@blamejs/exceptd-skills 0.12.29 → 0.12.31
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +55 -0
- package/bin/exceptd.js +37 -2
- package/data/_indexes/_meta.json +9 -9
- package/data/_indexes/activity-feed.json +1 -1
- package/data/_indexes/catalog-summaries.json +1 -1
- package/data/_indexes/chains.json +102 -6
- package/data/cve-catalog.json +730 -37
- package/data/cwe-catalog.json +2 -1
- package/data/d3fend-catalog.json +2 -1
- package/data/dlp-controls.json +2 -1
- package/data/framework-control-gaps.json +2 -1
- package/data/rfc-references.json +2 -1
- package/lib/playbook-runner.js +1 -1
- package/manifest-snapshot.json +1 -1
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +44 -44
- package/package.json +1 -1
- package/sbom.cdx.json +21 -21
- package/scripts/check-test-coverage.js +18 -4
package/data/cve-catalog.json
CHANGED
|
@@ -39,13 +39,15 @@
|
|
|
39
39
|
"ai_discovery_methodology": {
|
|
40
40
|
"field_added": "2026-05-15",
|
|
41
41
|
"agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
|
|
42
|
-
"current_rate": 0.
|
|
43
|
-
"current_floor_enforced_by_test": 0.
|
|
42
|
+
"current_rate": 0.167,
|
|
43
|
+
"current_floor_enforced_by_test": 0.15,
|
|
44
44
|
"ladder_to_target": [
|
|
45
|
+
0.15,
|
|
45
46
|
0.2,
|
|
46
47
|
0.3,
|
|
47
48
|
0.4
|
|
48
49
|
],
|
|
50
|
+
"floor_correction_note": "v0.12.31 (cycle 11): floor dropped from 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries (PAN-OS, Marimo, Ivanti EPMM, Exchange OWA, Windows LNK APT28, Defender BlueHammer). All six are vendor- or threat-actor-discovered; none carry an AI-tool credit per Hard Rule #1. Catalog observed rate fell from 6/30 (0.200) to 6/36 (0.167); floor is reset below the new observed rate to keep the test honest, and a new 0.15 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs.",
|
|
49
51
|
"ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
|
|
50
52
|
"gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
|
|
51
53
|
"discovery_source_enum": [
|
|
@@ -66,7 +68,8 @@
|
|
|
66
68
|
"GHSA-*"
|
|
67
69
|
],
|
|
68
70
|
"note": "Catalog keys are CVE-* by default. For pre-CVE-assignment advisories under active operational impact, the project accepts OSV-native identifier shapes as the canonical key, with cross-references retained in `aliases`: MAL-* (OSSF Malicious Packages dataset — published into OSV.dev; primary key for malicious-package compromises), GHSA-* (GitHub Advisory Database; primary key when the package is on GitHub and no CVE has issued yet), and SNYK-* (Snyk advisory dataset; primary key for advisories Snyk catalogued before OSV/GHSA ingested them). When MITRE issues a CVE, the entry is renamed in lockstep with the matching zeroday-lessons key; the previous identifier is retained in `aliases` so historical references continue to resolve. Precedent: MAL-2026-3083 added 2026-05-13 (the elementary-data PyPI worm, 1.1M monthly downloads, OSV/OSSF-cataloged before any CVE issued). EPSS coverage does not extend to non-CVE identifiers; epss_score is null with a documenting epss_note on such entries. Upstream pull from OSV.dev: `exceptd refresh --source osv` (added v0.12.10)."
|
|
69
|
-
}
|
|
71
|
+
},
|
|
72
|
+
"last_threat_review": "2026-05-15"
|
|
70
73
|
},
|
|
71
74
|
"CVE-2025-53773": {
|
|
72
75
|
"name": "GitHub Copilot / VS Code 'YOLO mode' Prompt Injection RCE",
|
|
@@ -642,7 +645,7 @@
|
|
|
642
645
|
]
|
|
643
646
|
},
|
|
644
647
|
"last_updated": "2026-05-15",
|
|
645
|
-
"discovery_attribution_note": "
|
|
648
|
+
"discovery_attribution_note": "Tencent YunDing Security Lab is the credited discoverer per the LiteLLM GHSA-r75f-5x8p-qvmc advisory and confirmed by downstream The Hacker News / Tenable / cve.news coverage. Sysdig TRT (Stefano Chierici + Sysdig Sage analysts) published the post-disclosure 36-hour-to-exploitation telemetry; Bishop Fox reproduced the auth-path SQLi sink. All named-human research; no AI-discovery attribution from any of the three teams. Sources: https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc and https://www.sysdig.com/blog/cve-2026-42208-targeted-sql-injection-against-litellms-authentication-path-discovered-36-hours-following-vulnerability-disclosure and https://bishopfox.com/blog/cve-2026-42208-pre-authentication-sql-injection-in-litellm-proxy."
|
|
646
649
|
},
|
|
647
650
|
"CVE-2026-43284": {
|
|
648
651
|
"name": "Dirty Frag (ESP/IPsec component)",
|
|
@@ -959,6 +962,7 @@
|
|
|
959
962
|
"cisa_kev_date": null,
|
|
960
963
|
"cisa_kev_pending": true,
|
|
961
964
|
"cisa_kev_pending_reason": "Attack disclosed 2026-05-11. Active in-the-wild exploitation of 42 @tanstack/* packages with combined ~150M weekly downloads. CISA KEV listing expected within standard review window.",
|
|
965
|
+
"kev_scope_note": "CISA KEV historically excludes ecosystem-package compromises (npm/PyPI worms, malicious-package backdoors) — its scope is federally-deployable products with CVE assignments. The Mini Shai-Hulud parent (CVE-2026-45321) and TanStack variant are NOT listed in KEV as of 2026-05-15 despite confirmed in-the-wild exploitation. `cisa_kev: false` is correct; `active_exploitation: confirmed` reflects the actual wormable state. Operators should consume CISA-KEV-style guidance from OpenSSF MAL feed + ecosystem-specific advisories (Snyk/Wiz/Phylum/Socket) for this class.",
|
|
962
966
|
"poc_available": true,
|
|
963
967
|
"poc_description": "Confirmed in-the-wild — 84 malicious versions published across 42 @tanstack/* packages between 2026-05-11 19:20-19:26 UTC. The worm itself IS the PoC; payload analysis published by multiple researchers within 20 minutes.",
|
|
964
968
|
"ai_discovered": false,
|
|
@@ -1483,7 +1487,7 @@
|
|
|
1483
1487
|
"attack_refs": [
|
|
1484
1488
|
"T1611"
|
|
1485
1489
|
],
|
|
1486
|
-
"rwep_score":
|
|
1490
|
+
"rwep_score": 80,
|
|
1487
1491
|
"rwep_factors": {
|
|
1488
1492
|
"cisa_kev": 25,
|
|
1489
1493
|
"poc_available": 20,
|
|
@@ -1506,7 +1510,8 @@
|
|
|
1506
1510
|
"https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/"
|
|
1507
1511
|
],
|
|
1508
1512
|
"last_updated": "2026-05-15",
|
|
1509
|
-
"discovery_attribution_note": "Discovered by Rory McNamara of Snyk Security Labs as part of the four-vulnerability Leaky Vessels disclosure (CVE-2024-21626 + CVE-2024-23651/23652/23653) published January 2024. Named human researcher; no AI-tool credited. Source: https://labs.snyk.io/resources/leaky-vessels-docker-runc-container-breakout-vulnerabilities/."
|
|
1513
|
+
"discovery_attribution_note": "Discovered by Rory McNamara of Snyk Security Labs as part of the four-vulnerability Leaky Vessels disclosure (CVE-2024-21626 + CVE-2024-23651/23652/23653) published January 2024. Named human researcher; no AI-tool credited. Source: https://labs.snyk.io/resources/leaky-vessels-docker-runc-container-breakout-vulnerabilities/.",
|
|
1514
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1510
1515
|
},
|
|
1511
1516
|
"CVE-2024-3094": {
|
|
1512
1517
|
"_draft": true,
|
|
@@ -1559,7 +1564,7 @@
|
|
|
1559
1564
|
"poc_available": 20,
|
|
1560
1565
|
"ai_factor": 0,
|
|
1561
1566
|
"active_exploitation": 10,
|
|
1562
|
-
"blast_radius":
|
|
1567
|
+
"blast_radius": 30,
|
|
1563
1568
|
"patch_available": -15,
|
|
1564
1569
|
"live_patch_available": 0,
|
|
1565
1570
|
"reboot_required": 0
|
|
@@ -1577,7 +1582,8 @@
|
|
|
1577
1582
|
"https://research.swtch.com/xz-script"
|
|
1578
1583
|
],
|
|
1579
1584
|
"last_updated": "2026-05-15",
|
|
1580
|
-
"discovery_attribution_note": "Discovered by Andres Freund (Microsoft engineer, PostgreSQL developer) on 2024-03-28 via a 0.5-second SSH-login latency regression traced to liblzma symbol resolution; reported to oss-security. Named human researcher; no AI tooling involved. Source: https://en.wikipedia.org/wiki/XZ_Utils_backdoor."
|
|
1585
|
+
"discovery_attribution_note": "Discovered by Andres Freund (Microsoft engineer, PostgreSQL developer) on 2024-03-28 via a 0.5-second SSH-login latency regression traced to liblzma symbol resolution; reported to oss-security. Named human researcher; no AI tooling involved. Source: https://en.wikipedia.org/wiki/XZ_Utils_backdoor.",
|
|
1586
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
1581
1587
|
},
|
|
1582
1588
|
"CVE-2024-3154": {
|
|
1583
1589
|
"_draft": true,
|
|
@@ -1814,7 +1820,7 @@
|
|
|
1814
1820
|
"attack_refs": [
|
|
1815
1821
|
"T1190"
|
|
1816
1822
|
],
|
|
1817
|
-
"rwep_score":
|
|
1823
|
+
"rwep_score": 80,
|
|
1818
1824
|
"rwep_factors": {
|
|
1819
1825
|
"cisa_kev": 25,
|
|
1820
1826
|
"poc_available": 20,
|
|
@@ -1837,7 +1843,8 @@
|
|
|
1837
1843
|
"https://support.citrix.com/article/CTX561482"
|
|
1838
1844
|
],
|
|
1839
1845
|
"last_updated": "2026-05-15",
|
|
1840
|
-
"discovery_attribution_note": "Independent security researchers via Citrix coordinated disclosure (CTX561482, 2023-07-18); no individual researcher named in the Citrix advisory. NSA/CISA AA23-201A documents in-wild exploitation by Chinese state-sponsored actors. No AI-tool credited. Source: https://support.citrix.com/article/CTX561482/ and https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a."
|
|
1846
|
+
"discovery_attribution_note": "Independent security researchers via Citrix coordinated disclosure (CTX561482, 2023-07-18); no individual researcher named in the Citrix advisory. NSA/CISA AA23-201A documents in-wild exploitation by Chinese state-sponsored actors. No AI-tool credited. Source: https://support.citrix.com/article/CTX561482/ and https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-201a.",
|
|
1847
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: +5 (75 -> 80)."
|
|
1841
1848
|
},
|
|
1842
1849
|
"CVE-2024-1709": {
|
|
1843
1850
|
"_draft": true,
|
|
@@ -1945,7 +1952,7 @@
|
|
|
1945
1952
|
"poc_available": 0,
|
|
1946
1953
|
"ai_factor": 0,
|
|
1947
1954
|
"active_exploitation": 20,
|
|
1948
|
-
"blast_radius":
|
|
1955
|
+
"blast_radius": 30,
|
|
1949
1956
|
"patch_available": -15,
|
|
1950
1957
|
"live_patch_available": 0,
|
|
1951
1958
|
"reboot_required": 5
|
|
@@ -1961,7 +1968,8 @@
|
|
|
1961
1968
|
"https://sec.cloudapps.cisco.com/security/center/publicationListing.x"
|
|
1962
1969
|
],
|
|
1963
1970
|
"last_updated": "2026-05-15",
|
|
1964
|
-
"discovery_attribution_note": "Discovered by Stephen Fewer (Senior Principal Security Researcher) and Jonah Burgess (Senior Security Researcher), both at Rapid7, while researching the related CVE-2026-20127 vdaemon authentication-bypass. Named human researchers; no AI-tool credited. Source: https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/."
