_patch_available": false,
|
|
1435
|
+
"live_patch_tools": [],
|
|
1436
|
+
"vendor_update_paths": [
|
|
1437
|
+
"runc 1.1.12+",
|
|
1438
|
+
"Docker 25.0.2+",
|
|
1439
|
+
"containerd 1.7.13+"
|
|
1440
|
+
],
|
|
1441
|
+
"framework_control_gaps": {
|
|
1442
|
+
"NIST-800-53-SC-39": "Process isolation control assumes runtime correctness — does not account for runtime-level escape.",
|
|
1443
|
+
"ISO-27001-2022-A.8.22": "Segregation of networks/workloads doesn't address container-runtime escape.",
|
|
1444
|
+
"CIS-Kubernetes-Benchmark-5.7": "Pod security standards do not require runtime patch SLA <= 24h for container-escape KEV entries."
|
|
1445
|
+
},
|
|
1446
|
+
"atlas_refs": [],
|
|
1447
|
+
"attack_refs": [
|
|
1448
|
+
"T1611"
|
|
1449
|
+
],
|
|
1450
|
+
"rwep_score": 75,
|
|
1451
|
+
"rwep_factors": {
|
|
1452
|
+
"cisa_kev": 25,
|
|
1453
|
+
"poc_available": 20,
|
|
1454
|
+
"ai_factor": 0,
|
|
1455
|
+
"active_exploitation": 20,
|
|
1456
|
+
"blast_radius": 30,
|
|
1457
|
+
"patch_available": -15,
|
|
1458
|
+
"live_patch_available": 0,
|
|
1459
|
+
"reboot_required": 0
|
|
1460
|
+
},
|
|
1461
|
+
"epss_score": 0.65,
|
|
1462
|
+
"epss_date": "2026-05-14",
|
|
1463
|
+
"cwe_refs": [
|
|
1464
|
+
"CWE-403"
|
|
1465
|
+
],
|
|
1466
|
+
"source_verified": "2026-05-14",
|
|
1467
|
+
"verification_sources": [
|
|
1468
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2024-21626",
|
|
1469
|
+
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1470
|
+
"https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/"
|
|
1471
|
+
],
|
|
1472
|
+
"last_updated": "2026-05-15"
|
|
1473
|
+
},
|
|
1474
|
+
"CVE-2024-3094": {
|
|
1475
|
+
"_draft": true,
|
|
1476
|
+
"_auto_imported": true,
|
|
1477
|
+
"ai_assisted_weaponization": false,
|
|
1478
|
+
"name": "xz-utils liblzma backdoor",
|
|
1479
|
+
"type": "supply-chain-backdoor",
|
|
1480
|
+
"cvss_score": 10,
|
|
1481
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
1482
|
+
"cisa_kev": true,
|
|
1483
|
+
"cisa_kev_date": "2024-04-03",
|
|
1484
|
+
"poc_available": true,
|
|
1485
|
+
"poc_description": "Backdoor itself is the PoC — public analyses by Andres Freund, Akamai, JFrog, Binarly document the signed-binary insertion and the sshd RSA-pubkey-mediated payload trigger.",
|
|
1486
|
+
"ai_discovered": false,
|
|
1487
|
+
"ai_discovery_notes": "Discovered by Andres Freund (human researcher) via performance-regression investigation — sshd 0.5s startup delay traced to liblzma symbol resolution.",
|
|
1488
|
+
"active_exploitation": "suspected",
|
|
1489
|
+
"active_exploitation_notes": "Backdoor was caught before mass exploitation; payload trigger reachable only via attacker holding the corresponding Ed448 signing key.",
|
|
1490
|
+
"affected": "xz-utils 5.6.0 and 5.6.1 — distributed in Debian sid, Fedora 40/41 betas, Kali rolling, openSUSE Tumbleweed, Arch (briefly).",
|
|
1491
|
+
"affected_versions": [
|
|
1492
|
+
"xz-utils 5.6.0",
|
|
1493
|
+
"xz-utils 5.6.1"
|
|
1494
|
+
],
|
|
1495
|
+
"vector": "Multi-stage build-time injection — encrypted shell stages in test fixtures, assembled by m4 macros at configure time, inject a runtime function-pointer override into liblzma's IFUNC resolver. sshd linked against libsystemd (which depends on liblzma) routes specific RSA pubkeys to attacker code path.",
|
|
1496
|
+
"complexity": "high",
|
|
1497
|
+
"complexity_notes": "Exploitation requires possession of the Ed448 signing key embedded in the backdoor.",
|
|
1498
|
+
"patch_available": true,
|
|
1499
|
+
"patch_required_reboot": false,
|
|
1500
|
+
"live_patch_available": false,
|
|
1501
|
+
"live_patch_tools": [],
|
|
1502
|
+
"vendor_update_paths": [
|
|
1503
|
+
"xz-utils 5.6.2+",
|
|
1504
|
+
"Distribution rollback to xz-utils 5.4.x",
|
|
1505
|
+
"Debian/RedHat security-pinned 5.2.x"
|
|
1506
|
+
],
|
|
1507
|
+
"framework_control_gaps": {
|
|
1508
|
+
"NIST-800-218-SSDF-PW.4": "Reuse of secure-by-default components assumes upstream components ARE secure; xz-utils was an upstream that compromised itself across two years of maintainer takeover.",
|
|
1509
|
+
"ISO-27001-2022-A.8.30": "Outsourced development controls don't address upstream OSS maintainer-compromise — the org has no contract with xz.",
|
|
1510
|
+
"NIST-800-53-SR-3": "Supply chain controls anchor on direct vendors; tier-3 (libsystemd -> liblzma) dependencies routinely escape SR-3 inventory.",
|
|
1511
|
+
"EU-CRA-Art13": "Cyber Resilience Act requires SBOM but does not require upstream-maintainer trust assessment.",
|
|
1512
|
+
"SLSA-v1.0-Build-L3": "SLSA build-integrity does not address pre-build source-tree compromise; the malicious test fixtures were committed by the legitimate maintainer account."
|
|
1513
|
+
},
|
|
1514
|
+
"atlas_refs": [],
|
|
1515
|
+
"attack_refs": [
|
|
1516
|
+
"T1195.002",
|
|
1517
|
+
"T1554"
|
|
1518
|
+
],
|
|
1519
|
+
"rwep_score": 70,
|
|
1520
|
+
"rwep_factors": {
|
|
1521
|
+
"cisa_kev": 25,
|
|
1522
|
+
"poc_available": 20,
|
|
1523
|
+
"ai_factor": 0,
|
|
1524
|
+
"active_exploitation": 10,
|
|
1525
|
+
"blast_radius": 40,
|
|
1526
|
+
"patch_available": -15,
|
|
1527
|
+
"live_patch_available": 0,
|
|
1528
|
+
"reboot_required": 0
|
|
1529
|
+
},
|
|
1530
|
+
"epss_score": 0.86,
|
|
1531
|
+
"epss_date": "2026-05-14",
|
|
1532
|
+
"cwe_refs": [
|
|
1533
|
+
"CWE-506",
|
|
1534
|
+
"CWE-1357"
|
|
1535
|
+
],
|
|
1536
|
+
"source_verified": "2026-05-14",
|
|
1537
|
+
"verification_sources": [
|
|
1538
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2024-3094",
|
|
1539
|
+
"https://www.openwall.com/lists/oss-security/2024/03/29/4",
|
|
1540
|
+
"https://research.swtch.com/xz-script"
|
|
1541
|
+
],
|
|
1542
|
+
"last_updated": "2026-05-15"
|
|
1543
|
+
},
|
|
1544
|
+
"CVE-2024-3154": {
|
|
1545
|
+
"_draft": true,
|
|
1546
|
+
"_auto_imported": true,
|
|
1547
|
+
"ai_assisted_weaponization": false,
|
|
1548
|
+
"name": "CRI-O arbitrary kernel-module load",
|
|
1549
|
+
"type": "container-escape",
|
|
1550
|
+
"cvss_score": 8.1,
|
|
1551
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
|
|
1552
|
+
"cisa_kev": false,
|
|
1553
|
+
"cisa_kev_date": null,
|
|
1554
|
+
"poc_available": true,
|
|
1555
|
+
"poc_description": "Public PoC demonstrates kernel module load via crafted pod spec.",
|
|
1556
|
+
"ai_discovered": false,
|
|
1557
|
+
"active_exploitation": "unknown",
|
|
1558
|
+
"affected": "CRI-O 1.27.x < 1.27.10, 1.28.x < 1.28.7, 1.29.x < 1.29.4.",
|
|
1559
|
+
"affected_versions": [
|
|
1560
|
+
"cri-o < 1.29.4",
|
|
1561
|
+
"cri-o < 1.28.7",
|
|
1562
|
+
"cri-o < 1.27.10"
|
|
1563
|
+
],
|
|
1564
|
+
"vector": "Pod spec attributes reach modprobe argument path without validation — attacker with pod-create RBAC loads arbitrary kernel module onto node.",
|
|
1565
|
+
"complexity": "low",
|
|
1566
|
+
"patch_available": true,
|
|
1567
|
+
"patch_required_reboot": false,
|
|
1568
|
+
"live_patch_available": true,
|
|
1569
|
+
"live_patch_tools": [
|
|
1570
|
+
"AppArmor deny-module-load profile",
|
|
1571
|
+
"SELinux module_load deny rule"
|
|
1572
|
+
],
|
|
1573
|
+
"vendor_update_paths": [
|
|
1574
|
+
"cri-o 1.29.4+",
|
|
1575
|
+
"cri-o 1.28.7+",
|
|
1576
|
+
"cri-o 1.27.10+"
|
|
1577
|
+
],
|
|
1578
|
+
"framework_control_gaps": {
|
|
1579
|
+
"NIST-800-53-CM-7": "Least functionality control assumes node-level kernel-module policy is enforced; cluster runtimes that broker module loads invert the trust direction.",
|
|
1580
|
+
"CIS-Kubernetes-Benchmark-4.2.13": "AppArmor profile guidance does not specifically require deny-module-load.",
|
|
1581
|
+
"NIS2-Art21-supply-chain": "Container-runtime supply chain not differentiated from application-runtime supply chain."
