@blamejs/exceptd-skills 0.12.31 → 0.12.32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -587,7 +587,8 @@
587
587
  "opened_date": "2026-05-13",
588
588
  "evidence_cves": [
589
589
  "CVE-2025-53773",
590
- "CVE-2026-30615"
590
+ "CVE-2026-30615",
591
+ "CVE-2026-39987"
591
592
  ],
592
593
  "atlas_refs": [
593
594
  "AML.T0010",
@@ -756,7 +757,8 @@
756
757
  "opened_date": "2026-05-13",
757
758
  "evidence_cves": [
758
759
  "MAL-2026-3083",
759
- "CVE-2025-53773"
760
+ "CVE-2025-53773",
761
+ "CVE-2026-42897"
760
762
  ],
761
763
  "atlas_refs": [
762
764
  "AML.T0010",
@@ -1184,7 +1186,8 @@
1184
1186
  "status": "open",
1185
1187
  "opened_date": "2026-03-15",
1186
1188
  "evidence_cves": [
1187
- "CVE-2026-31431"
1189
+ "CVE-2026-31431",
1190
+ "CVE-2026-0300"
1188
1191
  ],
1189
1192
  "atlas_refs": [],
1190
1193
  "attack_refs": [
@@ -1330,7 +1333,9 @@
1330
1333
  "evidence_cves": [
1331
1334
  "CVE-2025-53773",
1332
1335
  "CVE-2026-30615",
1333
- "CVE-2026-45321"
1336
+ "CVE-2026-45321",
1337
+ "CVE-2026-39987",
1338
+ "CVE-2026-42897"
1334
1339
  ],
1335
1340
  "atlas_refs": [
1336
1341
  "AML.T0051",
@@ -1748,7 +1753,12 @@
1748
1753
  "opened_date": "2026-03-15",
1749
1754
  "evidence_cves": [
1750
1755
  "CVE-2026-31431",
1751
- "CVE-2026-43284"
1756
+ "CVE-2026-43284",
1757
+ "CVE-2026-0300",
1758
+ "CVE-2026-6973",
1759
+ "CVE-2026-42897",
1760
+ "CVE-2026-32202",
1761
+ "CVE-2026-33825"
1752
1762
  ],
1753
1763
  "atlas_refs": [],
1754
1764
  "attack_refs": [
@@ -1778,7 +1788,10 @@
1778
1788
  "real_requirement": "Malware protection must include: detection of AI API queries from unexpected processes (PROMPTFLUX indicator), behavioral analysis that doesn't rely solely on static signatures, LLM query monitoring as a security telemetry source.",
1779
1789
  "status": "open",
1780
1790
  "opened_date": "2026-02-01",
1781
- "evidence_cves": [],
1791
+ "evidence_cves": [
1792
+ "CVE-2026-32202",
1793
+ "CVE-2026-33825"
1794
+ ],
1782
1795
  "atlas_refs": [
1783
1796
  "AML.T0017"
1784
1797
  ],
@@ -3717,5 +3730,317 @@
3717
3730
  ],
3718
3731
  "verdict_when_failed": "compliance-theater"
3719
3732
  }
3733
+ },
3734
+ "NIS2-Art21-vulnerability-management": {
3735
+ "framework": "EU NIS2 Directive (2022/2555)",
3736
+ "control_id": "Art. 21(2)(c)",
3737
+ "control_name": "Vulnerability handling",
3738
+ "designed_for": "Vulnerability handling and disclosure for essential and important entities — generic risk-management framing aligned with the directive's all-hazards posture and incident-handling tempo.",
3739
+ "misses": [
3740
+ "No KEV-aware prioritisation — Art. 21(2)(c) treats vulnerability handling as a steady-state process, not as an incident-tempo response when CISA KEV or ENISA equivalent confirms in-wild exploitation",
3741
+ "Perimeter-firewall control-plane RCE (PAN-OS class) and on-prem mailflow XSS (Exchange OWA class) are not enumerated as distinct vulnerability classes deserving accelerated handling",
3742
+ "Mitigation-rule-without-binary-patch state (Exchange EEMS, Defender platform-rule push) sits in an unnamed gap between 'vulnerability open' and 'vulnerability remediated' — the directive's vocabulary doesn't admit a tertiary state",
3743
+ "Vendor-disclosure-to-essential-entity-action timelines are unspecified — Art. 21(2)(c) tells operators to handle vulnerabilities but does not connect the handling clock to ENISA-EU-CVD or CISA-KEV signals"
3744
+ ],
3745
+ "real_requirement": "Vulnerability-handling procedure operationalised with a KEV-aware tier: KEV + public PoC = 4h to mitigation (binary patch, vendor mitigation rule, or operator-side isolation); KEV-without-PoC = 24h; non-KEV critical = 72h. Mitigation-rule-without-binary-patch state explicitly modelled as a tracked open finding with an SLA on conversion to binary remediation. ENISA-EU-CVD and CISA-KEV feeds are required inputs to the handling process, not optional reference material.",
3746
+ "status": "open",
3747
+ "opened_date": "2026-05-15",
3748
+ "evidence_cves": [
3749
+ "CVE-2026-0300",
3750
+ "CVE-2026-42897"
3751
+ ],
3752
+ "atlas_refs": [],