|
|
1971
|
+
"discovery_attribution_note": "Discovered by Stephen Fewer (Senior Principal Security Researcher) and Jonah Burgess (Senior Security Researcher), both at Rapid7, while researching the related CVE-2026-20127 vdaemon authentication-bypass. Named human researchers; no AI-tool credited. Source: https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/.",
|
|
1972
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
1965
1973
|
},
|
|
1966
1974
|
"CVE-2024-40635": {
|
|
1967
1975
|
"_draft": true,
|
|
@@ -2006,7 +2014,7 @@
|
|
|
2006
2014
|
"cisa_kev": 0,
|
|
2007
2015
|
"poc_available": 20,
|
|
2008
2016
|
"ai_factor": 0,
|
|
2009
|
-
"active_exploitation":
|
|
2017
|
+
"active_exploitation": 5,
|
|
2010
2018
|
"blast_radius": 20,
|
|
2011
2019
|
"patch_available": -15,
|
|
2012
2020
|
"live_patch_available": 0,
|
|
@@ -2023,7 +2031,8 @@
|
|
|
2023
2031
|
"https://github.com/containerd/containerd/security/advisories"
|
|
2024
2032
|
],
|
|
2025
2033
|
"last_updated": "2026-05-15",
|
|
2026
|
-
"discovery_attribution_note": "Reported via the containerd security team (GO-2025-3528, Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987); no individual researcher byline in the advisory and no AI-tool credited. Bug class is straight integer overflow in WithUser() UID handling. Source: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987."
|
|
2034
|
+
"discovery_attribution_note": "Reported via the containerd security team (GO-2025-3528, Snyk SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987); no individual researcher byline in the advisory and no AI-tool credited. Bug class is straight integer overflow in WithUser() UID handling. Source: https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERDCONTAINERDV2PKGOCI-9479987.",
|
|
2035
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2027
2036
|
},
|
|
2028
2037
|
"MAL-2026-TANSTACK-MINI": {
|
|
2029
2038
|
"_draft": true,
|
|
@@ -2035,6 +2044,7 @@
|
|
|
2035
2044
|
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
|
2036
2045
|
"cisa_kev": false,
|
|
2037
2046
|
"cisa_kev_date": null,
|
|
2047
|
+
"kev_scope_note": "CISA KEV historically excludes ecosystem-package compromises (npm/PyPI worms, malicious-package backdoors) — its scope is federally-deployable products with CVE assignments. The Mini Shai-Hulud parent (CVE-2026-45321) and TanStack variant are NOT listed in KEV as of 2026-05-15 despite confirmed in-the-wild exploitation. `cisa_kev: false` is correct; `active_exploitation: confirmed` reflects the actual wormable state. Operators should consume CISA-KEV-style guidance from OpenSSF MAL feed + ecosystem-specific advisories (Snyk/Wiz/Phylum/Socket) for this class.",
|
|
2038
2048
|
"poc_available": true,
|
|
2039
2049
|
"poc_description": "84 malicious versions across 42 @tanstack/* packages 2026-05-11 — the worm IS the PoC.",
|
|
2040
2050
|
"ai_discovered": false,
|
|
@@ -2076,8 +2086,8 @@
|
|
|
2076
2086
|
"poc_available": 20,
|
|
2077
2087
|
"ai_factor": 0,
|
|
2078
2088
|
"active_exploitation": 20,
|
|
2079
|
-
"blast_radius":
|
|
2080
|
-
"patch_available": -
|
|
2089
|
+
"blast_radius": 30,
|
|
2090
|
+
"patch_available": -15,
|
|
2081
2091
|
"live_patch_available": 0,
|
|
2082
2092
|
"reboot_required": 0
|
|
2083
2093
|
},
|
|
@@ -2094,7 +2104,8 @@
|
|
|
2094
2104
|
"https://www.npmjs.com/advisories"
|
|
2095
2105
|
],
|
|
2096
2106
|
"last_updated": "2026-05-15",
|
|
2097
|
-
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/."
|
|
2107
|
+
"discovery_attribution_note": "Same incident-class as CVE-2026-45321 (Mini Shai-Hulud); discovery by ecosystem detection across multiple firms (Snyk, Wiz, StepSecurity, Socket, Orca, JFrog) within minutes of the 2026-05-11 publish window. No AI-tool discovery attribution on the defender side. Source: https://snyk.io/blog/tanstack-npm-packages-compromised/.",
|
|
2108
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2098
2109
|
},
|
|
2099
2110
|
"MAL-2026-ANTHROPIC-MCP-STDIO": {
|
|
2100
2111
|
"_draft": true,
|
|
@@ -2142,12 +2153,12 @@
|
|
|
2142
2153
|
"rwep_score": 25,
|
|
2143
2154
|
"rwep_factors": {
|
|
2144
2155
|
"cisa_kev": 0,
|
|
2145
|
-
"poc_available":
|
|
2156
|
+
"poc_available": 0,
|
|
2146
2157
|
"ai_factor": 0,
|
|
2147
2158
|
"active_exploitation": 5,
|
|
2148
2159
|
"blast_radius": 30,
|
|
2149
2160
|
"patch_available": 0,
|
|
2150
|
-
"live_patch_available": -
|
|
2161
|
+
"live_patch_available": -10,
|
|
2151
2162
|
"reboot_required": 0
|
|
2152
2163
|
},
|
|
2153
2164
|
"epss_score": null,
|
|
@@ -2162,7 +2173,8 @@
|
|
|
2162
2173
|
"https://modelcontextprotocol.io/"
|
|
2163
2174
|
],
|
|
2164
2175
|
"last_updated": "2026-05-15",
|
|
2165
|
-
"discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/."
|
|
2176
|
+
"discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/.",
|
|
2177
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2166
2178
|
},
|
|
2167
2179
|
"CVE-2026-GTIG-AI-2FA": {
|
|
2168
2180
|
"_draft": true,
|
|
@@ -2215,12 +2227,12 @@
|
|
|
2215
2227
|
"rwep_score": 55,
|
|
2216
2228
|
"rwep_factors": {
|
|
2217
2229
|
"cisa_kev": 0,
|
|
2218
|
-
"poc_available":
|
|
2219
|
-
"ai_factor":
|
|
2230
|
+
"poc_available": 0,
|
|
2231
|
+
"ai_factor": 15,
|
|
2220
2232
|
"active_exploitation": 20,
|
|
2221
2233
|
"blast_radius": 30,
|
|
2222
2234
|
"patch_available": 0,
|
|
2223
|
-
"live_patch_available": -
|
|
2235
|
+
"live_patch_available": -10,
|
|
2224
2236
|
"reboot_required": 0
|
|
2225
2237
|
},
|
|
2226
2238
|
"epss_score": null,
|
|
@@ -2235,7 +2247,8 @@
|
|
|
2235
2247
|
"https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
|
|
2236
2248
|
],
|
|
2237
2249
|
"last_updated": "2026-05-15",
|
|
2238
|
-
"discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html."
|
|
2250
|
+
"discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html.",
|
|
2251
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2239
2252
|
},
|
|
2240
2253
|
"CVE-2026-30623": {
|
|
2241
2254
|
"_draft": true,
|
|
@@ -2339,7 +2352,7 @@
|
|
|
2339
2352
|
"attack_refs": [
|
|
2340
2353
|
"T1190"
|
|
2341
2354
|
],
|
|
2342
|
-
"rwep_score":
|
|
2355
|
+
"rwep_score": 45,
|
|
2343
2356
|
"rwep_factors": {
|
|
2344
2357
|
"cisa_kev": 0,
|
|
2345
2358
|
"poc_available": 20,
|
|
@@ -2361,7 +2374,8 @@
|
|
|
2361
2374
|
"https://www.zerodayinitiative.com/blog"
|
|
2362
2375
|
],
|
|
2363
2376
|
"last_updated": "2026-05-15",
|
|
2364
|
-
"discovery_attribution_note": "Pwn2Own Ireland 2025 (Cork, 2025-10-21) — exploited by @Tek_7987 and @_Anyfun of Synacktiv's offensive security team. Disclosure methodology: attack-surface enumeration + manual code auditing + exploit development per Synacktiv's published writeup; no AI-tool credit. Source: https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey."
|
|
2377
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 (Cork, 2025-10-21) — exploited by @Tek_7987 and @_Anyfun of Synacktiv's offensive security team. Disclosure methodology: attack-surface enumeration + manual code auditing + exploit development per Synacktiv's published writeup; no AI-tool credit. Source: https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey.",
|
|
2378
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (50 -> 45)."
|
|
2365
2379
|
},
|
|
2366
2380
|
"CVE-2025-62847": {
|
|
2367
2381
|
"_draft": true,
|
|
@@ -2400,7 +2414,7 @@
|
|
|
2400
2414
|
"attack_refs": [
|
|
2401
2415
|
"T1190"
|
|
2402
2416
|
],
|
|
2403
|
-
"rwep_score":
|
|
2417
|
+
"rwep_score": 40,
|
|
2404
2418
|
"rwep_factors": {
|
|
2405
2419
|
"cisa_kev": 0,
|
|
2406
2420
|
"poc_available": 20,
|
|
@@ -2422,7 +2436,8 @@
|
|
|
2422
2436
|
"https://www.qnap.com/en/security-advisory/"
|
|
2423
2437
|
],
|
|
2424
2438
|
"last_updated": "2026-05-15",
|
|
2425
|
-
"discovery_attribution_note": "Pwn2Own Ireland 2025 — exploited by DEVCORE Research Team (chained injection + format-string bug, $40,000 + 4 Master of Pwn points). Named-human team via ZDI live-blog credit; no AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2439
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — exploited by DEVCORE Research Team (chained injection + format-string bug, $40,000 + 4 Master of Pwn points). Named-human team via ZDI live-blog credit; no AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2440
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2426
2441
|
},
|
|
2427
2442
|
"CVE-2025-62848": {
|
|
2428
2443
|
"_draft": true,
|
|
@@ -2461,7 +2476,7 @@
|
|
|
2461
2476
|
"attack_refs": [
|
|
2462
2477
|
"T1190"
|
|
2463
2478
|
],
|
|
2464
|
-
"rwep_score":
|
|
2479
|
+
"rwep_score": 40,
|
|
2465
2480
|
"rwep_factors": {
|
|
2466
2481
|
"cisa_kev": 0,
|
|
2467
2482
|
"poc_available": 20,
|
|
@@ -2483,7 +2498,8 @@
|
|
|
2483
2498
|
"https://www.qnap.com/en/security-advisory/"
|
|
2484
2499
|
],
|
|
2485
2500
|
"last_updated": "2026-05-15",
|
|
2486
|
-
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 2/3 of the DEVCORE Research Team QNAP TS-453E exploit. Same researcher attribution as CVE-2025-62847; ZDI live-blog credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2501
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 2/3 of the DEVCORE Research Team QNAP TS-453E exploit. Same researcher attribution as CVE-2025-62847; ZDI live-blog credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2502
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (45 -> 40)."