|
|
1582
|
+
},
|
|
1583
|
+
"atlas_refs": [],
|
|
1584
|
+
"attack_refs": [
|
|
1585
|
+
"T1611",
|
|
1586
|
+
"T1547.006"
|
|
1587
|
+
],
|
|
1588
|
+
"rwep_score": 30,
|
|
1589
|
+
"rwep_factors": {
|
|
1590
|
+
"cisa_kev": 0,
|
|
1591
|
+
"poc_available": 20,
|
|
1592
|
+
"ai_factor": 0,
|
|
1593
|
+
"active_exploitation": 5,
|
|
1594
|
+
"blast_radius": 30,
|
|
1595
|
+
"patch_available": -15,
|
|
1596
|
+
"live_patch_available": -10,
|
|
1597
|
+
"reboot_required": 0
|
|
1598
|
+
},
|
|
1599
|
+
"epss_score": 0.012,
|
|
1600
|
+
"epss_date": "2026-05-14",
|
|
1601
|
+
"cwe_refs": [
|
|
1602
|
+
"CWE-20"
|
|
1603
|
+
],
|
|
1604
|
+
"source_verified": "2026-05-14",
|
|
1605
|
+
"verification_sources": [
|
|
1606
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2024-3154",
|
|
1607
|
+
"https://github.com/cri-o/cri-o/security/advisories"
|
|
1608
|
+
],
|
|
1609
|
+
"last_updated": "2026-05-15"
|
|
1610
|
+
},
|
|
1611
|
+
"CVE-2023-43472": {
|
|
1612
|
+
"_draft": true,
|
|
1613
|
+
"_auto_imported": true,
|
|
1614
|
+
"ai_assisted_weaponization": false,
|
|
1615
|
+
"name": "MLflow path-traversal arbitrary file read",
|
|
1616
|
+
"type": "path-traversal",
|
|
1617
|
+
"cvss_score": 7.5,
|
|
1618
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
1619
|
+
"cisa_kev": false,
|
|
1620
|
+
"cisa_kev_date": null,
|
|
1621
|
+
"poc_available": true,
|
|
1622
|
+
"poc_description": "Protect AI Huntr report — crafted artifact-fetch URL with ../ traversal reads arbitrary file via MLflow tracking-server endpoints.",
|
|
1623
|
+
"ai_discovered": false,
|
|
1624
|
+
"ai_discovery_notes": "Discovered via Protect AI bug bounty program (Huntr).",
|
|
1625
|
+
"active_exploitation": "unknown",
|
|
1626
|
+
"affected": "MLflow < 2.9.0 — ML training/serving workflows, model registries.",
|
|
1627
|
+
"affected_versions": [
|
|
1628
|
+
"mlflow < 2.9.0"
|
|
1629
|
+
],
|
|
1630
|
+
"vector": "GET /model-versions/get-artifact?path=../../../etc/passwd — server resolves user-controlled path under artifact root without normalization.",
|
|
1631
|
+
"complexity": "low",
|
|
1632
|
+
"patch_available": true,
|
|
1633
|
+
"patch_required_reboot": false,
|
|
1634
|
+
"live_patch_available": false,
|
|
1635
|
+
"live_patch_tools": [],
|
|
1636
|
+
"vendor_update_paths": [
|
|
1637
|
+
"mlflow 2.9.0+"
|
|
1638
|
+
],
|
|
1639
|
+
"framework_control_gaps": {
|
|
1640
|
+
"NIST-AI-RMF-MEASURE-2.7": "ML-pipeline asset confidentiality is referenced but no specific control on tracking-server path normalization.",
|
|
1641
|
+
"OWASP-ML-Top-10-2023-ML06": "Insufficient supply-chain controls in ML — MLflow tracking servers routinely expose model + experiment IO without auth.",
|
|
1642
|
+
"ISO-27001-2022-A.8.28": "Secure coding control does not anchor on ML-runtime web-surface review."
|
|
1643
|
+
},
|
|
1644
|
+
"atlas_refs": [
|
|
1645
|
+
"AML.T0016"
|
|
1646
|
+
],
|
|
1647
|
+
"attack_refs": [
|
|
1648
|
+
"T1083",
|
|
1649
|
+
"T1005"
|
|
1650
|
+
],
|
|
1651
|
+
"rwep_score": 30,
|
|
1652
|
+
"rwep_factors": {
|
|
1653
|
+
"cisa_kev": 0,
|
|
1654
|
+
"poc_available": 20,
|
|
1655
|
+
"ai_factor": 0,
|
|
1656
|
+
"active_exploitation": 0,
|
|
1657
|
+
"blast_radius": 25,
|
|
1658
|
+
"patch_available": -15,
|
|
1659
|
+
"live_patch_available": 0,
|
|
1660
|
+
"reboot_required": 0
|
|
1661
|
+
},
|
|
1662
|
+
"epss_score": 0.014,
|
|
1663
|
+
"epss_date": "2026-05-14",
|
|
1664
|
+
"cwe_refs": [
|
|
1665
|
+
"CWE-22"
|
|
1666
|
+
],
|
|
1667
|
+
"source_verified": "2026-05-14",
|
|
1668
|
+
"verification_sources": [
|
|
1669
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2023-43472",
|
|
1670
|
+
"https://huntr.com/bounties/"
|
|
1671
|
+
],
|
|
1672
|
+
"last_updated": "2026-05-15"
|
|
1673
|
+
},
|
|
1674
|
+
"CVE-2020-10148": {
|
|
1675
|
+
"_draft": true,
|
|
1676
|
+
"_auto_imported": true,
|
|
1677
|
+
"ai_assisted_weaponization": false,
|
|
1678
|
+
"name": "SolarWinds Orion API authentication bypass (SUNBURST chain)",
|
|
1679
|
+
"type": "auth-bypass",
|
|
1680
|
+
"cvss_score": 9.8,
|
|
1681
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
1682
|
+
"cisa_kev": true,
|
|
1683
|
+
"cisa_kev_date": "2021-11-03",
|
|
1684
|
+
"poc_available": true,
|
|
1685
|
+
"poc_description": "CISA AA20-352A documents the URI-pattern auth bypass that SUNBURST operators chained to API write access.",
|
|
1686
|
+
"ai_discovered": false,
|
|
1687
|
+
"active_exploitation": "confirmed",
|
|
1688
|
+
"active_exploitation_notes": "Component of the historic SUNBURST campaign — exploitation occurred at scale against US federal and Fortune 500 networks.",
|
|
1689
|
+
"affected": "SolarWinds Orion Platform 2019.4 HF5 through 2020.2.1.",
|
|
1690
|
+
"affected_versions": [
|
|
1691
|
+
"solarwinds-orion-platform >= 2019.4-HF5",
|
|
1692
|
+
"solarwinds-orion-platform <= 2020.2.1"
|
|
1693
|
+
],
|
|
1694
|
+
"vector": "URI pattern matching against SkipI18nStrings triggers bypass — unauthenticated request matching the pattern reaches API write endpoints.",
|
|
1695
|
+
"complexity": "low",
|
|
1696
|
+
"patch_available": true,
|
|
1697
|
+
"patch_required_reboot": false,
|
|
1698
|
+
"live_patch_available": false,
|
|
1699
|
+
"live_patch_tools": [],
|
|
1700
|
+
"vendor_update_paths": [
|
|
1701
|
+
"Orion Platform 2020.2.1 HF2+",
|
|
1702
|
+
"WAF blocking SkipI18nStrings pattern"
|
|
1703
|
+
],
|
|
1704
|
+
"framework_control_gaps": {
|
|
1705
|
+
"NIST-800-53-IA-2": "Identification and Authentication control trusted the application's URI-matching layer — does not address pattern-bypass classes.",
|
|
1706
|
+
"ISO-27001-2022-A.5.15": "Access control reviewed at organizational level; URI-pattern auth bypass is a code-level failure under app-vendor responsibility."