3753
+ "attack_refs": [
3754
+ "T1190",
3755
+ "T1133",
3756
+ "T1566"
3757
+ ],
3758
+ "theater_test": {
3759
+ "claim": "Our NIS2 Art. 21(2)(c) vulnerability handling covers KEV-listed and zero-day-mitigation-only conditions.",
3760
+ "test": "Pull the vulnerability-handling procedure. Confirm an explicit KEV-aware response tier (4h for KEV + public PoC). Confirm a documented state for 'vendor mitigation rule only, no binary patch' (e.g. Exchange EEMS rule active without CU). Sample 3 KEV-listed CVEs from the past 12 months affecting in-scope assets; measure time from KEV listing to verified mitigation. Theater verdict if the procedure collapses to a generic 'critical = 30 days' SLA, if the mitigation-rule-only state has no tracked SLA, or if any sampled KEV+PoC entry exceeded the documented tier.",
3761
+ "evidence_required": [
3762
+ "Art. 21(2)(c) vulnerability-handling procedure document",
3763
+ "KEV listing → mitigation timeline for sampled CVEs",
3764
+ "register of open findings in the 'mitigation-rule-only' state"
3765
+ ],
3766
+ "verdict_when_failed": "compliance-theater"
3767
+ }
3768
+ },
3769
+ "DORA-Art-9": {
3770
+ "framework": "EU DORA (Regulation 2022/2554)",
3771
+ "control_id": "Art-9",
3772
+ "control_name": "ICT risk management framework",
3773
+ "designed_for": "Sound, comprehensive and well-documented ICT risk management framework for financial entities — high-level governance posture covering ICT systems, protocols and tools used to support critical or important functions.",
3774
+ "misses": [
3775
+ "Operational vendor-patch tempo for ICT-third-party-services is not differentiated — Art. 9 treats the risk-management framework as a governance artifact, not as a tempo-bearing operational process tied to vendor-side disclosure clocks",
3776
+ "No differentiation between vendor-supplied binary patch path and vendor-supplied mitigation-rule path during a true zero-day (Exchange EEMS class) — the framework presumes 'patch' is the unit of remediation",
3777
+ "Perimeter-firewall vendor patch path (PAN-OS reboot-required) versus operator-side feature-disable mitigation path is undifferentiated — both compress into 'vendor management' without operational-tempo distinction",
3778
+ "ICT-third-party-services concentration on a single vendor's emergency-mitigation channel (e.g. Microsoft EEMS, Palo Alto dynamic-updates) is not flagged as a concentration risk under Art. 28's lens because Art. 9 doesn't connect to it"
3779
+ ],
3780
+ "real_requirement": "ICT risk-management framework operationalised with: (a) vendor-disclosure-to-action SLA per ICT-third-party-service category (perimeter network, mailflow, identity, MDM), (b) explicit state machine for 'mitigation rule active, binary patch pending' with conversion-SLA, (c) concentration-risk overlay where reliance on a single vendor's emergency mitigation channel is enumerated under Art. 28 visibility, (d) board-level reporting of open mitigation-rule-only findings affecting CIF flows.",
3781
+ "status": "open",
3782
+ "opened_date": "2026-05-15",
3783
+ "evidence_cves": [
3784
+ "CVE-2026-0300",
3785
+ "CVE-2026-42897"
3786
+ ],
3787
+ "atlas_refs": [],
3788
+ "attack_refs": [
3789
+ "T1190",
3790
+ "T1133",
3791
+ "T1566"
3792
+ ],
3793
+ "theater_test": {
3794
+ "claim": "Our DORA Art. 9 ICT risk-management framework covers vendor-patch-tempo for ICT-third-party-services supporting critical or important functions.",
3795
+ "test": "Pull the ICT risk-management framework document and the vendor-management register. Confirm a vendor-disclosure-to-action SLA tier per ICT-service category. Confirm an explicit state for 'mitigation rule active, binary patch pending' with a conversion-SLA. Sample 3 perimeter / mailflow / identity vendors; verify each appears in the Art. 28 concentration analysis when the operator relies on their emergency-mitigation channel. Theater verdict if the framework reads as governance-only without operational tempo, or if mitigation-rule-only state is absent from the register.",
3796
+ "evidence_required": [
3797
+ "Art. 9 ICT risk-management framework document",