|
|
2487
2503
|
},
|
|
2488
2504
|
"CVE-2025-62849": {
|
|
2489
2505
|
"_draft": true,
|
|
@@ -2522,7 +2538,7 @@
|
|
|
2522
2538
|
"attack_refs": [
|
|
2523
2539
|
"T1068"
|
|
2524
2540
|
],
|
|
2525
|
-
"rwep_score":
|
|
2541
|
+
"rwep_score": 35,
|
|
2526
2542
|
"rwep_factors": {
|
|
2527
2543
|
"cisa_kev": 0,
|
|
2528
2544
|
"poc_available": 20,
|
|
@@ -2544,7 +2560,8 @@
|
|
|
2544
2560
|
"https://www.qnap.com/en/security-advisory/"
|
|
2545
2561
|
],
|
|
2546
2562
|
"last_updated": "2026-05-15",
|
|
2547
|
-
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 3/3 of the DEVCORE Research Team QNAP TS-453E exploit (post-auth elevation). Same attribution as CVE-2025-62847/62848; ZDI credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results."
|
|
2563
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — chain 3/3 of the DEVCORE Research Team QNAP TS-453E exploit (post-auth elevation). Same attribution as CVE-2025-62847/62848; ZDI credit. No AI-tool attribution. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results.",
|
|
2564
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: -5 (40 -> 35)."
|
|
2548
2565
|
},
|
|
2549
2566
|
"CVE-2025-59389": {
|
|
2550
2567
|
"_draft": true,
|
|
@@ -2589,7 +2606,7 @@
|
|
|
2589
2606
|
"poc_available": 20,
|
|
2590
2607
|
"ai_factor": 0,
|
|
2591
2608
|
"active_exploitation": 5,
|
|
2592
|
-
"blast_radius":
|
|
2609
|
+
"blast_radius": 30,
|
|
2593
2610
|
"patch_available": -15,
|
|
2594
2611
|
"live_patch_available": 0,
|
|
2595
2612
|
"reboot_required": 5
|
|
@@ -2605,7 +2622,8 @@
|
|
|
2605
2622
|
"https://www.qnap.com/en/security-advisory/"
|
|
2606
2623
|
],
|
|
2607
2624
|
"last_updated": "2026-05-15",
|
|
2608
|
-
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Sina Kheirkhah of Summoning Team chained a hardcoded-credential issue with an injection flaw against QNAP Hyper Data Protector ($20,000 award). Named-human researcher; no AI-tool credit. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results and https://www.qnap.com/en/security-advisory/qsa-25-48."
|
|
2625
|
+
"discovery_attribution_note": "Pwn2Own Ireland 2025 — Sina Kheirkhah of Summoning Team chained a hardcoded-credential issue with an injection flaw against QNAP Hyper Data Protector ($20,000 award). Named-human researcher; no AI-tool credit. Source: https://www.thezdi.com/blog/2025/10/21/pwn2own-ireland-2025-day-one-results and https://www.qnap.com/en/security-advisory/qsa-25-48.",
|
|
2626
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors AND rwep_score to satisfy Shape B invariant. The prior stored rwep_score was internally inconsistent with its rwep_factors block; both now derived from canonical RWEP_WEIGHTS + operational fields. Delta from prior stored: 0."
|
|
2609
2627
|
},
|
|
2610
2628
|
"CVE-2025-11837": {
|
|
2611
2629
|
"_draft": true,
|
|
@@ -2726,9 +2744,9 @@
|
|
|
2726
2744
|
"rwep_factors": {
|
|
2727
2745
|
"cisa_kev": 0,
|
|
2728
2746
|
"poc_available": 20,
|
|
2729
|
-
"ai_factor":
|
|
2747
|
+
"ai_factor": 15,
|
|
2730
2748
|
"active_exploitation": 0,
|
|
2731
|
-
"blast_radius":
|
|
2749
|
+
"blast_radius": 30,
|
|
2732
2750
|
"patch_available": -15,
|
|
2733
2751
|
"live_patch_available": -10,
|
|
2734
2752
|
"reboot_required": 0
|
|
@@ -2747,6 +2765,681 @@
|
|
|
2747
2765
|
"https://nginx.org/en/security_advisories.html"
|
|
2748
2766
|
],
|
|
2749
2767
|
"last_updated": "2026-05-15",
|
|
2750
|
-
"discovery_attribution_note": "Discovered by depthfirst's autonomous vulnerability-analysis platform; flagged the heap-buffer-overflow in nginx ngx_http_rewrite_module (present since nginx 0.6.27, 2008) within six hours of scan time. First publicly-attributed AI-discovered nginx CVE; jointly disclosed by F5 + depthfirst on 2026-05-13. Source: https://depthfirst.com/nginx-rift and https://github.com/depthfirstdisclosures/nginx-rift."
|
|
2768
|
+
"discovery_attribution_note": "Discovered by depthfirst's autonomous vulnerability-analysis platform; flagged the heap-buffer-overflow in nginx ngx_http_rewrite_module (present since nginx 0.6.27, 2008) within six hours of scan time. First publicly-attributed AI-discovered nginx CVE; jointly disclosed by F5 + depthfirst on 2026-05-13. Source: https://depthfirst.com/nginx-rift and https://github.com/depthfirstdisclosures/nginx-rift.",
|
|
2769
|
+
"rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
|
|
2770
|
+
},
|
|
2771
|
+
"CVE-2026-0300": {
|
|
2772
|
+
"_draft": true,
|
|
2773
|
+
"_auto_imported": true,
|
|
2774
|
+
"name": "PAN-UID — Palo Alto Networks PAN-OS User-ID Authentication Portal RCE",
|
|
2775
|
+
"type": "rce",
|
|
2776
|
+
"cvss_score": 9.3,
|
|
2777
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2778
|
+
"cisa_kev": true,
|
|
2779
|
+
"cisa_kev_date": "2026-05-06",
|
|
2780
|
+
"cisa_kev_due_date": "2026-05-27",
|
|
2781
|
+
"poc_available": true,
|
|
2782
|
+
"poc_description": "Vendor-confirmed in-wild exploitation of the User-ID Authentication Portal request-parsing path. Public PoC details withheld during the KEV 21-day window; exploitation chain reaches an out-of-bounds write in the authentication-portal handler reachable pre-auth from any host that can reach the portal's HTTPS endpoint, producing unauth root RCE on the firewall control plane.",
|
|
2783
|
+
"ai_discovered": false,
|
|
2784
|
+
"ai_discovery_source": "vendor_research",
|
|
2785
|
+
"ai_discovery_notes": "Internal Palo Alto Networks PSIRT discovery during proactive auditing of the User-ID subsystem. No AI-tool credit in the vendor advisory; classed under vendor_research per Hard Rule #1 (no silent upgrades).",
|
|
2786
|
+
"ai_assisted_weaponization": false,
|
|
2787
|
+
"ai_assisted_notes": "No AI-assisted exploit development reported in the vendor advisory or downstream reporting.",
|
|
2788
|
+
"active_exploitation": "confirmed",
|
|
2789
|
+
"active_exploitation_notes": "CISA KEV listing 2026-05-06 reflects vendor-confirmed limited in-the-wild exploitation. Palo Alto PSIRT bulletin attributes the activity to a 'sophisticated threat actor' targeting perimeter PAN-OS deployments with the User-ID Authentication Portal feature enabled.",
|
|
2790
|
+
"affected": "Palo Alto Networks PAN-OS on PA-Series hardware appliances + VM-Series virtual firewalls with the User-ID Authentication Portal feature exposed to untrusted networks. Prisma Access, Cloud NGFW, and Panorama are NOT affected — the vulnerable code path lives in the on-device authentication-portal handler. Operational footprint covers a large fraction of enterprise perimeters and federal/SLTT firewalls.",
|
|
2791
|
+
"affected_versions": [
|
|
2792
|
+
"PAN-OS 10.2.x prior to the 2026-05-13 fixed release",
|
|
2793
|
+
"PAN-OS 11.0.x prior to the 2026-05-13 fixed release",
|
|
2794
|
+
"PAN-OS 11.1.x prior to the 2026-05-13 fixed release",
|
|
2795
|
+
"PAN-OS 11.2.x prior to the 2026-05-13 fixed release"
|
|
2796
|
+
],
|
|
2797
|
+
"vector": "Pre-auth network — a crafted HTTPS request to the User-ID Authentication Portal endpoint triggers an out-of-bounds write in the request-parsing logic, leading to remote code execution as root on the firewall data plane. No credentials or user interaction required; the only filter is portal reachability.",
|
|
2798
|
+
"complexity": "low",
|
|
2799
|
+
"complexity_notes": "Single-shot HTTPS request. Operationally the only practical limiter is whether the Authentication Portal is reachable from the attacker's network position — internet-exposed portals are immediate; portals fronted by IP allowlist or external auth require pivot.",
|
|
2800
|
+
"patch_available": true,
|
|
2801
|
+
"patch_required_reboot": true,
|
|
2802
|
+
"live_patch_available": true,
|
|
2803
|
+
"live_patch_tools": [
|
|
2804
|
+
"PAN-OS content updates and threat-prevention signatures applied via dynamic-updates without firewall restart provide compensating detection while the binary upgrade is staged",
|
|
2805
|
+
"Temporary mitigation: disable the User-ID Authentication Portal feature on internet-facing interfaces until the binary upgrade is applied — operator-side configuration change, no restart needed"
|
|
2806
|
+
],
|
|
2807
|
+
"vendor_update_paths": [
|
|
2808
|
+
"PAN-OS upgrade to vendor-released fixed train (2026-05-13) on PA-Series and VM-Series appliances; firewall reboot required to land the data-plane binary."
|
|
2809
|
+
],
|
|
2810
|
+
"framework_control_gaps": {
|
|
2811
|
+
"NIST-800-53-SI-2": "30-day SI-2 SLA insufficient for pre-auth unauth RCE on the perimeter. KEV due date 2026-05-27 (21 days) tightens the federal expectation but does not align with private-sector SI-2 baselines.",
|
|
2812
|
+
"NIS2-Art21-vulnerability-management": "Essential-entity tier should treat perimeter firewall RCE as Tier-1; framework does not name the perimeter-firewall control-plane class explicitly.",
|
|
2813
|
+
"ISO-27001-2022-A.8.8": "Appropriate timescales for technical-vulnerability management are undefined for perimeter-network appliances with unauth RCE exposure.",
|
|
2814
|
+
"DORA-Art-9": "Financial-services ICT third-party risk does not differentiate between perimeter-firewall vendor patch path and feature-disable mitigation path."