|
|
1707
|
+
},
|
|
1708
|
+
"atlas_refs": [],
|
|
1709
|
+
"attack_refs": [
|
|
1710
|
+
"T1190",
|
|
1711
|
+
"T1078"
|
|
1712
|
+
],
|
|
1713
|
+
"rwep_score": 75,
|
|
1714
|
+
"rwep_factors": {
|
|
1715
|
+
"cisa_kev": 25,
|
|
1716
|
+
"poc_available": 20,
|
|
1717
|
+
"ai_factor": 0,
|
|
1718
|
+
"active_exploitation": 20,
|
|
1719
|
+
"blast_radius": 25,
|
|
1720
|
+
"patch_available": -15,
|
|
1721
|
+
"live_patch_available": 0,
|
|
1722
|
+
"reboot_required": 0
|
|
1723
|
+
},
|
|
1724
|
+
"epss_score": 0.945,
|
|
1725
|
+
"epss_date": "2026-05-14",
|
|
1726
|
+
"cwe_refs": [
|
|
1727
|
+
"CWE-287"
|
|
1728
|
+
],
|
|
1729
|
+
"source_verified": "2026-05-14",
|
|
1730
|
+
"verification_sources": [
|
|
1731
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2020-10148",
|
|
1732
|
+
"https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a"
|
|
1733
|
+
],
|
|
1734
|
+
"last_updated": "2026-05-15"
|
|
1735
|
+
},
|
|
1736
|
+
"CVE-2023-3519": {
|
|
1737
|
+
"_draft": true,
|
|
1738
|
+
"_auto_imported": true,
|
|
1739
|
+
"ai_assisted_weaponization": false,
|
|
1740
|
+
"name": "Citrix NetScaler ADC/Gateway unauth RCE (CitrixBleed precursor)",
|
|
1741
|
+
"type": "RCE",
|
|
1742
|
+
"cvss_score": 9.8,
|
|
1743
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
1744
|
+
"cisa_kev": true,
|
|
1745
|
+
"cisa_kev_date": "2023-07-19",
|
|
1746
|
+
"poc_available": true,
|
|
1747
|
+
"poc_description": "Multiple public PoCs — stack buffer overflow in the SAML authentication endpoint reached pre-auth with HTTP POST.",
|
|
1748
|
+
"ai_discovered": false,
|
|
1749
|
+
"active_exploitation": "confirmed",
|
|
1750
|
+
"affected": "Citrix NetScaler ADC + Gateway 12.1, 13.0, 13.1.",
|
|
1751
|
+
"affected_versions": [
|
|
1752
|
+
"netscaler-adc < 13.1-49.13",
|
|
1753
|
+
"netscaler-adc < 13.0-91.13",
|
|
1754
|
+
"netscaler-adc < 12.1-66.13"
|
|
1755
|
+
],
|
|
1756
|
+
"vector": "Pre-auth stack buffer overflow in nsppe SAML processing — POST to /gwtest/formssso reaches vulnerable parser.",
|
|
1757
|
+
"complexity": "low",
|
|
1758
|
+
"patch_available": true,
|
|
1759
|
+
"patch_required_reboot": false,
|
|
1760
|
+
"live_patch_available": false,
|
|
1761
|
+
"live_patch_tools": [],
|
|
1762
|
+
"vendor_update_paths": [
|
|
1763
|
+
"NetScaler 13.1-49.13+",
|
|
1764
|
+
"NetScaler 13.0-91.13+",
|
|
1765
|
+
"NetScaler 12.1-66.13+"
|
|
1766
|
+
],
|
|
1767
|
+
"framework_control_gaps": {
|
|
1768
|
+
"NIST-800-53-SI-2": "30-day patch SLA insufficient for unauth RCE on public-facing appliances.",
|
|
1769
|
+
"PCI-DSS-4.0-6.3.3": "Same — 1-month critical patch window is a permission slip.",
|
|
1770
|
+
"NIS2-Art21-vulnerability-management": "EU NIS2 generic patch-management guidance without unauth-RCE-specific SLA."
|
|
1771
|
+
},
|
|
1772
|
+
"atlas_refs": [],
|
|
1773
|
+
"attack_refs": [
|
|
1774
|
+
"T1190"
|
|
1775
|
+
],
|
|
1776
|
+
"rwep_score": 75,
|
|
1777
|
+
"rwep_factors": {
|
|
1778
|
+
"cisa_kev": 25,
|
|
1779
|
+
"poc_available": 20,
|
|
1780
|
+
"ai_factor": 0,
|
|
1781
|
+
"active_exploitation": 20,
|
|
1782
|
+
"blast_radius": 30,
|
|
1783
|
+
"patch_available": -15,
|
|
1784
|
+
"live_patch_available": 0,
|
|
1785
|
+
"reboot_required": 0
|
|
1786
|
+
},
|
|
1787
|
+
"epss_score": 0.967,
|
|
1788
|
+
"epss_date": "2026-05-14",
|
|
1789
|
+
"cwe_refs": [
|
|
1790
|
+
"CWE-119",
|
|
1791
|
+
"CWE-787"
|
|
1792
|
+
],
|
|
1793
|
+
"source_verified": "2026-05-14",
|
|
1794
|
+
"verification_sources": [
|
|
1795
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2023-3519",
|
|
1796
|
+
"https://support.citrix.com/article/CTX561482"
|
|
1797
|
+
],
|
|
1798
|
+
"last_updated": "2026-05-15"
|
|
1799
|
+
},
|
|
1800
|
+
"CVE-2024-1709": {
|
|
1801
|
+
"_draft": true,
|
|
1802
|
+
"_auto_imported": true,
|
|
1803
|
+
"ai_assisted_weaponization": false,
|
|
1804
|
+
"name": "ConnectWise ScreenConnect auth-bypass",
|
|
1805
|
+
"type": "auth-bypass",
|
|
1806
|
+
"cvss_score": 10,
|
|
1807
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
1808
|
+
"cisa_kev": true,
|
|
1809
|
+
"cisa_kev_date": "2024-02-22",
|
|
1810
|
+
"poc_available": true,
|
|
1811
|
+
"poc_description": "Trivially exploitable — append /SetupWizard.aspx/anything to URL to bypass auth and reach admin setup page.",
|
|
1812
|
+
"ai_discovered": false,
|
|
1813
|
+
"active_exploitation": "confirmed",
|
|
1814
|
+
"affected": "ConnectWise ScreenConnect <= 23.9.7 — remote IT support tooling deployed in MSP fleets.",
|
|
1815
|
+
"affected_versions": [
|
|
1816
|
+
"screenconnect <= 23.9.7"
|
|
1817
|
+
],
|
|
1818
|
+
"vector": "Path-traversal to bypass auth filter on /SetupWizard.aspx — attacker gains admin context and creates new admin user via setup endpoint.",
|
|
1819
|
+
"complexity": "low",
|
|
1820
|
+
"patch_available": true,
|
|
1821
|
+
"patch_required_reboot": false,
|
|
1822
|
+
"live_patch_available": false,
|
|
1823
|
+
"live_patch_tools": [],
|
|
1824
|
+
"vendor_update_paths": [
|
|
1825
|
+
"ScreenConnect 23.9.8+"
|
|
1826
|
+
],
|
|
1827
|
+
"framework_control_gaps": {
|
|
1828
|
+
"NIST-800-53-AC-3": "Access enforcement assumed; bypass occurred at routing layer before AC-3 check.",
|
|
1829
|
+
"NIST-800-53-IA-2": "MFA on admin would not have prevented — bypass creates a new admin account that satisfies whatever MFA policy applies.",
|
|
1830
|
+
"CIS-Controls-v8-Control6": "Access control management does not require setup-endpoint hardening on production deployments."
|
|
1831
|
+
},
|
|
1832
|
+
"atlas_refs": [],
|
|
1833
|
+
"attack_refs": [
|
|
1834
|
+
"T1190",
|
|
1835
|
+
"T1078"
|
|
1836
|
+
],
|
|
1837
|
+
"rwep_score": 75,
|
|
1838
|
+
"rwep_factors": {
|
|
1839
|
+
"cisa_kev": 25,
|
|
1840
|
+
"poc_available": 20,
|
|
1841
|
+
"ai_factor": 0,
|
|
1842
|
+
"active_exploitation": 20,
|
|
1843
|
+
"blast_radius": 25,
|
|
1844
|
+
"patch_available": -15,
|
|
1845
|
+
"live_patch_available": 0,
|
|
1846
|
+
"reboot_required": 0
|
|
1847
|
+
},
|
|
1848
|
+
"epss_score": 0.973,
|
|
1849
|
+
"epss_date": "2026-05-14",
|
|
1850
|
+
"cwe_refs": [
|
|
1851
|
+
"CWE-288"
|
|
1852
|
+
],
|
|
1853
|
+
"source_verified": "2026-05-14",
|
|
1854
|
+
"verification_sources": [
|
|
1855
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2024-1709",
|
|
1856
|
+
"https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8"
|
|
1857
|
+
],
|
|
1858
|
+
"last_updated": "2026-05-15"
|
|
1859
|
+
},
|
|
1860
|
+
"CVE-2026-20182": {
|
|
1861
|
+
"_draft": true,
|
|
1862
|
+
"_auto_imported": true,
|
|
1863
|
+
"ai_assisted_weaponization": false,
|
|
1864
|
+
"name": "Cisco SD-WAN authentication bypass to admin",
|
|
1865
|
+
"type": "auth-bypass",
|
|
1866
|
+
"cvss_score": 10,
|
|
1867
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
1868
|
+
"cisa_kev": true,
|
|
1869
|
+
"cisa_kev_date": "2026-05-14",
|
|
1870
|
+
"poc_available": false,
|
|
1871
|
+
"ai_discovered": false,
|
|
1872
|
+
"ai_discovery_source": "unknown",
|
|
1873
|
+
"active_exploitation": "confirmed",
|
|
1874
|
+
"active_exploitation_notes": "KEV-added with active-exploitation flag 2026-05-14.",
|
|
1875
|
+
"affected": "Cisco SD-WAN vManage and vEdge controllers across multiple software trains.",
|
|
1876
|
+
"affected_versions": [
|
|
1877
|
+
"cisco-sdwan-vmanage <vendor-build>",
|
|
1878
|
+
"cisco-sdwan-vedge <vendor-build>"
|
|
1879
|
+
],
|
|
1880
|
+
"vector": "Authentication bypass in SD-WAN controller management plane — unauthenticated attacker reaches admin-equivalent state on the controller.",
|
|
1881
|
+
"complexity": "low",
|
|
1882
|
+
"patch_available": true,
|
|
1883
|
+
"patch_required_reboot": true,
|
|
1884
|
+
"live_patch_available": false,
|
|
1885
|
+
"live_patch_tools": [],
|
|
1886
|
+
"vendor_update_paths": [
|
|
1887
|
+
"Cisco SD-WAN per cisco-sa-sdwan-authbypass advisory build matrix"
|
|
1888
|
+
],
|
|
1889
|
+
"framework_control_gaps": {
|
|
1890
|
+
"NIST-800-53-IA-2": "Network-fabric controller auth depended on the bypassed surface; IA-2 satisfied on paper.",
|
|
1891
|
+
"NIS2-Art21-network-security": "EU NIS2 critical-infrastructure rules treat SD-WAN controllers as essential service infrastructure but lack CISA-KEV-tied 24h SLA.",
|
|
1892
|
+
"DORA-Art-9": "ICT third-party risk: SD-WAN vendor risk concentrated in single advisory cadence."