3798
+ "vendor-management register with disclosure-to-action SLA fields",
3799
+ "Art. 28 concentration analysis for sampled vendors"
3800
+ ],
3801
+ "verdict_when_failed": "compliance-theater"
3802
+ }
3803
+ },
3804
+ "NIST-800-53-AC-3": {
3805
+ "framework": "NIST SP 800-53 Rev 5",
3806
+ "control_id": "AC-3",
3807
+ "control_name": "Access Enforcement",
3808
+ "designed_for": "Enforcement of approved authorizations for logical access to information and system resources — control mediates between AC-2 (account management) and the application surface. Presumes the access-enforcement mediator is invoked on every protected operation.",
3809
+ "misses": [
3810
+ "Missing-auth-on-WebSocket class (Marimo /terminal/ws): when the endpoint never calls the AC-3 mediator, the control is silently bypassed and audit evidence of the bypass is absent",
3811
+ "AI/ML developer-surface infrastructure (notebook servers, model hubs, dataset registries) is not enumerated as a class with heightened AC-3 scrutiny despite hosting code-execution primitives",
3812
+ "Endpoint-inventory completeness — AC-3 implementations focus on enumerated REST routes; WebSocket upgrade paths and long-lived bidirectional channels routinely escape route-coverage scans",
3813
+ "No requirement that AC-3 coverage be proven by an authenticated-route inventory diffed against a runtime-observed route set"
3814
+ ],
3815
+ "real_requirement": "AC-3 must require a per-endpoint authentication-mediator coverage inventory generated by static + runtime analysis, with explicit enumeration of WebSocket upgrade paths and bidirectional channels. AI/ML developer-surface infrastructure must be classified as 'high-risk web surface' with mandatory pre-deployment route-coverage audit. Findings of any route reaching code-execution sinks without invoking the access-enforcement mediator are recorded as AC-3 control failures.",
3816
+ "status": "open",
3817
+ "opened_date": "2026-05-15",
3818
+ "evidence_cves": [
3819
+ "CVE-2026-39987"
3820
+ ],
3821
+ "atlas_refs": [
3822
+ "AML.T0051"
3823
+ ],
3824
+ "attack_refs": [
3825
+ "T1190",
3826
+ "T1133"
3827
+ ],
3828
+ "theater_test": {
3829
+ "claim": "Our AC-3 access enforcement covers every authenticated route on AI/ML developer surfaces.",
3830
+ "test": "For each AI/ML developer-surface deployment (Marimo, Jupyter, ML model hub, dataset registry), produce a route-coverage inventory diffing the application's declared route list against runtime-observed routes (including WebSocket upgrade paths). Confirm every route reaching a code-execution sink invokes the access-enforcement mediator. Theater verdict if any deployed AI/ML developer-surface has a code-execution-reachable route absent from the coverage inventory, or if WebSocket upgrade paths are missing from the inventory entirely.",
3831
+ "evidence_required": [
3832
+ "per-deployment route-coverage inventory (static + runtime)",
3833
+ "access-enforcement mediator invocation log for one sampled route over 7 days",
3834
+ "AI/ML developer-surface asset inventory"
3835
+ ],
3836
+ "verdict_when_failed": "compliance-theater"
3837
+ }
3838
+ },
3839
+ "OWASP-LLM-Top-10-2025-LLM05": {
3840
+ "framework": "OWASP Top 10 for LLM Applications 2025",
3841
+ "control_id": "LLM05",
3842
+ "control_name": "Improper Output Handling",
3843
+ "designed_for": "Mitigating risks where LLM-generated output is consumed by downstream systems (browsers, shells, databases, tool dispatchers) without adequate validation or sanitisation. Targets the LLM-output-to-sink boundary.",
3844
+ "misses": [
3845
+ "AI/ML developer-surface infrastructure (Marimo, Jupyter, model-hub admin consoles) is not the LLM-output sink but is part of the broader AI/ML stack — LLM05 doesn't cover the notebook-server admin-surface attack class",
3846
+ "Pre-auth code-execution surfaces on AI/ML developer infrastructure (CVE-2026-39987 Marimo /terminal/ws) sit outside the LLM-output framing entirely; the OWASP LLM Top-10 scope does not extend to the developer tooling that hosts the LLM workflow",
3847