|
|
2815
|
+
},
|
|
2816
|
+
"atlas_refs": [],
|
|
2817
|
+
"attack_refs": [
|
|
2818
|
+
"T1190",
|
|
2819
|
+
"T1133",
|
|
2820
|
+
"T1068"
|
|
2821
|
+
],
|
|
2822
|
+
"rwep_score": 73,
|
|
2823
|
+
"rwep_factors": {
|
|
2824
|
+
"cisa_kev": 25,
|
|
2825
|
+
"poc_available": 20,
|
|
2826
|
+
"ai_factor": 0,
|
|
2827
|
+
"active_exploitation": 20,
|
|
2828
|
+
"blast_radius": 28,
|
|
2829
|
+
"patch_available": -15,
|
|
2830
|
+
"live_patch_available": -10,
|
|
2831
|
+
"reboot_required": 5
|
|
2832
|
+
},
|
|
2833
|
+
"rwep_notes": "P0 — KEV-listed pre-auth unauth RCE on a Tier-1 perimeter appliance. blast_radius=28 reflects the enterprise-perimeter footprint without claiming the full 30-point cap (Prisma + Cloud NGFW + Panorama are unaffected, narrowing the population vs a universally-deployed PAN-OS bug).",
|
|
2834
|
+
"epss_score": null,
|
|
2835
|
+
"epss_date": "2026-05-15",
|
|
2836
|
+
"epss_note": "EPSS score not yet computed for CVE-2026-0300 at intake. Refresh via `exceptd refresh --source epss` once FIRST API publishes a value; cold-start EPSS frequently understates fresh KEV-listed perimeter RCEs.",
|
|
2837
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-0300",
|
|
2838
|
+
"cwe_refs": [
|
|
2839
|
+
"CWE-787",
|
|
2840
|
+
"CWE-306"
|
|
2841
|
+
],
|
|
2842
|
+
"source_verified": "2026-05-15",
|
|
2843
|
+
"verification_sources": [
|
|
2844
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-0300",
|
|
2845
|
+
"https://www.cisa.gov/news-events/alerts/2026/05/06/cisa-adds-one-known-exploited-vulnerability-catalog"
|
|
2846
|
+
],
|
|
2847
|
+
"vendor_advisories": [
|
|
2848
|
+
{
|
|
2849
|
+
"vendor": "Palo Alto Networks PSIRT",
|
|
2850
|
+
"advisory_id": "CVE-2026-0300",
|
|
2851
|
+
"url": "https://security.paloaltonetworks.com/CVE-2026-0300",
|
|
2852
|
+
"severity": "critical",
|
|
2853
|
+
"published_date": "2026-05-13"
|
|
2854
|
+
},
|
|
2855
|
+
{
|
|
2856
|
+
"vendor": "CISA KEV",
|
|
2857
|
+
"advisory_id": null,
|
|
2858
|
+
"url": "https://www.cisa.gov/news-events/alerts/2026/05/06/cisa-adds-one-known-exploited-vulnerability-catalog",
|
|
2859
|
+
"severity": "critical",
|
|
2860
|
+
"published_date": "2026-05-06"
|
|
2861
|
+
}
|
|
2862
|
+
],
|
|
2863
|
+
"iocs": {
|
|
2864
|
+
"payload_artifacts": [
|
|
2865
|
+
"HTTPS request to the User-ID Authentication Portal endpoint with an unusually long URI path component or oversized parameter value (>2 KB) — the OOB-write path keys on length-bounded parsing the request exceeds",
|
|
2866
|
+
"PAN-OS device-log entries with auth-portal request-parsing errors immediately preceding an out-of-process auth-portal worker restart"
|
|
2867
|
+
],
|
|
2868
|
+
"behavioral": [
|
|
2869
|
+
"Outbound connection from PAN-OS management plane to a host NOT in the operator's update-server allowlist immediately after an inbound HTTPS auth-portal request from an external IP",
|
|
2870
|
+
"Auth-portal request originating from a single source IP with no prior baseline of legitimate auth-portal traffic, followed within seconds by configuration-read XML-API calls from the same control-plane session"
|
|
2871
|
+
],
|
|
2872
|
+
"version_exposure": [
|
|
2873
|
+
"PAN-OS version below the 2026-05-13 fixed train AND `show user-id authentication-portal` reports an enabled portal AND the firewall's untrust interface accepts traffic to the portal listener"
|
|
2874
|
+
]
|
|
2875
|
+
},
|
|
2876
|
+
"last_updated": "2026-05-15",
|
|
2877
|
+
"discovery_attribution_note": "Internal discovery by Palo Alto Networks PSIRT during proactive authentication-subsystem auditing; vendor advisory published 2026-05-13 alongside CISA KEV listing 2026-05-06. No AI-tool credit. Source: https://security.paloaltonetworks.com/CVE-2026-0300 and https://www.cisa.gov/news-events/alerts/2026/05/06/cisa-adds-one-known-exploited-vulnerability-catalog."
|
|
2878
|
+
},
|
|
2879
|
+
"CVE-2026-39987": {
|
|
2880
|
+
"_draft": true,
|
|
2881
|
+
"_auto_imported": true,
|
|
2882
|
+
"name": "Marimo Python Notebook Pre-Auth WebSocket Terminal RCE",
|
|
2883
|
+
"type": "rce",
|
|
2884
|
+
"cvss_score": 9.3,
|
|
2885
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
2886
|
+
"cisa_kev": true,
|
|
2887
|
+
"cisa_kev_date": "2026-04-23",
|
|
2888
|
+
"cisa_kev_due_date": "2026-05-07",
|
|
2889
|
+
"poc_available": true,
|
|
2890
|
+
"poc_description": "Sysdig published the exploitation chain within 10 hours of disclosure: any HTTP client can open a WebSocket to `/terminal/ws` on an exposed Marimo instance and receive a PTY shell as the notebook-server user without presenting credentials. NKAbuse blockchain-botnet samples observed deploying within the same window via Hugging Face-hosted Marimo notebooks.",
|
|
2891
|
+
"ai_discovered": false,
|
|
2892
|
+
"ai_discovery_source": "vendor_research",
|
|
2893
|
+
"ai_discovery_notes": "Discovery credited to marimo-team's internal security review of the terminal subsystem after a Sysdig honeypot caught early scanning. Marimo is AI/ML-developer infrastructure (the vulnerable surface is in the AI tooling stack) but the bug itself was not found by an AI tool — classed as vendor_research per Hard Rule #1.",
|
|
2894
|
+
"ai_assisted_weaponization": false,
|
|
2895
|
+
"ai_assisted_notes": "No AI-assisted exploit development reported. The exploit primitive is a single WebSocket connect; weaponization complexity is trivial.",
|
|
2896
|
+
"active_exploitation": "confirmed",
|
|
2897
|
+
"active_exploitation_notes": "Sysdig confirmed in-the-wild exploitation within ~10 hours of public disclosure, with NKAbuse blockchain-botnet payloads observed deploying via Hugging Face-hosted Marimo notebook instances. CISA KEV listing 2026-04-23 reflects federal-relevant exploitation evidence.",
|
|
2898
|
+
"affected": "marimo-team / Marimo Python reactive notebook server — popular AI/ML notebook surface used in research labs, Hugging Face Spaces, internal data-science platforms. Affected installs include Hugging Face-hosted Marimo Spaces that did not auto-update.",
|
|
2899
|
+
"affected_versions": [
|
|
2900
|
+
"marimo <= 0.20.4",
|
|
2901
|
+
"marimo < 0.23.0 (fixed in 0.23.0)"
|
|
2902
|
+
],
|
|
2903
|
+
"vector": "Marimo's notebook server exposed a `/terminal/ws` WebSocket endpoint that spawned a PTY shell on connect WITHOUT performing any authentication check. Any attacker who could reach the notebook-server port (default 2718) could open the WebSocket and immediately execute commands as the notebook-server user. No notebook code execution, no notebook ownership, no token required.",
|
|
2904
|
+
"complexity": "low",
|
|
2905
|
+
"complexity_notes": "Single WebSocket connect with no auth headers. Operationally the only practical filter is network reachability — internet-exposed Marimo instances are immediate; localhost-only instances require pivot through another host vulnerability.",
|
|
2906
|
+
"patch_available": true,
|
|
2907
|
+
"patch_required_reboot": false,
|
|
2908
|
+
"live_patch_available": true,
|
|
2909
|
+
"live_patch_tools": [
|
|
2910
|
+
"Upgrade marimo to 0.23.0+ (auth check added to /terminal/ws WebSocket handshake)",
|
|
2911
|
+
"Temporary mitigation: bind the notebook server to localhost (--host 127.0.0.1) until upgrade is applied — operator-side configuration change, no restart of the notebook itself required",
|
|
2912
|
+
"Temporary mitigation: front the notebook server with a reverse proxy that requires authentication on /terminal/ws"
|
|
2913
|
+
],
|
|
2914
|
+
"framework_control_gaps": {
|
|
2915
|
+
"NIST-800-53-AC-3": "Access enforcement does not name AI/ML notebook surfaces as a class; framework's web-application control set treats /terminal/ws as ordinary web infrastructure.",
|
|
2916
|
+
"OWASP-LLM-Top-10-2025-LLM05": "Insecure plugin / tool surfaces — LLM Top-10 names plugin-trust risks but does not address the AI/ML notebook-server admin-surface attack class.",
|
|
2917
|
+
"EU-AI-Act-Art-15": "Robustness + cybersecurity requirement is undefined operationally for AI development surfaces (notebook servers, model hubs, dataset registries).",
|
|
2918
|
+
"NIS2-Art21-incident-handling": "Generic incident-handling controls without AI/ML-developer-surface-specific guidance."
|
|
2919
|
+
},
|
|
2920
|
+
"atlas_refs": [
|
|
2921
|
+
"AML.T0051",
|
|
2922
|
+
"AML.T0010"
|
|
2923
|
+
],
|
|
2924
|
+
"attack_refs": [
|
|
2925
|
+
"T1190",
|
|
2926
|
+
"T1059",
|
|
2927
|
+
"T1133"
|
|
2928
|
+
],
|
|
2929
|
+
"rwep_score": 62,
|
|
2930
|
+
"rwep_factors": {
|
|
2931
|
+
"cisa_kev": 25,
|
|
2932
|
+
"poc_available": 20,
|
|
2933
|
+
"ai_factor": 0,
|
|
2934
|
+
"active_exploitation": 20,
|
|
2935
|
+
"blast_radius": 22,
|
|
2936
|
+
"patch_available": -15,
|
|
2937
|
+
"live_patch_available": -10,
|
|
2938
|
+
"reboot_required": 0
|
|
2939
|
+
},
|
|
2940
|
+
"rwep_notes": "P1 — KEV-listed, pre-auth unauth RCE on a moderate-footprint AI/ML developer surface. blast_radius=22 reflects Marimo's substantial-but-not-universal AI/ML developer adoption (smaller than nginx/Exchange-class population, larger than niche-tool population).",
|
|
2941
|
+
"epss_score": null,
|
|
2942
|
+
"epss_date": "2026-05-15",
|
|
2943
|
+
"epss_note": "EPSS score not yet refreshed for CVE-2026-39987 at intake. Refresh via `exceptd refresh --source epss` once FIRST API publishes a value.",
|
|
2944
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-39987",
|
|
2945
|
+
"cwe_refs": [
|
|
2946
|
+
"CWE-306",
|
|
2947
|
+
"CWE-78"
|
|
2948
|
+
],
|
|
2949
|
+
"source_verified": "2026-05-15",
|
|
2950
|
+
"verification_sources": [
|
|
2951
|
+
"https://nvd.nist.gov/vuln/detail/CVE-2026-39987",
|
|
2952
|
+
"https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface"
|
|
2953
|
+
],
|
|
2954
|
+
"vendor_advisories": [
|
|
2955
|
+
{
|
|
2956
|
+
"vendor": "marimo-team",
|
|
2957
|
+
"advisory_id": null,
|
|
2958
|
+
"url": "https://github.com/marimo-team/marimo/security/advisories",
|
|
2959
|
+
"severity": "critical",
|
|
2960
|
+
"published_date": "2026-04-21"
|
|
2961
|
+
},
|
|
2962
|
+
{
|
|
2963
|
+
"vendor": "Sysdig Threat Research",
|
|
2964
|
+
"advisory_id": null,
|
|
2965
|
+
"url": "https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface",
|
|
2966
|
+
"severity": "critical",
|
|
2967
|
+
"published_date": "2026-04-23"
|
|
2968
|
+
},
|
|
2969
|
+
{
|
|
2970
|
+
"vendor": "CISA KEV",
|
|
2971
|
+
"advisory_id": null,
|
|
2972
|
+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
2973
|
+
"severity": "critical",
|
|
2974
|
+
"published_date": "2026-04-23"
|
|
2975
|
+
}
|
|
2976
|
+
],
|
|
2977
|
+
"iocs": {
|
|
2978
|
+
"payload_artifacts": [
|
|
2979
|
+
"WebSocket handshake against `/terminal/ws` on a Marimo server (default port 2718) WITHOUT an Authorization / Cookie / token query parameter — pre-0.23.0 the endpoint accepts the connection unconditionally and spawns a PTY",
|
|
2980
|
+
"NKAbuse-class payload markers in /tmp, /var/tmp, or the notebook-server user's home — the campaign's blockchain-botnet binary writes initial implants to predictable temp paths"
|
|
2981
|
+
],
|
|
2982
|
+
"behavioral": [
|
|
2983
|
+
"PTY process (bash, sh, python -i) parented by the marimo notebook-server process with no corresponding notebook-cell-execute log entry — terminal sessions opened via the unauthenticated /terminal/ws path leave no notebook-cell audit trail",
|
|
2984
|
+
"Outbound connection from a Marimo notebook host to NKAbuse / blockchain-botnet C2 infrastructure (Sysdig blog enumerates the campaign's domains) within minutes of an inbound /terminal/ws WebSocket handshake from an external IP",
|
|
2985
|
+
"Marimo notebook server bound to 0.0.0.0 (not 127.0.0.1) on a host with internet-routable IP AND server version below 0.23.0"
|
|
2986
|
+
],
|
|
2987
|
+
"version_exposure": [
|
|
2988
|
+
"Marimo server reports a version in the affected_versions range AND `/terminal/ws` returns HTTP 101 Switching Protocols on a WebSocket handshake without auth"
|
|
2989
|
+
]
|
|
2990
|
+
},
|
|
2991
|
+
"last_updated": "2026-05-15",
|
|
2992
|
+
"discovery_attribution_note": "Marimo team's security review of the terminal subsystem prompted by Sysdig honeypot evidence; vendor advisory + Sysdig blog jointly disclosed 2026-04-21 / 2026-04-23. No AI-tool credit for the discovery; the vulnerable component IS an AI/ML developer surface but the bug was found by conventional human review. Source: https://www.sysdig.com/blog/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface and https://github.com/marimo-team/marimo/security/advisories."