|
|
1893
|
+
},
|
|
1894
|
+
"atlas_refs": [],
|
|
1895
|
+
"attack_refs": [
|
|
1896
|
+
"T1190",
|
|
1897
|
+
"T1078"
|
|
1898
|
+
],
|
|
1899
|
+
"rwep_score": 65,
|
|
1900
|
+
"rwep_factors": {
|
|
1901
|
+
"cisa_kev": 25,
|
|
1902
|
+
"poc_available": 0,
|
|
1903
|
+
"ai_factor": 0,
|
|
1904
|
+
"active_exploitation": 20,
|
|
1905
|
+
"blast_radius": 35,
|
|
1906
|
+
"patch_available": -15,
|
|
1907
|
+
"live_patch_available": 0,
|
|
1908
|
+
"reboot_required": 5
|
|
1909
|
+
},
|
|
1910
|
+
"epss_score": 0.5,
|
|
1911
|
+
"epss_date": "2026-05-14",
|
|
1912
|
+
"cwe_refs": [
|
|
1913
|
+
"CWE-287"
|
|
1914
|
+
],
|
|
1915
|
+
"source_verified": "2026-05-14",
|
|
1916
|
+
"verification_sources": [
|
|
1917
|
+
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
1918
|
+
"https://sec.cloudapps.cisco.com/security/center/publicationListing.x"
|
|
1919
|
+
],
|
|
1920
|
+
"last_updated": "2026-05-15"
|
|
1921
|
+
},
|
|
1922
|
+
"CVE-2024-40635": {
|
|
1923
|
+
"_draft": true,
|
|
1924
|
+
"_auto_imported": true,
|
|
1925
|
+
"ai_assisted_weaponization": false,
|
|
1926
|
+
"name": "containerd integer overflow IP mask leak",
|
|
1927
|
+
"type": "information-disclosure",
|
|
1928
|
+
"cvss_score": 5.9,
|
|
1929
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
1930
|
+
"cisa_kev": false,
|
|
1931
|
+
"cisa_kev_date": null,
|
|
1932
|
+
"poc_available": true,
|
|
1933
|
+
"poc_description": "Snyk Labs PoC — crafted CIDR specification overflows uint32 mask conversion.",
|
|
1934
|
+
"ai_discovered": false,
|
|
1935
|
+
"active_exploitation": "unknown",
|
|
1936
|
+
"affected": "containerd 1.6.x < 1.6.34, 1.7.x < 1.7.21.",
|
|
1937
|
+
"affected_versions": [
|
|
1938
|
+
"containerd < 1.6.34",
|
|
1939
|
+
"containerd < 1.7.21"
|
|
1940
|
+
],
|
|
1941
|
+
"vector": "Integer overflow in CNI IP-allocation path — container receives spurious mask, leaks across network namespaces.",
|
|
1942
|
+
"complexity": "moderate",
|
|
1943
|
+
"patch_available": true,
|
|
1944
|
+
"patch_required_reboot": false,
|
|
1945
|
+
"live_patch_available": false,
|
|
1946
|
+
"live_patch_tools": [],
|
|
1947
|
+
"vendor_update_paths": [
|
|
1948
|
+
"containerd 1.7.21+",
|
|
1949
|
+
"containerd 1.6.34+"
|
|
1950
|
+
],
|
|
1951
|
+
"framework_control_gaps": {
|
|
1952
|
+
"NIST-800-53-SC-7": "Boundary protection presumes network-namespace integrity; integer overflow in IPAM defeats it.",
|
|
1953
|
+
"CIS-Kubernetes-Benchmark-5.3": "Network policies don't address container-runtime IPAM correctness."
|
|
1954
|
+
},
|
|
1955
|
+
"atlas_refs": [],
|
|
1956
|
+
"attack_refs": [
|
|
1957
|
+
"T1525",
|
|
1958
|
+
"T1046"
|
|
1959
|
+
],
|
|
1960
|
+
"rwep_score": 30,
|
|
1961
|
+
"rwep_factors": {
|
|
1962
|
+
"cisa_kev": 0,
|
|
1963
|
+
"poc_available": 20,
|
|
1964
|
+
"ai_factor": 0,
|
|
1965
|
+
"active_exploitation": 0,
|
|
1966
|
+
"blast_radius": 20,
|
|
1967
|
+
"patch_available": -15,
|
|
1968
|
+
"live_patch_available": 0,
|
|
1969
|
+
"reboot_required": 0
|
|
1970
|
+
},
|
|
1971
|
+
"epss_score": 0.005,
|
|
1972
|
+
"epss_date": "2026-05-14",
|
|
1973
|
+
"cwe_refs": [
|
|
1974
|
+
"CWE-190"
|
|
1975
|
+
],
|
|
1976
|
+
"source_verified": "2026-05-14",
|
|
1977
|
+
"verification_sources": [
|
|
1978
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2024-40635",
|
|
1979
|
+
"https://github.com/containerd/containerd/security/advisories"
|
|
1980
|
+
],
|
|
1981
|
+
"last_updated": "2026-05-15"
|
|
1982
|
+
},
|
|
1983
|
+
"MAL-2026-TANSTACK-MINI": {
|
|
1984
|
+
"_draft": true,
|
|
1985
|
+
"_auto_imported": true,
|
|
1986
|
+
"ai_assisted_weaponization": false,
|
|
1987
|
+
"name": "Mini Shai-Hulud (TanStack worm)",
|
|
1988
|
+
"type": "supply-chain-worm",
|
|
1989
|
+
"cvss_score": 9.8,
|
|
1990
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
1991
|
+
"cisa_kev": false,
|
|
1992
|
+
"cisa_kev_date": null,
|
|
1993
|
+
"poc_available": true,
|
|
1994
|
+
"poc_description": "84 malicious versions across 42 @tanstack/* packages 2026-05-11 — the worm IS the PoC.",
|
|
1995
|
+
"ai_discovered": false,
|
|
1996
|
+
"active_exploitation": "confirmed",
|
|
1997
|
+
"active_exploitation_notes": "Self-propagating — malicious versions executed at install time, harvested local credentials, attempted to republish to other packages the host had npm-publish access to.",
|
|
1998
|
+
"affected": "@tanstack/* packages — 42 packages affected via shared maintainer org compromise.",
|
|
1999
|
+
"affected_versions": [
|
|
2000
|
+
"@tanstack/* malicious versions per TanStack security advisory 2026-05-11"
|
|
2001
|
+
],
|
|
2002
|
+
"vector": "Compromised maintainer npm token published 84 versions that ran a malicious postinstall hook. Hook harvested ~/.npmrc, ~/.aws/credentials, GitHub PAT files, then attempted republication.",
|
|
2003
|
+
"complexity": "low",
|
|
2004
|
+
"complexity_notes": "Consumer-side exploitation is install-time — `npm install` of any pinned-range that resolves to a malicious version triggers payload before any dev review.",
|
|
2005
|
+
"patch_available": true,
|
|
2006
|
+
"patch_required_reboot": false,
|
|
2007
|
+
"live_patch_available": false,
|
|
2008
|
+
"live_patch_tools": [],
|
|
2009
|
+
"vendor_update_paths": [
|
|
2010
|
+
"npm yanked affected versions 2026-05-11",
|
|
2011
|
+
"Pin to @tanstack/* versions published before 2026-05-11T00:00Z",
|
|
2012
|
+
"Audit lockfiles against TanStack security-advisory version list"
|
|
2013
|
+
],
|
|
2014
|
+
"framework_control_gaps": {
|
|
2015
|
+
"NIST-800-218-SSDF-PW.4": "Reused-OSS-component control assumes maintainer-account integrity.",
|
|
2016
|
+
"SLSA-v1.0-Source-L3": "SLSA source-integrity reviews don't apply to npm packages without provenance attestations.",
|
|
2017
|
+
"EU-CRA-Art13": "SBOM requirement does not address freshness-of-published-version.",
|
|
2018
|
+
"NIS2-Art21-supply-chain": "Generic supply chain controls without npm-ecosystem-specific guidance."