+ "Notebook-server admin surfaces routinely expose code-execution primitives (terminal, exec endpoint, kernel-restart) without authentication — class is structurally similar to LLM05 (dangerous output reaching a code-execution sink) but is the developer-tooling analogue",
3848
+ "No cross-reference to the broader AI/ML supply-chain stack: notebooks, dataset registries, model hubs, fine-tuning UIs"
3849
+ ],
3850
+ "real_requirement": "Extend LLM05 (or add a sibling control LLM05-DEV) to cover the AI/ML developer-tooling stack: notebook servers, model-hub admin consoles, dataset registry UIs, fine-tuning interfaces. Treat code-execution-reachable endpoints on these surfaces as 'output handling' analogues — any code-execution sink reachable without authentication is an LLM05-DEV control failure. Inventory mandatory for any AI/ML deployment with public network exposure.",
3851
+ "status": "open",
3852
+ "opened_date": "2026-05-15",
3853
+ "evidence_cves": [
3854
+ "CVE-2026-39987"
3855
+ ],
3856
+ "atlas_refs": [
3857
+ "AML.T0010",
3858
+ "AML.T0051"
3859
+ ],
3860
+ "attack_refs": [
3861
+ "T1190",
3862
+ "T1059"
3863
+ ],
3864
+ "theater_test": {
3865
+ "claim": "Our LLM05 controls cover the AI/ML developer-tooling stack adjacent to the LLM itself.",
3866
+ "test": "Inventory every AI/ML developer-tooling deployment (Marimo, Jupyter, ML-flow UI, fine-tuning consoles, model-hub admin). For each, enumerate code-execution-reachable endpoints (terminal, exec, kernel-restart, REST-to-shell) and confirm authentication is required on every one. Confirm an LLM05-DEV (or equivalent) policy exists naming developer-tooling code-execution surfaces as in-scope. Theater verdict if any developer-tooling deployment has a pre-auth code-execution endpoint, or if the policy treats developer tooling as 'IT infrastructure' outside LLM-security scope.",
3867
+ "evidence_required": [
3868
+ "AI/ML developer-tooling asset inventory",
3869
+ "per-deployment code-execution-endpoint authentication audit",
3870
+ "LLM05-DEV (or equivalent) policy document"
3871
+ ],
3872
+ "verdict_when_failed": "compliance-theater"
3873
+ }
3874
+ },
3875
+ "NIST-800-53-AC-6": {
3876
+ "framework": "NIST SP 800-53 Rev 5",
3877
+ "control_id": "AC-6",
3878
+ "control_name": "Least Privilege",
3879
+ "designed_for": "Limiting privileges of users and processes to the minimum required for assigned functions. Targets steady-state privilege assignment; relies on the assumption that correctly-assigned admin privileges remain bounded by application semantics.",
3880
+ "misses": [
3881
+ "Admin-credential abuse + LPE escalation patterns (Ivanti EPMM CVE-2026-6973): admin privilege is correctly assigned to a fleet-management role, but the admin-surface RCE trades that bounded-admin position for unbounded host-level code execution — AC-6's least-privilege model does not anticipate the application-admin-to-host-OS escalation path",
3882
+ "AV / EDR remediation context (Defender BlueHammer CVE-2026-33825): the AV agent's SYSTEM-context remediation privileges are correctly assigned to the AV service account, but the TOCTOU primitive allows unprivileged users to coerce that elevated context — AC-6 treats the AV process as a privilege boundary, not as a privilege-escalation oracle",
3883
+ "No requirement to inventory cross-application privilege escalation paths where bounded application admin reaches the host OS via vendor-shipped code-execution sinks",
3884
+ "Operational over-broadness — AC-6's annual privilege review focuses on user-to-role assignment, not on application-to-host privilege bridges"
3885
+ ],
3886
+ "real_requirement": "AC-6 must require periodic inventory of cross-application privilege escalation paths: for each application admin role, enumerate the application's code-execution sinks reachable to that role and the host-OS privilege those sinks invoke. AV / EDR remediation contexts must be modelled as privilege boundaries with explicit TOCTOU and coercion-resistance testing. Findings of bounded-admin-to-host-OS bridges are recorded as AC-6 control failures requiring compensating controls (host-segmentation, sandboxing, or removal of the code-execution sink).",