|
|
2993
|
+
},
|
|
2994
|
+
"CVE-2026-6973": {
|
|
2995
|
+
"_draft": true,
|
|
2996
|
+
"_auto_imported": true,
|
|
2997
|
+
"name": "Ivanti EPMM Authenticated-Admin RCE",
|
|
2998
|
+
"type": "rce",
|
|
2999
|
+
"cvss_score": 7.2,
|
|
3000
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
3001
|
+
"cisa_kev": true,
|
|
3002
|
+
"cisa_kev_date": "2026-05-07",
|
|
3003
|
+
"cisa_kev_due_date": "2026-05-10",
|
|
3004
|
+
"poc_available": true,
|
|
3005
|
+
"poc_description": "Ivanti confirmed in-wild exploitation of the authenticated-admin RCE path. Public exploit details withheld during the 3-day KEV window but vendor advisory enumerates the affected endpoints; the chain accepts attacker-controlled input through an admin-only management endpoint that fails to validate parameter shape, reaching a shell-out with attacker-controlled arguments.",
|
|
3006
|
+
"ai_discovered": false,
|
|
3007
|
+
"ai_discovery_source": "vendor_research",
|
|
3008
|
+
"ai_discovery_notes": "Vendor-side discovery by Ivanti's product-security team during admin-surface review. No AI-tool credit in the vendor advisory; classed as vendor_research per Hard Rule #1.",
|
|
3009
|
+
"ai_assisted_weaponization": false,
|
|
3010
|
+
"ai_assisted_notes": "No AI-assisted weaponization reported in vendor or Help Net Security coverage.",
|
|
3011
|
+
"active_exploitation": "confirmed",
|
|
3012
|
+
"active_exploitation_notes": "CISA KEV listing 2026-05-07 with a 3-day due date (the tightest standard KEV deadline) reflects vendor-confirmed in-the-wild exploitation targeting on-premise EPMM admin consoles. Threat-actor TTPs cluster on enterprise-mobility-management surfaces consistent with prior Ivanti-EPMM campaigns.",
|
|
3013
|
+
"affected": "Ivanti Endpoint Manager Mobile (EPMM) on-premise — enterprise mobile-device-management platform. Cloud-hosted Ivanti Neurons for MDM is unaffected. Operational footprint covers enterprise + government MDM deployments with internet-reachable admin consoles or admin sessions reachable from compromised internal hosts.",
|
|
3014
|
+
"affected_versions": [
|
|
3015
|
+
"Ivanti EPMM < 12.6.1.1",
|
|
3016
|
+
"Ivanti EPMM < 12.7.0.1",
|
|
3017
|
+
"Ivanti EPMM < 12.8.0.1"
|
|
3018
|
+
],
|
|
3019
|
+
"vector": "Authenticated administrator with access to a specific management endpoint can supply crafted parameter values that bypass server-side input validation, reaching a code-execution sink. Result: arbitrary OS-level code execution as the EPMM service account, which typically holds elevated privileges on the EPMM host and access to the device-fleet management database.",
|
|
3020
|
+
"complexity": "low",
|
|
3021
|
+
"complexity_notes": "Once an attacker has admin credentials (via password spray, stolen MDM admin token, or supply-chain compromise of an integration), the RCE primitive itself is a single API call. Operational difficulty is in obtaining the admin foothold, not in landing the exploit.",
|
|
3022
|
+
"patch_available": true,
|
|
3023
|
+
"patch_required_reboot": false,
|
|
3024
|
+
"live_patch_available": true,
|
|
3025
|
+
"live_patch_tools": [
|
|
3026
|
+
"Upgrade EPMM to 12.6.1.1 / 12.7.0.1 / 12.8.0.1 (matching the operator's installed train) — service restart only, no host reboot",
|
|
3027
|
+
"Temporary mitigation: restrict admin-console access to a small set of operator IP ranges via firewall / WAF rule until the binary upgrade is applied"
|
|
3028
|
+
],
|
|
3029
|
+
"framework_control_gaps": {
|
|
3030
|
+
"NIST-800-53-AC-6": "Least privilege controls do not address the admin-surface-RCE class — the bug presumes an admin foothold and trades that foothold for full host compromise, which AC-6 does not constrain.",
|
|
3031
|
+
"NIST-800-53-SI-2": "30-day SLA insufficient for KEV-listed authenticated-admin RCE on a fleet-management platform; KEV due date 2026-05-10 (3 days) is unusually tight even by federal standards.",
|
|
3032
|
+
"NIS2-Art21-identity-management": "Privileged-account controls assume admin-account compromise is the breach; the EPMM RCE class additionally trades that admin position for host-level compromise, expanding blast radius beyond the MDM application boundary.",
|
|
3033
|
+
"ISO-27001-2022-A.8.7": "Privileged-access management controls don't address admin-surface-to-host privilege escalation paths within MDM platforms."
|
|
3034
|
+
},
|
|
3035
|
+
"atlas_refs": [],
|
|
3036
|
+
"attack_refs": [
|
|
3037
|
+
"T1190",
|
|
3038
|
+
"T1078",
|
|
3039
|
+
"T1059",
|
|
3040
|
+
"T1068"
|
|
3041
|
+
],
|
|
3042
|
+
"rwep_score": 62,
|
|
3043
|
+
"rwep_factors": {
|
|
3044
|
+
"cisa_kev": 25,
|
|
3045
|
+
"poc_available": 20,
|
|
3046
|
+
"ai_factor": 0,
|
|
3047
|
+
"active_exploitation": 20,
|
|
3048
|
+
"blast_radius": 22,
|
|
3049
|
+
"patch_available": -15,
|
|
3050
|
+
"live_patch_available": -10,
|
|
3051
|
+
"reboot_required": 0
|
|
3052
|
+
},
|
|
3053
|
+
"rwep_notes": "P1 — KEV-listed authenticated-admin RCE with a 3-day federal due date. blast_radius=22 reflects enterprise MDM admin-surface footprint; the auth prerequisite caps the score below pre-auth perimeter RCEs like CVE-2026-0300.",
|
|
3054
|
+
"epss_score": null,
|
|
3055
|
+
"epss_date": "2026-05-15",
|
|
3056
|
+
"epss_note": "EPSS score not yet refreshed for CVE-2026-6973 at intake. Refresh via `exceptd refresh --source epss`.",
|
|
3057
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-6973",
|
|
3058
|
+
"cwe_refs": [
|
|
3059
|
+
"CWE-20",
|
|
3060
|
+
"CWE-94"
|
|
3061
|
+
],
|
|
3062
|
+
"source_verified": "2026-05-15",
|
|
3063
|
+
"verification_sources": [
|
|
3064
|
+
"https://www.cisa.gov/news-events/alerts/2026/05/07/cisa-adds-one-known-exploited-vulnerability-catalog",
|
|
3065
|
+
"https://www.helpnetsecurity.com/2026/05/08/ivanti-epmm-zero-day-cve-2026-6973/"
|
|
3066
|
+
],
|
|
3067
|
+
"vendor_advisories": [
|
|
3068
|
+
{
|
|
3069
|
+
"vendor": "Ivanti",
|
|
3070
|
+
"advisory_id": "CVE-2026-6973",
|
|
3071
|
+
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-CVE-2026-6973",
|
|
3072
|
+
"severity": "high",
|
|
3073
|
+
"published_date": "2026-05-07"
|
|
3074
|
+
},
|
|
3075
|
+
{
|
|
3076
|
+
"vendor": "CISA KEV",
|
|
3077
|
+
"advisory_id": null,
|
|
3078
|
+
"url": "https://www.cisa.gov/news-events/alerts/2026/05/07/cisa-adds-one-known-exploited-vulnerability-catalog",
|
|
3079
|
+
"severity": "high",
|
|
3080
|
+
"published_date": "2026-05-07"
|
|
3081
|
+
}
|
|
3082
|
+
],
|
|
3083
|
+
"iocs": {
|
|
3084
|
+
"payload_artifacts": [
|
|
3085
|
+
"EPMM admin-console request to the affected management endpoint with parameter values containing shell metacharacters (`;`, `|`, `&`, `$()`, backtick, `>`, `<`) or path-traversal sequences",
|
|
3086
|
+
"EPMM application log entries showing parameter-validation failures immediately preceding a child-process spawn from the EPMM service account"
|
|
3087
|
+
],
|
|
3088
|
+
"behavioral": [
|
|
3089
|
+
"EPMM service account spawning shells (bash, sh, cmd.exe, powershell.exe) without a corresponding operator console session in the application audit log",
|
|
3090
|
+
"Outbound connection from the EPMM host to a non-vendor, non-Apple/Google/Microsoft destination within seconds of an admin-console parameter-validation failure log entry",
|
|
3091
|
+
"EPMM admin-account session originating from a source IP not in the operator's admin-IP allowlist AND issuing requests to the affected management endpoint"
|
|
3092
|
+
],
|
|
3093
|
+
"credential_paths_scanned": [
|
|
3094
|
+
"EPMM application database connection strings stored on the host (typically /opt/ivanti/* or C:\\Program Files\\Ivanti\\*)",
|
|
3095
|
+
"EPMM TLS private keys and APNs / FCM push credentials reachable from the EPMM service account"
|
|
3096
|
+
],
|
|
3097
|
+
"version_exposure": [
|
|
3098
|
+
"EPMM installed version below 12.6.1.1 / 12.7.0.1 / 12.8.0.1 AND admin console reachable from the network the attacker can reach"
|
|
3099
|
+
]
|
|
3100
|
+
},
|
|
3101
|
+
"last_updated": "2026-05-15",
|
|
3102
|
+
"discovery_attribution_note": "Internal Ivanti product-security discovery; vendor advisory + CISA KEV listing jointly published 2026-05-07 with a 3-day due date reflecting confirmed in-wild exploitation. No AI-tool credit. Source: https://forums.ivanti.com/s/article/Security-Advisory-EPMM-CVE-2026-6973 and https://www.helpnetsecurity.com/2026/05/08/ivanti-epmm-zero-day-cve-2026-6973/."