|
|
2019
|
+
},
|
|
2020
|
+
"atlas_refs": [
|
|
2021
|
+
"AML.T0010",
|
|
2022
|
+
"AML.T0019"
|
|
2023
|
+
],
|
|
2024
|
+
"attack_refs": [
|
|
2025
|
+
"T1195.001",
|
|
2026
|
+
"T1552.001"
|
|
2027
|
+
],
|
|
2028
|
+
"rwep_score": 55,
|
|
2029
|
+
"rwep_factors": {
|
|
2030
|
+
"cisa_kev": 0,
|
|
2031
|
+
"poc_available": 20,
|
|
2032
|
+
"ai_factor": 0,
|
|
2033
|
+
"active_exploitation": 20,
|
|
2034
|
+
"blast_radius": 40,
|
|
2035
|
+
"patch_available": -10,
|
|
2036
|
+
"live_patch_available": 0,
|
|
2037
|
+
"reboot_required": 0
|
|
2038
|
+
},
|
|
2039
|
+
"epss_score": null,
|
|
2040
|
+
"epss_date": "2026-05-14",
|
|
2041
|
+
"cwe_refs": [
|
|
2042
|
+
"CWE-506",
|
|
2043
|
+
"CWE-1395"
|
|
2044
|
+
],
|
|
2045
|
+
"source_verified": "2026-05-14",
|
|
2046
|
+
"verification_sources": [
|
|
2047
|
+
"https://tanstack.com/security",
|
|
2048
|
+
"https://github.com/TanStack/query/security/advisories",
|
|
2049
|
+
"https://www.npmjs.com/advisories"
|
|
2050
|
+
],
|
|
2051
|
+
"last_updated": "2026-05-15"
|
|
2052
|
+
},
|
|
2053
|
+
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2054
|
+
"_draft": true,
|
|
2055
|
+
"_auto_imported": true,
|
|
2056
|
+
"ai_assisted_weaponization": false,
|
|
2057
|
+
"name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
|
|
2058
|
+
"type": "command-injection",
|
|
2059
|
+
"cvss_score": 9,
|
|
2060
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
2061
|
+
"cisa_kev": false,
|
|
2062
|
+
"cisa_kev_date": null,
|
|
2063
|
+
"poc_available": false,
|
|
2064
|
+
"poc_description": "Embargoed — operator-supplied configuration parameter reaches subprocess exec argv concatenation.",
|
|
2065
|
+
"ai_discovered": false,
|
|
2066
|
+
"active_exploitation": "unknown",
|
|
2067
|
+
"active_exploitation_notes": "Embargoed disclosure pending vendor advisory.",
|
|
2068
|
+
"affected": "Anthropic MCP-client STDIO transport in published SDK versions handling operator-configured server-spawn commands.",
|
|
2069
|
+
"affected_versions": [
|
|
2070
|
+
"anthropic-sdk pending-vendor-advisory"
|
|
2071
|
+
],
|
|
2072
|
+
"vector": "MCP-client spawns server subprocess from operator config — argument parsing concatenates user-controlled fields into the exec argv via shell-like splitting rather than argv-array passing.",
|
|
2073
|
+
"complexity": "low",
|
|
2074
|
+
"patch_available": false,
|
|
2075
|
+
"patch_required_reboot": false,
|
|
2076
|
+
"live_patch_available": true,
|
|
2077
|
+
"live_patch_tools": [
|
|
2078
|
+
"Operator-side allowlist of MCP server configurations",
|
|
2079
|
+
"Pin MCP server commands to immutable absolute paths",
|
|
2080
|
+
"Disable user-provided MCP server config until vendor advisory lands"
|
|
2081
|
+
],
|
|
2082
|
+
"vendor_update_paths": [
|
|
2083
|
+
"Pending Anthropic SDK security release"
|
|
2084
|
+
],
|
|
2085
|
+
"framework_control_gaps": {
|
|
2086
|
+
"NIST-AI-RMF-MEASURE-2.7": "MCP-client trust boundary not specifically called out — operator-config-as-input is treated as platform-trusted.",
|
|
2087
|
+
"OWASP-LLM-Top-10-2025-LLM05": "Improper output handling on LLM-side; this is the symmetric upstream — improper INPUT handling on transport side.",
|
|
2088
|
+
"ISO-27001-2022-A.8.28": "Secure coding assumed in vendor SDKs without tooling to attest."
|
|
2089
|
+
},
|
|
2090
|
+
"atlas_refs": [
|
|
2091
|
+
"AML.T0040"
|
|
2092
|
+
],
|
|
2093
|
+
"attack_refs": [
|
|
2094
|
+
"T1059"
|
|
2095
|
+
],
|
|
2096
|
+
"rwep_score": 25,
|
|
2097
|
+
"rwep_factors": {
|
|
2098
|
+
"cisa_kev": 0,
|
|
2099
|
+
"poc_available": 10,
|
|
2100
|
+
"ai_factor": 0,
|
|
2101
|
+
"active_exploitation": 5,
|
|
2102
|
+
"blast_radius": 30,
|
|
2103
|
+
"patch_available": 0,
|
|
2104
|
+
"live_patch_available": -5,
|
|
2105
|
+
"reboot_required": 0
|
|
2106
|
+
},
|
|
2107
|
+
"epss_score": null,
|
|
2108
|
+
"epss_date": "2026-05-14",
|
|
2109
|
+
"cwe_refs": [
|
|
2110
|
+
"CWE-78",
|
|
2111
|
+
"CWE-88"
|
|
2112
|
+
],
|
|
2113
|
+
"source_verified": "2026-05-14",
|
|
2114
|
+
"verification_sources": [
|
|
2115
|
+
"https://docs.anthropic.com/security",
|
|
2116
|
+
"https://modelcontextprotocol.io/"
|
|
2117
|
+
],
|
|
2118
|
+
"last_updated": "2026-05-15"
|
|
2119
|
+
},
|
|
2120
|
+
"CVE-2026-GTIG-AI-2FA": {
|
|
2121
|
+
"_draft": true,
|
|
2122
|
+
"_auto_imported": true,
|
|
2123
|
+
"name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
|
|
2124
|
+
"type": "auth-bypass",
|
|
2125
|
+
"cvss_score": 8.1,
|
|
2126
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2127
|
+
"cisa_kev": false,
|
|
2128
|
+
"cisa_kev_date": null,
|
|
2129
|
+
"poc_available": false,
|
|
2130
|
+
"poc_description": "Embargoed — GTIG 2026-05-11 report references in-the-wild exploitation by a financially motivated threat actor using AI-built exploit code targeting an unnamed enterprise 2FA service.",
|
|
2131
|
+
"ai_discovered": true,
|
|
2132
|
+
"ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild.",
|
|
2133
|
+
"ai_assisted_weaponization": true,
|
|
2134
|
+
"ai_assisted_notes": "Per GTIG attribution analysis — exploit code structure consistent with AI-generated output.",
|
|
2135
|
+
"active_exploitation": "confirmed",
|
|
2136
|
+
"affected": "Unnamed enterprise 2FA service per GTIG embargo; placeholder entry pending CVE assignment.",
|
|
2137
|
+
"affected_versions": [
|
|
2138
|
+
"pending-disclosure"
|
|
2139
|
+
],
|
|
2140
|
+
"vector": "Authentication state-machine confusion — exploit payload bypasses second-factor challenge by manipulating session token at the post-primary-auth / pre-2FA-challenge boundary.",
|
|
2141
|
+
"complexity": "moderate",
|
|
2142
|
+
"patch_available": false,
|
|
2143
|
+
"patch_required_reboot": false,
|
|
2144
|
+
"live_patch_available": true,
|
|
2145
|
+
"live_patch_tools": [
|
|
2146
|
+
"Vendor-side rate-limiting on 2FA challenge endpoint",
|
|
2147
|
+
"Anomaly detection on session-token mutation between auth phases",
|
|
2148
|
+
"Out-of-band MFA fallback"
|
|
2149
|
+
],
|
|
2150
|
+
"vendor_update_paths": [
|
|
2151
|
+
"Pending vendor advisory"
|
|
2152
|
+
],
|
|
2153
|
+
"framework_control_gaps": {
|
|
2154
|
+
"NIST-AI-RMF-MEASURE-2.7": "AI-discovered + AI-built exploit class not anchored in any framework.",
|
|
2155
|
+
"NIS2-Art21-incident-handling": "EU NIS2 incident-handling SLA does not differentiate AI-built vs human-built exploit class.",
|
|
2156
|
+
"ISO-27001-2022-A.5.7": "Threat intelligence control does not specifically require AI-attack-development feeds.",
|
|
2157
|
+
"FedRAMP-IA-2": "MFA requirement satisfied on paper; AI-built bypass operates at a layer below the MFA control surface.",
|
|
2158
|
+
"EU-AI-Act-Art-15": "AI Act robustness requirement applies to AI SYSTEMS not to defending against AI-built attacks."
|
|
2159
|
+
},
|
|
2160
|
+
"atlas_refs": [
|
|
2161
|
+
"AML.T0040",
|
|
2162
|
+
"AML.T0051"
|
|
2163
|
+
],
|
|
2164
|
+
"attack_refs": [
|
|
2165
|
+
"T1078",
|
|
2166
|
+
"T1556"
|
|
2167
|
+
],
|
|
2168
|
+
"rwep_score": 55,
|
|
2169
|
+
"rwep_factors": {
|
|
2170
|
+
"cisa_kev": 0,
|
|
2171
|
+
"poc_available": 10,
|
|
2172
|
+
"ai_factor": 25,
|
|
2173
|
+
"active_exploitation": 20,
|
|
2174
|
+
"blast_radius": 30,
|
|
2175
|
+
"patch_available": 0,
|
|
2176
|
+
"live_patch_available": -5,
|
|
2177
|
+
"reboot_required": 0
|
|
2178
|
+
},
|
|
2179
|
+
"epss_score": null,
|
|
2180
|
+
"epss_date": "2026-05-14",
|
|
2181
|
+
"cwe_refs": [
|
|
2182
|
+
"CWE-287",
|
|
2183
|
+
"CWE-841"
|
|
2184
|
+
],
|
|
2185
|
+
"source_verified": "2026-05-14",
|
|
2186
|
+
"verification_sources": [
|
|
2187
|
+
"https://cloud.google.com/blog/topics/threat-intelligence/",
|
|
2188
|
+
"https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
|
|
2189
|
+
],
|
|
2190
|
+
"last_updated": "2026-05-15"
|
|
2191
|
+
},
|
|
2192
|
+
"CVE-2026-30623": {
|
|
2193
|
+
"_draft": true,
|
|
2194
|
+
"_auto_imported": true,
|
|
2195
|
+
"ai_assisted_weaponization": false,
|
|
2196
|
+
"name": "Anthropic MCP SDK stdio command-injection",
|
|
2197
|
+
"type": "command-injection",
|
|
2198
|
+
"cvss_score": 8.8,
|
|
2199
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
|
2200
|
+
"cisa_kev": false,
|
|
2201
|
+
"cisa_kev_date": null,
|
|
2202
|
+
"poc_available": true,
|
|
2203
|
+
"poc_description": "Public advisory documents the argv-string concatenation in MCP-client stdio transport.",
|
|
2204
|
+
"ai_discovered": false,
|
|
2205
|
+
"ai_discovery_source": "unknown",
|
|
2206
|
+
"active_exploitation": "suspected",
|
|
2207
|
+
"affected": "Anthropic MCP SDK stdio transport versions prior to vendor security release (Apr 2026).",
|
|
2208
|
+
"affected_versions": [
|
|
2209
|
+
"anthropic-mcp <= 0.x.x-pre-fix"
|
|
2210
|
+
],
|
|
2211
|
+
"vector": "Operator-supplied MCP server-spawn command string reaches subprocess exec without argv-array discipline.",
|
|
2212
|
+
"complexity": "low",
|
|
2213
|
+
"patch_available": true,
|
|
2214
|
+
"patch_required_reboot": false,
|
|
2215
|
+
"live_patch_available": true,
|
|
2216
|
+
"live_patch_tools": [
|
|
2217
|
+
"Pin MCP server commands in immutable config",
|
|
2218
|
+
"Operator-side allowlist of MCP server binaries"
|
|
2219
|
+
],
|
|
2220
|
+
"vendor_update_paths": [
|
|
2221
|
+
"anthropic-mcp post-Apr-2026 security release"
|
|
2222
|
+
],
|
|
2223
|
+
"framework_control_gaps": {
|
|
2224
|
+
"OWASP-LLM-Top-10-2025-LLM05": "Improper output handling — applied symmetrically to client-side INPUT handling.",
|
|
2225
|
+
"NIST-AI-RMF-MEASURE-2.7": "MCP transport trust boundary not specifically addressed in MEASURE 2.7.",
|
|
2226
|
+
"ISO-27001-2022-A.8.28": "Secure coding control assumed in third-party SDKs."