|
|
3103
|
+
},
|
|
3104
|
+
"CVE-2026-42897": {
|
|
3105
|
+
"_draft": true,
|
|
3106
|
+
"_auto_imported": true,
|
|
3107
|
+
"name": "Microsoft Exchange OWA Stored XSS / Spoofing Zero-Day",
|
|
3108
|
+
"type": "stored-xss",
|
|
3109
|
+
"cvss_score": 8.1,
|
|
3110
|
+
"cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
|
|
3111
|
+
"cisa_kev": true,
|
|
3112
|
+
"cisa_kev_date": "2026-05-15",
|
|
3113
|
+
"cisa_kev_due_date": "2026-06-05",
|
|
3114
|
+
"poc_available": true,
|
|
3115
|
+
"poc_description": "Microsoft Security Response Center confirmed in-wild exploitation observed prior to disclosure. The vulnerability is a stored XSS triggered during OWA's web-page generation when rendering attacker-crafted email content; the payload executes in the victim's authenticated OWA session, enabling token theft, mailbox-wide access, and OWA-mediated spoofing of further internal mail. No patch was available at disclosure — Microsoft directed operators to enable the Exchange Emergency Mitigation Service (EEMS) for vendor-pushed mitigation rules.",
|
|
3116
|
+
"ai_discovered": false,
|
|
3117
|
+
"ai_discovery_source": "vendor_research",
|
|
3118
|
+
"ai_discovery_notes": "Microsoft MSRC discovery from in-wild attack telemetry; no AI-tool credit in the MSRC blog post or downstream BleepingComputer coverage. Classed as vendor_research per Hard Rule #1.",
|
|
3119
|
+
"ai_assisted_weaponization": false,
|
|
3120
|
+
"ai_assisted_notes": "No AI-assisted exploit development reported. The XSS primitive is conventional; novelty is in the OWA-page-generation context where the payload renders against the victim's auth context.",
|
|
3121
|
+
"active_exploitation": "confirmed",
|
|
3122
|
+
"active_exploitation_notes": "Microsoft MSRC blog explicitly states observed in-the-wild exploitation prior to disclosure. CISA KEV listing same-day (2026-05-15) reflects federal-relevant exploitation evidence. Threat-actor profile not publicly attributed at disclosure.",
|
|
3123
|
+
"affected": "Microsoft Exchange Server SE RTM, Exchange Server 2019, Exchange Server 2016 on-premise deployments. Exchange Online (Microsoft 365 / cloud-hosted Exchange) is NOT affected — the vulnerable code path lives in the on-premise OWA rendering pipeline. Operational footprint covers a large fraction of enterprise + government on-prem Exchange installations.",
|
|
3124
|
+
"affected_versions": [
|
|
3125
|
+
"Microsoft Exchange Server SE RTM (all CUs prior to the post-disclosure fix)",
|
|
3126
|
+
"Microsoft Exchange Server 2019 (all CUs prior to the post-disclosure fix)",
|
|
3127
|
+
"Microsoft Exchange Server 2016 (all CUs prior to the post-disclosure fix)"
|
|
3128
|
+
],
|
|
3129
|
+
"vector": "An attacker sends a crafted email to any mailbox hosted on the affected Exchange Server. When the recipient opens the message in Outlook on the Web (OWA), Exchange's OWA page-generation pipeline renders the attacker-controlled content without sanitizing a specific element class, allowing stored XSS to execute in the recipient's authenticated OWA session. The payload can spoof internal mail, exfiltrate session tokens, and read/modify the victim's mailbox via OWA APIs.",
|
|
3130
|
+
"complexity": "low",
|
|
3131
|
+
"complexity_notes": "Single crafted email triggers the chain on victim's first OWA render. No additional auth or interaction beyond opening the message. Operationally the limiter is OWA usage — operators whose users access mail exclusively via Outlook desktop (MAPI / RPC over HTTPS) are less exposed than browser-OWA-heavy organizations.",
|
|
3132
|
+
"patch_available": false,
|
|
3133
|
+
"patch_required_reboot": false,
|
|
3134
|
+
"live_patch_available": false,
|
|
3135
|
+
"live_patch_tools": [],
|
|
3136
|
+
"live_patch_notes": "No patch available at disclosure. Microsoft directs operators to enable Exchange Emergency Mitigation Service (EEMS) which receives vendor-pushed mitigation rules without requiring an Exchange service restart. EEMS is a workaround, not a patch — the vulnerable code path remains present; EEMS rules filter the attack pattern. Both patch_available and live_patch_available are recorded as false to reflect the absence of true remediation at intake; refresh once a binary fix is released.",
|
|
3137
|
+
"vendor_update_paths": [
|
|
3138
|
+
"Enable Exchange Emergency Mitigation Service (EEMS) — receives vendor-pushed mitigation rules within hours of MSRC release. Operator-side: confirm `Get-MitigationsApplied` shows current rules.",
|
|
3139
|
+
"Restrict OWA access to known-good source IPs / VPN-attached endpoints via published-protocol rules in Exchange or a reverse proxy until a binary fix ships.",
|
|
3140
|
+
"Once Microsoft releases the binary CU, install via standard Exchange-update path; Exchange service restart required."
|
|
3141
|
+
],
|
|
3142
|
+
"framework_control_gaps": {
|
|
3143
|
+
"NIST-800-53-SI-2": "SI-2 patch-management SLA is undefined when no patch exists. EEMS-style vendor-pushed mitigation rules occupy an awkward gap between 'compensating control' and 'patch'; federal frameworks do not name this class explicitly.",
|
|
3144
|
+
"NIST-800-53-SC-7": "Boundary protection — restricting OWA exposure is the operational mitigation path but framework's web-application boundary controls don't address email-delivered XSS-in-OWA-rendering as a distinct class.",
|
|
3145
|
+
"NIS2-Art21-incident-handling": "24-hour incident-notification window applies if exploitation is confirmed in operator's environment. Mitigation-only state during the patch gap complicates the 'remediation timeline' field on the notification.",
|
|
3146
|
+
"DORA-Art-9": "Financial-services ICT third-party risk does not differentiate between vendor-supplied binary patch and vendor-supplied mitigation-rule path during a true zero-day.",
|
|
3147
|
+
"EU-CRA-Art13": "Cyber Resilience Act vendor-vulnerability-handling requirement is in awkward territory when the vendor releases a mitigation-rule update but not a binary fix — the rule pushes the burden of 'fix' onto the operator's EEMS-enablement state."
|
|
3148
|
+
},
|
|
3149
|
+
"atlas_refs": [],
|
|
3150
|
+
"attack_refs": [
|
|
3151
|
+
"T1190",
|
|
3152
|
+
"T1566",
|
|
3153
|
+
"T1078"
|
|
3154
|
+
],
|
|
3155
|
+
"rwep_score": 93,
|
|
3156
|
+
"rwep_factors": {
|
|
3157
|
+
"cisa_kev": 25,
|
|
3158
|
+
"poc_available": 20,
|
|
3159
|
+
"ai_factor": 0,
|
|
3160
|
+
"active_exploitation": 20,
|
|
3161
|
+
"blast_radius": 28,
|
|
3162
|
+
"patch_available": 0,
|
|
3163
|
+
"live_patch_available": 0,
|
|
3164
|
+
"reboot_required": 0
|
|
3165
|
+
},
|
|
3166
|
+
"rwep_notes": "P0 — KEV-listed zero-day with no binary patch at disclosure. blast_radius=28 reflects the global on-prem Exchange footprint. The 0 patch_available factor (no negative offset) is what drives the unusually high RWEP relative to most KEV-listed entries; operators cannot apply the standard -15 patch credit because there is no patch to apply. EEMS-based mitigation is captured in vendor_update_paths but does not satisfy live_patch_available (mitigation rule, not a code-path fix).",
|
|
3167
|
+
"epss_score": null,
|
|
3168
|
+
"epss_date": "2026-05-15",
|
|
3169
|
+
"epss_note": "EPSS score not available at same-day intake. Refresh via `exceptd refresh --source epss` once FIRST publishes.",
|
|
3170
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-42897",
|
|
3171
|
+
"cwe_refs": [
|
|
3172
|
+
"CWE-79"
|
|
3173
|
+
],
|
|
3174
|
+
"source_verified": "2026-05-15",
|
|
3175
|
+
"verification_sources": [
|
|
3176
|
+
"https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498",
|
|
3177
|
+
"https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/"
|
|
3178
|
+
],
|
|
3179
|
+
"vendor_advisories": [
|
|
3180
|
+
{
|
|
3181
|
+
"vendor": "Microsoft MSRC",
|
|
3182
|
+
"advisory_id": "CVE-2026-42897",
|
|
3183
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897",
|
|
3184
|
+
"severity": "high",
|
|
3185
|
+
"published_date": "2026-05-15"
|
|
3186
|
+
},
|
|
3187
|
+
{
|
|
3188
|
+
"vendor": "Microsoft Exchange Team Blog",
|
|
3189
|
+
"advisory_id": null,
|
|
3190
|
+
"url": "https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498",
|
|
3191
|
+
"severity": "high",
|
|
3192
|
+
"published_date": "2026-05-15"
|
|
3193
|
+
},
|
|
3194
|
+
{
|
|
3195
|
+
"vendor": "CISA KEV",
|
|
3196
|
+
"advisory_id": null,
|
|
3197
|
+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
3198
|
+
"severity": "high",
|
|
3199
|
+
"published_date": "2026-05-15"
|
|
3200
|
+
}
|
|
3201
|
+
],
|
|
3202
|
+
"iocs": {
|
|
3203
|
+
"payload_artifacts": [
|
|
3204
|
+
"Inbound email to an on-prem Exchange-hosted mailbox containing an HTML element class flagged by EEMS rule pushed 2026-05-15 — operators with EEMS enabled get the exact payload signature in Get-MitigationsApplied output",
|
|
3205
|
+
"OWA-rendered message body executing JavaScript not present in any other message from the same sender — XSS-payload-in-mail-body signature"
|
|
3206
|
+
],
|
|
3207
|
+
"behavioral": [
|
|
3208
|
+
"OWA session token observed in use from a source IP not seen in the user's prior 90-day OWA access baseline, within minutes of the user opening a message from an external sender",
|
|
3209
|
+
"OWA mailbox-API calls (move-message, send-message, set-forwarding-rule) from a session whose initial OWA page load was the only legitimate user-initiated action — XSS-driven follow-on activity signature",
|
|
3210
|
+
"Internal mail traffic where the apparent sender is the victim user but the SMTP submission source is OWA from an unusual session — OWA-mediated spoofing signature"
|
|
3211
|
+
],
|
|
3212
|
+
"forensic_note": "Defenders should snapshot the OWA IIS logs + Exchange transport logs covering the attack window BEFORE applying EEMS rules; the EEMS rule strips the payload pattern from subsequent renders, but historical IIS log entries retain the request shape that surfaces the exploitation."
|
|
3213
|
+
},
|
|
3214
|
+
"last_updated": "2026-05-15",
|
|
3215
|
+
"discovery_attribution_note": "Microsoft MSRC discovery from in-the-wild exploitation telemetry; disclosed 2026-05-15 with concurrent CISA KEV listing and Exchange Team blog publication. No binary patch at disclosure; mitigation via Exchange Emergency Mitigation Service. No AI-tool credit. Source: https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498 and https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/."
|
|
3216
|
+
},
|
|
3217
|
+
"CVE-2026-32202": {
|
|
3218
|
+
"_draft": true,
|
|
3219
|
+
"_auto_imported": true,
|
|
3220
|
+
"name": "Microsoft Windows Shell LNK Mark-of-the-Web Bypass (APT28)",
|
|
3221
|
+
"type": "protection-mechanism-failure",
|
|
3222
|
+
"cvss_score": 7.5,
|
|
3223
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
3224
|
+
"cvss_correction_note": "CVSS 7.5 is an intake-time estimate aligned with Microsoft's typical LNK-MOTW-bypass scoring; refresh once NVD publishes the authoritative vector.",
|
|
3225
|
+
"cisa_kev": true,
|
|
3226
|
+
"cisa_kev_date": "2026-04-28",
|
|
3227
|
+
"cisa_kev_due_date": "2026-05-19",
|
|
3228
|
+
"poc_available": true,
|
|
3229
|
+
"poc_description": "APT28 (Fancy Bear) in-wild weaponization of crafted LNK files that bypass Windows' Mark-of-the-Web protection. The exploitation chain pairs CVE-2026-32202 with CVE-2026-21513 to convert a downloaded LNK file into a SmartScreen-suppressed execution path. The chain represents an incomplete-patch class — CVE-2026-21510 attempted to close the same MOTW-bypass surface but did so incompletely, enabling the CVE-2026-32202 re-exploit primitive.",
|
|
3230
|
+
"ai_discovered": false,
|
|
3231
|
+
"ai_discovery_source": "vendor_research",
|
|
3232
|
+
"ai_discovery_notes": "APT28 weaponization discovered by Microsoft MAPP partners + Help Net Security reporting; no AI-tool credit on the defender-side discovery. Threat-actor side (APT28) is well-known nation-state tradecraft, not AI-assisted exploit development. Classed as vendor_research per Hard Rule #1.",
|
|
3233
|
+
"ai_assisted_weaponization": false,
|
|
3234
|
+
"ai_assisted_notes": "No AI-assisted exploit development reported. APT28's LNK-weaponization toolkit predates AI-assisted exploit-development tooling by years; the CVE-2026-32202 primitive is an extension of established LNK tradecraft, not an AI-discovery.",
|
|
3235
|
+
"active_exploitation": "confirmed",
|
|
3236
|
+
"active_exploitation_notes": "Microsoft + Help Net Security confirmed APT28 (Fancy Bear) in-the-wild weaponization. CISA KEV listing 2026-04-28 with standard 21-day due date 2026-05-19 reflects federal-relevant nation-state exploitation. Chains with CVE-2026-21513 and is the incomplete-patch follow-up to CVE-2026-21510.",
|
|
3237
|
+
"affected": "Microsoft Windows 10 (all supported builds), Windows 11 (all supported builds), Windows Server 2016 / 2019 / 2022 / 2025. Operational footprint is the entire Windows endpoint + server fleet on supported releases — broad-population MOTW-bypass primitive.",
|
|
3238
|
+
"affected_versions": [
|
|
3239
|
+
"Windows 10 — all supported builds prior to the 2026-04 Patch Tuesday update",
|
|
3240
|
+
"Windows 11 — all supported builds prior to the 2026-04 Patch Tuesday update",
|
|
3241
|
+
"Windows Server 2016 / 2019 / 2022 / 2025 — all supported builds prior to the 2026-04 Patch Tuesday update"
|
|
3242
|
+
],
|
|
3243
|
+
"vector": "An attacker delivers a crafted LNK file via phishing email, drive-by download, or removable-media plant. When the victim interacts with the LNK (typically a double-click), Windows Shell processes the shortcut and fails to enforce the Mark-of-the-Web origin tag, suppressing the SmartScreen download-origin warning that would normally prompt the user. The LNK target executes with the user's normal privileges; combined with CVE-2026-21513 the chain reaches code execution paths that bypass SmartScreen reputation checks entirely.",
|
|
3244
|
+
"complexity": "low",
|
|
3245
|
+
"complexity_notes": "LNK weaponization is a commodity primitive for nation-state actors; the bypass component is a one-bit MOTW-flag suppression. User interaction is required (the victim must open the LNK) — operationally APT28-grade phishing lures clear this bar reliably.",
|
|
3246
|
+
"patch_available": true,
|
|
3247
|
+
"patch_required_reboot": true,
|
|
3248
|
+
"live_patch_available": false,
|
|
3249
|
+
"live_patch_tools": [],
|
|
3250
|
+
"live_patch_notes": "Standard Windows servicing path; April 2026 Patch Tuesday cumulative update closes the bypass. No live-patch primitive for shell-layer code; reboot is required to land the kernel + shell components of the update.",
|
|
3251
|
+
"vendor_update_paths": [
|
|
3252
|
+
"Install April 2026 Patch Tuesday cumulative update (KB matching the affected Windows build); reboot required.",
|
|
3253
|
+
"Operator-side temporary mitigation: enforce Attack Surface Reduction (ASR) rule 'Block executable files from running unless they meet a prevalence, age, or trusted list criterion' to blunt LNK-delivered second-stage payloads while patches stage.",
|
|
3254
|
+
"Operator-side temporary mitigation: SmartScreen / WDAC policies that block LNK files from the Downloads folder and email-attachment quarantine paths."
|
|
3255
|
+
],
|
|
3256
|
+
"framework_control_gaps": {
|
|
3257
|
+
"NIST-800-53-SI-3": "Malicious-code protection (AV / SmartScreen / WDAC) is the standard control for LNK-bypass class; framework does not name MOTW-flag enforcement as a distinct sub-control.",
|
|
3258
|
+
"NIST-800-53-SC-44": "Detonation chambers (sandboxes) are the framework's nominal answer for LNK-delivered payloads; SC-44 does not address the MOTW-enforcement bypass that nullifies the user-facing warning prompt.",
|
|
3259
|
+
"NIST-800-53-SI-2": "30-day SI-2 SLA insufficient for KEV-listed nation-state-weaponized LNK-MOTW-bypass on the global Windows fleet; KEV due 2026-05-19 (21 days) tightens but does not align.",
|
|
3260
|
+
"ISO-27001-2022-A.8.7": "Malicious-code protection controls don't address incomplete-patch re-exploit class (CVE-2026-32202 as the re-exploit of CVE-2026-21510's incomplete fix).",
|
|
3261
|
+
"CIS-Controls-v8-10.1": "Malware defense controls assume MOTW + SmartScreen prompt enforcement; the bypass class voids the user-facing prompt without changing the MOTW flag at rest."
|
|
3262
|
+
},
|
|
3263
|
+
"atlas_refs": [],
|
|
3264
|
+
"attack_refs": [
|
|
3265
|
+
"T1190",
|
|
3266
|
+
"T1059",
|
|
3267
|
+
"T1566",
|
|
3268
|
+
"T1027"
|
|
3269
|
+
],
|
|
3270
|
+
"rwep_score": 85,
|
|
3271
|
+
"rwep_factors": {
|
|
3272
|
+
"cisa_kev": 25,
|
|
3273
|
+
"poc_available": 20,
|
|
3274
|
+
"ai_factor": 0,
|
|
3275
|
+
"active_exploitation": 20,
|
|
3276
|
+
"blast_radius": 30,
|
|
3277
|
+
"patch_available": -15,
|
|
3278
|
+
"live_patch_available": 0,
|
|
3279
|
+
"reboot_required": 5
|
|
3280
|
+
},
|
|
3281
|
+
"rwep_notes": "P0 — KEV-listed nation-state-weaponized MOTW-bypass on the global Windows fleet. blast_radius=30 reflects the universal Windows-endpoint footprint (no narrowing config filter — every supported Windows build is in scope). The +5 reboot_required factor reflects the operational reality that Windows fleet reboot is the limiter on patch landing.",
|
|
3282
|
+
"epss_score": null,
|
|
3283
|
+
"epss_date": "2026-05-15",
|
|
3284
|
+
"epss_note": "EPSS score not yet refreshed at intake; refresh via `exceptd refresh --source epss`. APT28-class weaponization typically drives EPSS rapidly upward once FIRST observes scanning.",
|
|
3285
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-32202",
|
|
3286
|
+
"cwe_refs": [
|
|
3287
|
+
"CWE-345",
|
|
3288
|
+
"CWE-353"
|
|
3289
|
+
],
|
|
3290
|
+
"source_verified": "2026-05-15",
|
|
3291
|
+
"verification_sources": [
|
|
3292
|
+
"https://www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/",
|
|
3293
|
+
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202",
|
|
3294
|
+
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
|
|
3295
|
+
],
|
|
3296
|
+
"vendor_advisories": [
|
|
3297
|
+
{
|
|
3298
|
+
"vendor": "Microsoft MSRC",
|
|
3299
|
+
"advisory_id": "CVE-2026-32202",
|
|
3300
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202",
|
|
3301
|
+
"severity": "high",
|
|
3302
|
+
"published_date": "2026-04-28"
|
|
3303
|
+
},
|
|
3304
|
+
{
|
|
3305
|
+
"vendor": "CISA KEV",
|
|
3306
|
+
"advisory_id": null,
|
|
3307
|
+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
3308
|
+
"severity": "high",
|
|
3309
|
+
"published_date": "2026-04-28"
|
|
3310
|
+
}
|
|
3311
|
+
],
|
|
3312
|
+
"iocs": {
|
|
3313
|
+
"payload_artifacts": [
|
|
3314
|
+
"LNK files delivered via email attachment, archive payload (zip / iso / img), or drive-by download whose target path resolves to a non-system executable AND whose Zone.Identifier alternate-data-stream is present-but-suppressed at Shell-resolve time",
|
|
3315
|
+
"LNK files whose target arguments contain LOLBin paths (rundll32.exe, regsvr32.exe, mshta.exe, wscript.exe, cscript.exe, conhost.exe) — APT28 weaponization signature",
|
|
3316
|
+
"LNK target path containing UNC reference (\\\\<attacker-host>\\<share>\\<file>) — staged-execution via SMB pull"
|
|
3317
|
+
],
|
|
3318
|
+
"behavioral": [
|
|
3319
|
+
"explorer.exe spawning a LOLBin (rundll32 / regsvr32 / mshta / wscript / cscript) where the parent context is a Shell LNK-execute AND the LNK origin path is in {Downloads, %TEMP%, %APPDATA%\\Local\\Temp, archive-extraction temp paths}",
|
|
3320
|
+
"SmartScreen log entry showing a download-class file executed without a corresponding user-prompt event in the SmartScreen telemetry — MOTW-suppression signature",
|
|
3321
|
+
"APT28-attributed C2 infrastructure (rotation of domains and IPs published by Microsoft + CISA + Mandiant) contacted shortly after explorer.exe spawns a child process from a recently-downloaded LNK"
|
|
3322
|
+
],
|
|
3323
|
+
"version_exposure": [
|
|
3324
|
+
"Windows build number below the April 2026 Patch Tuesday update AND user environment includes routine receipt of email attachments or removable-media interaction"
|
|
3325
|
+
]
|
|
3326
|
+
},
|
|
3327
|
+
"last_updated": "2026-05-15",
|
|
3328
|
+
"discovery_attribution_note": "APT28 (Fancy Bear) in-the-wild weaponization observed by Microsoft + Help Net Security 2026-04-28; CVE-2026-32202 represents an incomplete-patch re-exploit of CVE-2026-21510 and chains with CVE-2026-21513 in the operational APT28 toolkit. Nation-state tradecraft; no AI-tool credit on either the discovery or weaponization side. Source: https://www.helpnetsecurity.com/2026/04/29/windows-cve-2026-32202-exploited/ and https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202."