|
|
2227
|
+
},
|
|
2228
|
+
"atlas_refs": [
|
|
2229
|
+
"AML.T0040"
|
|
2230
|
+
],
|
|
2231
|
+
"attack_refs": [
|
|
2232
|
+
"T1059"
|
|
2233
|
+
],
|
|
2234
|
+
"rwep_score": 30,
|
|
2235
|
+
"rwep_factors": {
|
|
2236
|
+
"cisa_kev": 0,
|
|
2237
|
+
"poc_available": 20,
|
|
2238
|
+
"ai_factor": 0,
|
|
2239
|
+
"active_exploitation": 10,
|
|
2240
|
+
"blast_radius": 25,
|
|
2241
|
+
"patch_available": -15,
|
|
2242
|
+
"live_patch_available": -10,
|
|
2243
|
+
"reboot_required": 0
|
|
2244
|
+
},
|
|
2245
|
+
"epss_score": 0.02,
|
|
2246
|
+
"epss_date": "2026-05-14",
|
|
2247
|
+
"cwe_refs": [
|
|
2248
|
+
"CWE-78",
|
|
2249
|
+
"CWE-88"
|
|
2250
|
+
],
|
|
2251
|
+
"source_verified": "2026-05-14",
|
|
2252
|
+
"verification_sources": [
|
|
2253
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-30623",
|
|
2254
|
+
"https://github.com/anthropics/anthropic-sdk-python/security/advisories"
|
|
2255
|
+
],
|
|
2256
|
+
"last_updated": "2026-05-15"
|
|
2257
|
+
},
|
|
2258
|
+
"CVE-2025-12686": {
|
|
2259
|
+
"_draft": true,
|
|
2260
|
+
"_auto_imported": true,
|
|
2261
|
+
"ai_assisted_weaponization": false,
|
|
2262
|
+
"name": "Synology BeeStation unauth RCE (Pwn2Own Ireland 2025)",
|
|
2263
|
+
"type": "RCE",
|
|
2264
|
+
"cvss_score": 9.8,
|
|
2265
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2266
|
+
"cisa_kev": false,
|
|
2267
|
+
"cisa_kev_date": null,
|
|
2268
|
+
"poc_available": true,
|
|
2269
|
+
"poc_description": "Pwn2Own Ireland 2025 demonstration — full chain pre-auth RCE on BeeStation NAS.",
|
|
2270
|
+
"ai_discovered": false,
|
|
2271
|
+
"active_exploitation": "unknown",
|
|
2272
|
+
"affected": "Synology BeeStation Manager < 1.4.0-65374 — consumer NAS appliance.",
|
|
2273
|
+
"affected_versions": [
|
|
2274
|
+
"bsm < 1.4.0-65374"
|
|
2275
|
+
],
|
|
2276
|
+
"vector": "Pre-auth RCE chain on BeeStation web management.",
|
|
2277
|
+
"complexity": "low",
|
|
2278
|
+
"patch_available": true,
|
|
2279
|
+
"patch_required_reboot": true,
|
|
2280
|
+
"live_patch_available": false,
|
|
2281
|
+
"live_patch_tools": [],
|
|
2282
|
+
"vendor_update_paths": [
|
|
2283
|
+
"BSM 1.4.0-65374+"
|
|
2284
|
+
],
|
|
2285
|
+
"framework_control_gaps": {
|
|
2286
|
+
"NIST-800-53-SI-2": "Consumer-NAS patch SLA undefined.",
|
|
2287
|
+
"EU-CRA-Art13": "Cyber Resilience Act applies to consumer-IoT but enforcement begins 2027."
|
|
2288
|
+
},
|
|
2289
|
+
"atlas_refs": [],
|
|
2290
|
+
"attack_refs": [
|
|
2291
|
+
"T1190"
|
|
2292
|
+
],
|
|
2293
|
+
"rwep_score": 50,
|
|
2294
|
+
"rwep_factors": {
|
|
2295
|
+
"cisa_kev": 0,
|
|
2296
|
+
"poc_available": 20,
|
|
2297
|
+
"ai_factor": 0,
|
|
2298
|
+
"active_exploitation": 5,
|
|
2299
|
+
"blast_radius": 30,
|
|
2300
|
+
"patch_available": -15,
|
|
2301
|
+
"live_patch_available": 0,
|
|
2302
|
+
"reboot_required": 5
|
|
2303
|
+
},
|
|
2304
|
+
"epss_score": 0.04,
|
|
2305
|
+
"epss_date": "2026-05-14",
|
|
2306
|
+
"cwe_refs": [
|
|
2307
|
+
"CWE-78"
|
|
2308
|
+
],
|
|
2309
|
+
"source_verified": "2026-05-14",
|
|
2310
|
+
"verification_sources": [
|
|
2311
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-12686",
|
|
2312
|
+
"https://www.zerodayinitiative.com/blog"
|
|
2313
|
+
],
|
|
2314
|
+
"last_updated": "2026-05-15"
|
|
2315
|
+
},
|
|
2316
|
+
"CVE-2025-62847": {
|
|
2317
|
+
"_draft": true,
|
|
2318
|
+
"_auto_imported": true,
|
|
2319
|
+
"ai_assisted_weaponization": false,
|
|
2320
|
+
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 1/3)",
|
|
2321
|
+
"type": "RCE",
|
|
2322
|
+
"cvss_score": 9.8,
|
|
2323
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2324
|
+
"cisa_kev": false,
|
|
2325
|
+
"cisa_kev_date": null,
|
|
2326
|
+
"poc_available": true,
|
|
2327
|
+
"poc_description": "Pwn2Own Ireland 2025 demonstration — chain 1/3.",
|
|
2328
|
+
"ai_discovered": false,
|
|
2329
|
+
"active_exploitation": "unknown",
|
|
2330
|
+
"affected": "QNAP QTS < 5.2.4.2950, QuTS hero < h5.2.4.2950.",
|
|
2331
|
+
"affected_versions": [
|
|
2332
|
+
"qts < 5.2.4.2950",
|
|
2333
|
+
"quts-hero < h5.2.4.2950"
|
|
2334
|
+
],
|
|
2335
|
+
"vector": "Component 1/3 of Pwn2Own chain on QNAP appliances.",
|
|
2336
|
+
"complexity": "moderate",
|
|
2337
|
+
"patch_available": true,
|
|
2338
|
+
"patch_required_reboot": true,
|
|
2339
|
+
"live_patch_available": false,
|
|
2340
|
+
"live_patch_tools": [],
|
|
2341
|
+
"vendor_update_paths": [
|
|
2342
|
+
"QTS 5.2.4.2950+",
|
|
2343
|
+
"QuTS hero h5.2.4.2950+"
|
|
2344
|
+
],
|
|
2345
|
+
"framework_control_gaps": {
|
|
2346
|
+
"NIST-800-53-SI-2": "NAS-appliance patch SLA undefined.",
|
|
2347
|
+
"EU-CRA-Art13": "Consumer-NAS coverage begins 2027."
|
|
2348
|
+
},
|
|
2349
|
+
"atlas_refs": [],
|
|
2350
|
+
"attack_refs": [
|
|
2351
|
+
"T1190"
|
|
2352
|
+
],
|
|
2353
|
+
"rwep_score": 45,
|
|
2354
|
+
"rwep_factors": {
|
|
2355
|
+
"cisa_kev": 0,
|
|
2356
|
+
"poc_available": 20,
|
|
2357
|
+
"ai_factor": 0,
|
|
2358
|
+
"active_exploitation": 5,
|
|
2359
|
+
"blast_radius": 25,
|
|
2360
|
+
"patch_available": -15,
|
|
2361
|
+
"live_patch_available": 0,
|
|
2362
|
+
"reboot_required": 5
|
|
2363
|
+
},
|
|
2364
|
+
"epss_score": 0.03,
|
|
2365
|
+
"epss_date": "2026-05-14",
|
|
2366
|
+
"cwe_refs": [
|
|
2367
|
+
"CWE-78"
|
|
2368
|
+
],
|
|
2369
|
+
"source_verified": "2026-05-14",
|
|
2370
|
+
"verification_sources": [
|
|
2371
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-62847",
|
|
2372
|
+
"https://www.qnap.com/en/security-advisory/"
|
|
2373
|
+
],
|
|
2374
|
+
"last_updated": "2026-05-15"
|
|
2375
|
+
},
|
|
2376
|
+
"CVE-2025-62848": {
|
|
2377
|
+
"_draft": true,
|
|
2378
|
+
"_auto_imported": true,
|
|
2379
|
+
"ai_assisted_weaponization": false,
|
|
2380
|
+
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 2/3)",
|
|
2381
|
+
"type": "RCE",
|
|
2382
|
+
"cvss_score": 9.8,
|
|
2383
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2384
|
+
"cisa_kev": false,
|
|
2385
|
+
"cisa_kev_date": null,
|
|
2386
|
+
"poc_available": true,
|
|
2387
|
+
"poc_description": "Pwn2Own Ireland 2025 — chain 2/3.",
|
|
2388
|
+
"ai_discovered": false,
|
|
2389
|
+
"active_exploitation": "unknown",
|
|
2390
|
+
"affected": "QNAP QTS < 5.2.4.2950, QuTS hero < h5.2.4.2950.",
|
|
2391
|
+
"affected_versions": [
|
|
2392
|
+
"qts < 5.2.4.2950",
|
|
2393
|
+
"quts-hero < h5.2.4.2950"
|
|
2394
|
+
],
|
|
2395
|
+
"vector": "Component 2/3 of Pwn2Own QNAP appliance chain.",
|
|
2396
|
+
"complexity": "moderate",
|
|
2397
|
+
"patch_available": true,
|
|
2398
|
+
"patch_required_reboot": true,
|
|
2399
|
+
"live_patch_available": false,
|
|
2400
|
+
"live_patch_tools": [],
|
|
2401
|
+
"vendor_update_paths": [
|
|
2402
|
+
"QTS 5.2.4.2950+",
|
|
2403
|
+
"QuTS hero h5.2.4.2950+"
|
|
2404
|
+
],
|
|
2405
|
+
"framework_control_gaps": {
|
|
2406
|
+
"NIST-800-53-SI-2": "NAS-appliance patch SLA undefined.",
|
|
2407
|
+
"EU-CRA-Art13": "Consumer-NAS coverage begins 2027."