|
|
3329
|
+
},
|
|
3330
|
+
"CVE-2026-33825": {
|
|
3331
|
+
"_draft": true,
|
|
3332
|
+
"_auto_imported": true,
|
|
3333
|
+
"name": "BlueHammer — Microsoft Defender File-Remediation TOCTOU LPE",
|
|
3334
|
+
"type": "race-condition",
|
|
3335
|
+
"cvss_score": 7.8,
|
|
3336
|
+
"cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
3337
|
+
"cisa_kev": true,
|
|
3338
|
+
"cisa_kev_date": "2026-04-22",
|
|
3339
|
+
"cisa_kev_due_date": "2026-05-06",
|
|
3340
|
+
"poc_available": true,
|
|
3341
|
+
"poc_description": "Picus Security 'BlueHammer' / RedSun published a working PoC BEFORE Microsoft released the patch — true zero-day disclosure. The race window is in Defender's file-remediation logic: after Defender flags a malicious file, the remediation step opens the path-to-quarantine sequence non-atomically, and an attacker-controlled junction / symlink swap during the TOCTOU window redirects the remediation operation against a SYSTEM-owned file, producing an arbitrary-file-overwrite primitive that escalates to SYSTEM via standard overwrite-to-LPE techniques.",
|
|
3342
|
+
"ai_discovered": false,
|
|
3343
|
+
"ai_discovery_source": "vendor_research",
|
|
3344
|
+
"ai_discovery_notes": "Discovery by Picus Security research team (the BlueHammer / RedSun writeup); no AI-tool credit in their blog post. Conventional Windows-Defender internals research. Classed as vendor_research per Hard Rule #1 (Picus is a third-party security-research firm, not a model-discovery tool).",
|
|
3345
|
+
"ai_assisted_weaponization": false,
|
|
3346
|
+
"ai_assisted_notes": "No AI-assisted exploit development. The race-window primitive is conventional TOCTOU race-condition exploitation; the novelty is the target (Defender's remediation pipeline) not the technique.",
|
|
3347
|
+
"active_exploitation": "confirmed",
|
|
3348
|
+
"active_exploitation_notes": "Picus published a working PoC before Microsoft released a patch — this is the textbook 'public exploit before patch' true-zero-day scenario. CISA KEV listing 2026-04-22 with a 14-day due date (2026-05-06) reflects the unusual urgency. In-wild exploitation observed by Microsoft + Picus telemetry within hours of PoC publication.",
|
|
3349
|
+
"affected": "Microsoft Windows 10 / 11 endpoints with Microsoft Defender Antivirus enabled — the global Defender-enabled Windows fleet. Includes fully-patched Windows hosts where the only mitigation is the Defender platform update, not the Windows OS update. Picus PoC reproduces on fully-patched Windows 11 with current Defender signatures.",
|
|
3350
|
+
"affected_versions": [
|
|
3351
|
+
"Microsoft Defender Antivirus on Windows 10 / 11 — platform versions prior to the post-disclosure platform update (typically 4.18.2604.x and later carry the fix)",
|
|
3352
|
+
"Microsoft Defender file-remediation engine versions prior to the post-disclosure remediation-pipeline rewrite"
|
|
3353
|
+
],
|
|
3354
|
+
"vector": "An unprivileged local attacker drops a file that Defender's real-time-protection engine flags for remediation. During the gap between Defender's identify-as-malicious decision and its quarantine-the-file action, the attacker swaps the path with a directory junction / symlink pointing at a SYSTEM-owned target. Defender then performs the remediation (move-to-quarantine / overwrite-with-stub) against the SYSTEM-owned file, granting the attacker an arbitrary-file-overwrite primitive that escalates to SYSTEM via standard 'write controlled bytes to SYSTEM-only path' techniques (DLL planting on PATH precedence, scheduled-task XML overwrite, service-binary path overwrite).",
|
|
3355
|
+
"complexity": "moderate",
|
|
3356
|
+
"complexity_notes": "TOCTOU race-condition exploitation requires winning the window between Defender's detect and remediate steps. Picus PoC documents the window as wide enough to win deterministically on standard endpoint hardware; race-tuning needed only on heavily-loaded or virtualized hosts. AC:H in CVSS reflects this race-tuning requirement.",
|
|
3357
|
+
"patch_available": true,
|
|
3358
|
+
"patch_required_reboot": false,
|
|
3359
|
+
"live_patch_available": true,
|
|
3360
|
+
"live_patch_tools": [
|
|
3361
|
+
"Microsoft Defender platform update (delivered via Defender's auto-update channel; no Windows reboot required — Defender restarts its own service on update)",
|
|
3362
|
+
"Operator-side temporary mitigation: configure Defender exclusions to skip user-writable directories where the race primitive lands (workaround only; not a defense if attacker can write to non-excluded paths)"
|
|
3363
|
+
],
|
|
3364
|
+
"vendor_update_paths": [
|
|
3365
|
+
"Microsoft Defender platform auto-update channel (preferred; deploys without operator action on default-configured endpoints)",
|
|
3366
|
+
"Manual Defender platform update via Get-MpComputerStatus + Update-MpSignature on hosts where auto-update is restricted by policy"
|
|
3367
|
+
],
|
|
3368
|
+
"framework_control_gaps": {
|
|
3369
|
+
"NIST-800-53-SI-3": "Malicious-code protection controls assume the malicious-code-protection AGENT (Defender) is itself trustworthy; the BlueHammer class trades the AV's elevated remediation context for an LPE primitive — SI-3 does not anticipate the AV being the exploit primitive.",
|
|
3370
|
+
"NIST-800-53-AC-6": "Least privilege presumes a clean separation between unprivileged user code and SYSTEM-context services; AV-mediated TOCTOU breaks the assumption that AV remediation paths cannot be coerced by unprivileged users.",
|
|
3371
|
+
"NIST-800-53-SI-2": "Public exploit before patch — SI-2 30-day SLA insufficient; KEV due 2026-05-06 (14 days) reflects the public-exploit-before-patch urgency.",
|
|
3372
|
+
"ISO-27001-2022-A.8.7": "Malicious-code protection controls do not name the 'AV agent as exploit primitive' class.",
|
|
3373
|
+
"CIS-Controls-v8-10.1": "Malware defense controls treat the AV as a defense, not as an attack surface; the AV-platform-update path is the operator's only true remediation here."
|
|
3374
|
+
},
|
|
3375
|
+
"atlas_refs": [],
|
|
3376
|
+
"attack_refs": [
|
|
3377
|
+
"T1068",
|
|
3378
|
+
"T1078"
|
|
3379
|
+
],
|
|
3380
|
+
"rwep_score": 68,
|
|
3381
|
+
"rwep_factors": {
|
|
3382
|
+
"cisa_kev": 25,
|
|
3383
|
+
"poc_available": 20,
|
|
3384
|
+
"ai_factor": 0,
|
|
3385
|
+
"active_exploitation": 20,
|
|
3386
|
+
"blast_radius": 28,
|
|
3387
|
+
"patch_available": -15,
|
|
3388
|
+
"live_patch_available": -10,
|
|
3389
|
+
"reboot_required": 0
|
|
3390
|
+
},
|
|
3391
|
+
"rwep_notes": "P1 — KEV-listed true-zero-day (public exploit before patch) targeting the Defender platform on the global Windows-with-Defender fleet. blast_radius=28 reflects the Defender-enabled Windows population (smaller than the full Windows fleet by the slice running third-party AV instead of Defender). live_patch_available=true reflects Defender's auto-update channel, which lands the fix without a Windows reboot.",
|
|
3392
|
+
"epss_score": null,
|
|
3393
|
+
"epss_date": "2026-05-15",
|
|
3394
|
+
"epss_note": "EPSS score not yet refreshed at intake; refresh via `exceptd refresh --source epss`. Public-exploit-before-patch class typically scores high on EPSS within 48 hours of FIRST observation.",
|
|
3395
|
+
"epss_source": "https://api.first.org/data/v1/epss?cve=CVE-2026-33825",
|
|
3396
|
+
"cwe_refs": [
|
|
3397
|
+
"CWE-362"
|
|
3398
|
+
],
|
|
3399
|
+
"source_verified": "2026-05-15",
|
|
3400
|
+
"verification_sources": [
|
|
3401
|
+
"https://www.picussecurity.com/resource/blog/bluehammer-redsun-windows-defender-cve-2026-33825-zero-day-vulnerability-explained",
|
|
3402
|
+
"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825",
|
|
3403
|
+
"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
|
|
3404
|
+
],
|
|
3405
|
+
"vendor_advisories": [
|
|
3406
|
+
{
|
|
3407
|
+
"vendor": "Microsoft MSRC",
|
|
3408
|
+
"advisory_id": "CVE-2026-33825",
|
|
3409
|
+
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825",
|
|
3410
|
+
"severity": "high",
|
|
3411
|
+
"published_date": "2026-04-22"
|
|
3412
|
+
},
|
|
3413
|
+
{
|
|
3414
|
+
"vendor": "Picus Security",
|
|
3415
|
+
"advisory_id": null,
|
|
3416
|
+
"url": "https://www.picussecurity.com/resource/blog/bluehammer-redsun-windows-defender-cve-2026-33825-zero-day-vulnerability-explained",
|
|
3417
|
+
"severity": "high",
|
|
3418
|
+
"published_date": "2026-04-22"
|
|
3419
|
+
},
|
|
3420
|
+
{
|
|
3421
|
+
"vendor": "CISA KEV",
|
|
3422
|
+
"advisory_id": null,
|
|
3423
|
+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
|
|
3424
|
+
"severity": "high",
|
|
3425
|
+
"published_date": "2026-04-22"
|
|
3426
|
+
}
|
|
3427
|
+
],
|
|
3428
|
+
"iocs": {
|
|
3429
|
+
"payload_artifacts": [
|
|
3430
|
+
"Files written to user-writable paths that Defender flags during real-time-protection scan, followed within milliseconds by the same path being replaced with a directory junction / symlink pointing at C:\\Windows\\System32\\* or C:\\ProgramData\\Microsoft\\Windows Defender\\* — Picus PoC race primitive signature",
|
|
3431
|
+
"Process creating a directory junction (mklink /J) or NTFS reparse point referencing a SYSTEM-owned target path within 100 ms of a Defender real-time-protection notification on the same parent directory"
|
|
3432
|
+
],
|
|
3433
|
+
"behavioral": [
|
|
3434
|
+
"Microsoft Defender process (MsMpEng.exe) performing a file-rename / file-delete / file-write operation against a SYSTEM-owned path that did NOT exist when Defender's scan started — TOCTOU race signature",
|
|
3435
|
+
"Unprivileged process spawned with SYSTEM token within seconds of a Defender remediation event in the host's Defender operational log",
|
|
3436
|
+
"Defender platform version below the post-2026-04-22 update (Get-MpComputerStatus | Select AMEngineVersion, AMProductVersion) AND host has had a real-time-protection event in the last 24 hours"
|
|
3437
|
+
],
|
|
3438
|
+
"version_exposure": [
|
|
3439
|
+
"AMProductVersion below the platform update Microsoft released in the post-disclosure window — Get-MpComputerStatus surfaces the version; auto-update channel typically lands the fix within 48 hours on default-configured endpoints"
|
|
3440
|
+
]
|
|
3441
|
+
},
|
|
3442
|
+
"last_updated": "2026-05-15",
|
|
3443
|
+
"discovery_attribution_note": "Picus Security ('BlueHammer' / RedSun research) published a working PoC before Microsoft released the patch — true zero-day disclosure 2026-04-22; CISA KEV listed same day with a 14-day due date. No AI-tool credit on the discovery; conventional Windows-Defender internals research. Source: https://www.picussecurity.com/resource/blog/bluehammer-redsun-windows-defender-cve-2026-33825-zero-day-vulnerability-explained and https://www.cisa.gov/known-exploited-vulnerabilities-catalog."
|
|
2751
3444
|
}
|
|
2752
3445
|
}
|