|
|
2408
|
+
},
|
|
2409
|
+
"atlas_refs": [],
|
|
2410
|
+
"attack_refs": [
|
|
2411
|
+
"T1190"
|
|
2412
|
+
],
|
|
2413
|
+
"rwep_score": 45,
|
|
2414
|
+
"rwep_factors": {
|
|
2415
|
+
"cisa_kev": 0,
|
|
2416
|
+
"poc_available": 20,
|
|
2417
|
+
"ai_factor": 0,
|
|
2418
|
+
"active_exploitation": 5,
|
|
2419
|
+
"blast_radius": 25,
|
|
2420
|
+
"patch_available": -15,
|
|
2421
|
+
"live_patch_available": 0,
|
|
2422
|
+
"reboot_required": 5
|
|
2423
|
+
},
|
|
2424
|
+
"epss_score": 0.03,
|
|
2425
|
+
"epss_date": "2026-05-14",
|
|
2426
|
+
"cwe_refs": [
|
|
2427
|
+
"CWE-94"
|
|
2428
|
+
],
|
|
2429
|
+
"source_verified": "2026-05-14",
|
|
2430
|
+
"verification_sources": [
|
|
2431
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-62848",
|
|
2432
|
+
"https://www.qnap.com/en/security-advisory/"
|
|
2433
|
+
],
|
|
2434
|
+
"last_updated": "2026-05-15"
|
|
2435
|
+
},
|
|
2436
|
+
"CVE-2025-62849": {
|
|
2437
|
+
"_draft": true,
|
|
2438
|
+
"_auto_imported": true,
|
|
2439
|
+
"ai_assisted_weaponization": false,
|
|
2440
|
+
"name": "QNAP QTS/QuTS hero RCE (Pwn2Own Ireland 2025, chain 3/3)",
|
|
2441
|
+
"type": "RCE",
|
|
2442
|
+
"cvss_score": 8.8,
|
|
2443
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
2444
|
+
"cisa_kev": false,
|
|
2445
|
+
"cisa_kev_date": null,
|
|
2446
|
+
"poc_available": true,
|
|
2447
|
+
"poc_description": "Pwn2Own Ireland 2025 — chain 3/3 (post-auth elevation).",
|
|
2448
|
+
"ai_discovered": false,
|
|
2449
|
+
"active_exploitation": "unknown",
|
|
2450
|
+
"affected": "QNAP QTS < 5.2.4.2950, QuTS hero < h5.2.4.2950.",
|
|
2451
|
+
"affected_versions": [
|
|
2452
|
+
"qts < 5.2.4.2950",
|
|
2453
|
+
"quts-hero < h5.2.4.2950"
|
|
2454
|
+
],
|
|
2455
|
+
"vector": "Component 3/3 of Pwn2Own QNAP appliance chain — post-auth elevation.",
|
|
2456
|
+
"complexity": "moderate",
|
|
2457
|
+
"patch_available": true,
|
|
2458
|
+
"patch_required_reboot": true,
|
|
2459
|
+
"live_patch_available": false,
|
|
2460
|
+
"live_patch_tools": [],
|
|
2461
|
+
"vendor_update_paths": [
|
|
2462
|
+
"QTS 5.2.4.2950+",
|
|
2463
|
+
"QuTS hero h5.2.4.2950+"
|
|
2464
|
+
],
|
|
2465
|
+
"framework_control_gaps": {
|
|
2466
|
+
"NIST-800-53-SI-2": "NAS-appliance patch SLA undefined.",
|
|
2467
|
+
"EU-CRA-Art13": "Consumer-NAS coverage begins 2027."
|
|
2468
|
+
},
|
|
2469
|
+
"atlas_refs": [],
|
|
2470
|
+
"attack_refs": [
|
|
2471
|
+
"T1068"
|
|
2472
|
+
],
|
|
2473
|
+
"rwep_score": 40,
|
|
2474
|
+
"rwep_factors": {
|
|
2475
|
+
"cisa_kev": 0,
|
|
2476
|
+
"poc_available": 20,
|
|
2477
|
+
"ai_factor": 0,
|
|
2478
|
+
"active_exploitation": 5,
|
|
2479
|
+
"blast_radius": 20,
|
|
2480
|
+
"patch_available": -15,
|
|
2481
|
+
"live_patch_available": 0,
|
|
2482
|
+
"reboot_required": 5
|
|
2483
|
+
},
|
|
2484
|
+
"epss_score": 0.02,
|
|
2485
|
+
"epss_date": "2026-05-14",
|
|
2486
|
+
"cwe_refs": [
|
|
2487
|
+
"CWE-269"
|
|
2488
|
+
],
|
|
2489
|
+
"source_verified": "2026-05-14",
|
|
2490
|
+
"verification_sources": [
|
|
2491
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-62849",
|
|
2492
|
+
"https://www.qnap.com/en/security-advisory/"
|
|
2493
|
+
],
|
|
2494
|
+
"last_updated": "2026-05-15"
|
|
2495
|
+
},
|
|
2496
|
+
"CVE-2025-59389": {
|
|
2497
|
+
"_draft": true,
|
|
2498
|
+
"_auto_imported": true,
|
|
2499
|
+
"ai_assisted_weaponization": false,
|
|
2500
|
+
"name": "QNAP Hyper Data Protector critical RCE (Pwn2Own Ireland 2025)",
|
|
2501
|
+
"type": "RCE",
|
|
2502
|
+
"cvss_score": 9.8,
|
|
2503
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2504
|
+
"cisa_kev": false,
|
|
2505
|
+
"cisa_kev_date": null,
|
|
2506
|
+
"poc_available": true,
|
|
2507
|
+
"poc_description": "Summoning Team / Sina Kheirkhah Pwn2Own Ireland 2025 demonstration — critical unauth RCE on QNAP Hyper Data Protector.",
|
|
2508
|
+
"ai_discovered": false,
|
|
2509
|
+
"active_exploitation": "unknown",
|
|
2510
|
+
"affected": "QNAP Hyper Data Protector < 2.1.4.0420 — backup orchestration appliance.",
|
|
2511
|
+
"affected_versions": [
|
|
2512
|
+
"hdp < 2.1.4.0420"
|
|
2513
|
+
],
|
|
2514
|
+
"vector": "Pre-auth RCE on Hyper Data Protector management surface.",
|
|
2515
|
+
"complexity": "low",
|
|
2516
|
+
"patch_available": true,
|
|
2517
|
+
"patch_required_reboot": true,
|
|
2518
|
+
"live_patch_available": false,
|
|
2519
|
+
"live_patch_tools": [],
|
|
2520
|
+
"vendor_update_paths": [
|
|
2521
|
+
"HDP 2.1.4.0420+"
|
|
2522
|
+
],
|
|
2523
|
+
"framework_control_gaps": {
|
|
2524
|
+
"NIST-800-53-SI-2": "Backup-appliance patch SLA undefined; backup tier compromise is a recovery-control failure.",
|
|
2525
|
+
"ISO-27001-2022-A.8.13": "Backup integrity assumed — a vulnerable backup appliance becomes the attacker's pivot rather than the operator's recovery path.",
|
|
2526
|
+
"NIS2-Art21-business-continuity": "Backup-side resilience presumed; backup appliance compromise inverts recovery assumptions."
|
|
2527
|
+
},
|
|
2528
|
+
"atlas_refs": [],
|
|
2529
|
+
"attack_refs": [
|
|
2530
|
+
"T1190",
|
|
2531
|
+
"T1490"
|
|
2532
|
+
],
|
|
2533
|
+
"rwep_score": 45,
|
|
2534
|
+
"rwep_factors": {
|
|
2535
|
+
"cisa_kev": 0,
|
|
2536
|
+
"poc_available": 20,
|
|
2537
|
+
"ai_factor": 0,
|
|
2538
|
+
"active_exploitation": 5,
|
|
2539
|
+
"blast_radius": 35,
|
|
2540
|
+
"patch_available": -15,
|
|
2541
|
+
"live_patch_available": 0,
|
|
2542
|
+
"reboot_required": 5
|
|
2543
|
+
},
|
|
2544
|
+
"epss_score": 0.05,
|
|
2545
|
+
"epss_date": "2026-05-14",
|
|
2546
|
+
"cwe_refs": [
|
|
2547
|
+
"CWE-78"
|
|
2548
|
+
],
|
|
2549
|
+
"source_verified": "2026-05-14",
|
|
2550
|
+
"verification_sources": [
|
|
2551
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-59389",
|
|
2552
|
+
"https://www.qnap.com/en/security-advisory/"
|
|
2553
|
+
],
|
|
2554
|
+
"last_updated": "2026-05-15"
|
|
2555
|
+
},
|
|
2556
|
+
"CVE-2025-11837": {
|
|
2557
|
+
"_draft": true,
|
|
2558
|
+
"_auto_imported": true,
|
|
2559
|
+
"ai_assisted_weaponization": false,
|
|
2560
|
+
"name": "QNAP Malware Remover code-injection",
|
|
2561
|
+
"type": "code-injection",
|
|
2562
|
+
"cvss_score": 8,
|
|
2563
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
2564
|
+
"cisa_kev": false,
|
|
2565
|
+
"cisa_kev_date": null,
|
|
2566
|
+
"poc_available": true,
|
|
2567
|
+
"poc_description": "Code-injection in QNAP Malware Remover.",
|
|
2568
|
+
"ai_discovered": false,
|
|
2569
|
+
"active_exploitation": "unknown",
|
|
2570
|
+
"active_exploitation_notes": "Theater-detection signal: the affected software IS a security tool.",
|
|
2571
|
+
"affected": "QNAP Malware Remover < 6.6.8.20251023 — endpoint security tool on QNAP appliances.",
|
|
2572
|
+
"affected_versions": [
|
|
2573
|
+
"malware-remover < 6.6.8.20251023"
|
|
2574
|
+
],
|
|
2575
|
+
"vector": "Code-injection in malware-definition-handling path — attacker who can deliver a crafted update or hijack the definition-fetch channel gains code execution as the security tool.",
|
|
2576
|
+
"complexity": "low",
|
|
2577
|
+
"patch_available": true,
|
|
2578
|
+
"patch_required_reboot": false,
|
|
2579
|
+
"live_patch_available": false,
|
|
2580
|
+
"live_patch_tools": [],
|
|
2581
|
+
"vendor_update_paths": [
|
|
2582
|
+
"Malware Remover 6.6.8.20251023+"
|
|
2583
|
+
],
|
|
2584
|
+
"framework_control_gaps": {
|
|
2585
|
+
"NIST-800-53-SI-3": "Malicious code protection control assumes the AV/AM tool is itself uncompromised; theater-detection test = run the AV with a crafted definition file in a sandbox and confirm rejection.",
|
|
2586
|
+
"ISO-27001-2022-A.8.7": "Anti-malware controls treated as trust anchors; CVE-2025-11837 demonstrates the trust-anchor inversion class.",
|
|
2587
|
+
"PCI-DSS-4.0-5.1": "Anti-malware deployment satisfied on paper; deployed tool itself is the vulnerability."
|
|
2588
|
+
},
|
|
2589
|
+
"atlas_refs": [],
|
|
2590
|
+
"attack_refs": [
|
|
2591
|
+
"T1059",
|
|
2592
|
+
"T1554"
|
|
2593
|
+
],
|
|
2594
|
+
"rwep_score": 40,
|
|
2595
|
+
"rwep_factors": {
|
|
2596
|
+
"cisa_kev": 0,
|
|
2597
|
+
"poc_available": 20,
|
|
2598
|
+
"ai_factor": 0,
|
|
2599
|
+
"active_exploitation": 5,
|
|
2600
|
+
"blast_radius": 30,
|
|
2601
|
+
"patch_available": -15,
|
|
2602
|
+
"live_patch_available": 0,
|
|
2603
|
+
"reboot_required": 0
|
|
2604
|
+
},
|
|
2605
|
+
"epss_score": 0.025,
|
|
2606
|
+
"epss_date": "2026-05-14",
|
|
2607
|
+
"cwe_refs": [
|
|
2608
|
+
"CWE-94"
|
|
2609
|
+
],
|
|
2610
|
+
"source_verified": "2026-05-14",
|
|
2611
|
+
"verification_sources": [
|
|
2612
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2025-11837",
|
|
2613
|
+
"https://www.qnap.com/en/security-advisory/"
|
|
2614
|
+
],
|
|
2615
|
+
"last_updated": "2026-05-15"
|
|
2616
|
+
},
|
|
2617
|
+
"CVE-2026-42945": {
|
|
2618
|
+
"_draft": true,
|
|
2619
|
+
"_auto_imported": true,
|
|
2620
|
+
"name": "NGINX Rift",
|
|
2621
|
+
"type": "RCE",
|
|
2622
|
+
"cvss_score": 9.2,
|
|
2623
|
+
"cvss_vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
|
|
2624
|
+
"cisa_kev": false,
|
|
2625
|
+
"cisa_kev_date": null,
|
|
2626
|
+
"poc_available": true,
|
|
2627
|
+
"poc_description": "depthfirst-disclosure published PoC at https://github.com/depthfirstdisclosures/nginx-rift — heap buffer overflow in rewrite-directive PCRE handling for unnamed captures.",
|
|
2628
|
+
"ai_discovered": true,
|
|
2629
|
+
"ai_discovery_notes": "Discovered by depthfirst autonomous-analysis platform — first publicly-attributed AI-discovered nginx CVE. Anchor case for Hard Rule #7. Discovery 2026-05-13; affected code path present since nginx 0.6.27 (2007).",
|
|
2630
|
+
"ai_assisted_weaponization": false,
|
|
2631
|
+
"active_exploitation": "none",
|
|
2632
|
+
"active_exploitation_notes": "No confirmed in-wild exploitation at disclosure; predict KEV-add within 14 days.",
|
|
2633
|
+
"affected": "nginx 0.6.27 through 1.30.0 (every release for 18 years); nginx Plus R32 through R36.",
|
|
2634
|
+
"affected_versions": [
|
|
2635
|
+
"nginx >= 0.6.27",
|
|
2636
|
+
"nginx <= 1.30.0",
|
|
2637
|
+
"nginx-plus R32-R36"
|
|
2638
|
+
],
|
|
2639
|
+
"vector": "Heap buffer overflow in PCRE unnamed-capture handling within rewrite directive — single HTTP request whose URI matches a rewrite rule using unnamed captures triggers out-of-bounds heap write.",
|
|
2640
|
+
"complexity": "low",
|
|
2641
|
+
"patch_available": true,
|
|
2642
|
+
"patch_required_reboot": false,
|
|
2643
|
+
"live_patch_available": true,
|
|
2644
|
+
"live_patch_tools": [
|
|
2645
|
+
"Replace unnamed PCRE captures with named captures in rewrite directives (operator-side mitigation, no nginx restart required)",
|
|
2646
|
+
"Disable rewrite directives temporarily where named-capture rewrite is not possible"
|
|
2647
|
+
],
|
|
2648
|
+
"vendor_update_paths": [
|
|
2649
|
+
"nginx 1.30.1+",
|
|
2650
|
+
"nginx 1.31.0+",
|
|
2651
|
+
"nginx Plus R32 P6+",
|
|
2652
|
+
"nginx Plus R36 P4+"
|
|
2653
|
+
],
|
|
2654
|
+
"framework_control_gaps": {
|
|
2655
|
+
"NIST-800-53-SI-2": "30-day SLA insufficient for pre-auth unauth heap RCE on web fabric.",
|
|
2656
|
+
"NIST-AI-RMF-MAP-3.4": "AI-discovery class not anchored — Hard Rule #7 says AI-as-research-tool is current reality, framework controls treat it as emerging.",
|
|
2657
|
+
"ISO-27001-2022-A.8.8": "Appropriate timescales undefined.",
|
|
2658
|
+
"EU-CRA-Art13": "Cyber Resilience Act SBOM requirement does not surface configuration-derived exposure (rewrite-directive presence is the real-world filter).",
|
|
2659
|
+
"NIS2-Art21-vulnerability-management": "EU NIS2 ICT-essential-service tier should treat 18-year-deployed web-fabric components as Tier-1 exposure.",
|
|
2660
|
+
"OWASP-Top-10-2021-A06": "Vulnerable and outdated components — nginx upgrade is the standard answer; the live-patch path (rewrite-directive edit) is configuration-side and not covered.",
|
|
2661
|
+
"DORA-Art-9": "Financial-services ICT third-party risk does not differentiate between vendor-patch path and configuration-side mitigation path."
|
|
2662
|
+
},
|
|
2663
|
+
"atlas_refs": [
|
|
2664
|
+
"AML.T0040"
|
|
2665
|
+
],
|
|
2666
|
+
"attack_refs": [
|
|
2667
|
+
"T1190",
|
|
2668
|
+
"T1505.003"
|
|
2669
|
+
],
|
|
2670
|
+
"rwep_score": 40,
|
|
2671
|
+
"rwep_factors": {
|
|
2672
|
+
"cisa_kev": 0,
|
|
2673
|
+
"poc_available": 20,
|
|
2674
|
+
"ai_factor": 25,
|
|
2675
|
+
"active_exploitation": 0,
|
|
2676
|
+
"blast_radius": 40,
|
|
2677
|
+
"patch_available": -15,
|
|
2678
|
+
"live_patch_available": -10,
|
|
2679
|
+
"reboot_required": 0
|
|
2680
|
+
},
|
|
2681
|
+
"rwep_notes": "P1 anchor — ai_factor scored at 25 reflects FIRST publicly-attributed AI-discovery on a Tier-1 web component.",
|
|
2682
|
+
"epss_score": null,
|
|
2683
|
+
"epss_date": "2026-05-14",
|
|
2684
|
+
"cwe_refs": [
|
|
2685
|
+
"CWE-122",
|
|
2686
|
+
"CWE-787"
|
|
2687
|
+
],
|
|
2688
|
+
"source_verified": "2026-05-14",
|
|
2689
|
+
"verification_sources": [
|
|
2690
|
+
"https://github.com/depthfirstdisclosures/nginx-rift",
|
|
2691
|
+
"https://my.f5.com/manage/s/article/K000150420",
|
|
2692
|
+
"https://nginx.org/en/security_advisories.html"
|
|
2693
|
+
],
|
|
2694
|
+
"last_updated": "2026-05-15"
|
|
1395
2695
|
}
|
|
1396
2696
|
}
|