3887
+ "status": "open",
3888
+ "opened_date": "2026-05-15",
3889
+ "evidence_cves": [
3890
+ "CVE-2026-6973",
3891
+ "CVE-2026-33825"
3892
+ ],
3893
+ "atlas_refs": [],
3894
+ "attack_refs": [
3895
+ "T1068",
3896
+ "T1078"
3897
+ ],
3898
+ "theater_test": {
3899
+ "claim": "Our AC-6 least-privilege posture bounds application-admin authority at the host-OS boundary.",
3900
+ "test": "For each fleet-management / endpoint-management platform (MDM, EDR, AV, RMM), enumerate application admin roles and the code-execution sinks reachable to each role. For AV / EDR remediation paths, confirm TOCTOU and symlink-coercion-resistance testing in the past 12 months. Confirm a cross-application privilege-bridge register exists. Theater verdict if any application-admin role can trigger host-OS code execution without that path being enumerated in the register, or if AV / EDR remediation paths lack documented coercion-resistance testing.",
3901
+ "evidence_required": [
3902
+ "application-admin role inventory per platform",
3903
+ "cross-application privilege-bridge register",
3904
+ "AV / EDR remediation-path coercion-resistance test results"
3905
+ ],
3906
+ "verdict_when_failed": "compliance-theater"
3907
+ }
3908
+ },
3909
+ "NIS2-Art21-identity-management": {
3910
+ "framework": "EU NIS2 Directive (2022/2555)",
3911
+ "control_id": "Art. 21(2)(d)",
3912
+ "control_name": "Identity and access management",
3913
+ "designed_for": "Identity-management measures for essential and important entities — access policies, MFA, privileged-access management, joiner-mover-leaver flows. Targets ID-management posture at the application boundary.",
3914
+ "misses": [
3915
+ "Admin-control-plane compromise where the operator's MDM identity is the asset (Ivanti EPMM admin → fleet-wide device control + tenant data) is not enumerated as a distinct identity-management class",
3916
+ "Privileged-account controls assume admin-account compromise is the breach event; the EPMM-class admin-surface RCE trades that admin position for host-level compromise, expanding blast radius beyond the application boundary the ID-management framework covers",
3917
+ "Tenant-management admin identities (MDM, EDR, RMM, IdP) are not differentiated from application admin identities — the framework treats both as 'privileged account' without distinguishing the operational blast radius",
3918
+ "No requirement for tenant-admin-identity-to-application-host-escalation testing as part of the privileged-access-management lifecycle"
3919
+ ],
3920
+ "real_requirement": "Identity-management measures must enumerate tenant-management admin identities (MDM admin, EDR admin, RMM admin, IdP admin) as a distinct privileged class with: (a) per-identity blast-radius analysis covering both application-tenant scope AND host-OS escalation paths via vendor code-execution sinks, (b) quarterly tenant-admin-to-host-OS escalation testing, (c) compensating controls (host-segmentation, jump-host enforcement, hardware-token MFA) where escalation paths cannot be removed.",
3921
+ "status": "open",
3922
+ "opened_date": "2026-05-15",
3923
+ "evidence_cves": [
3924
+ "CVE-2026-6973"
3925
+ ],
3926
+ "atlas_refs": [],
3927
+ "attack_refs": [
3928
+ "T1078",
3929
+ "T1068"
3930
+ ],
3931
+ "theater_test": {
3932
+ "claim": "Our NIS2 Art. 21(2)(d) identity-management covers tenant-management admin identities with blast-radius differentiation.",
3933
+ "test": "Pull the privileged-access register. Confirm tenant-management admin identities (MDM, EDR, RMM, IdP) are enumerated as a distinct class. For each, confirm per-identity blast-radius analysis covering application-tenant scope AND host-OS escalation paths. Confirm tenant-admin-to-host-OS escalation testing in the past quarter. Theater verdict if tenant-management identities are collapsed under generic 'privileged account', or if blast-radius analysis stops at the application boundary.",
3934
+ "evidence_required": [
3935
+ "privileged-access register with tenant-management subset",
3936
+ "per-identity blast-radius analysis document",
3937
+ "tenant-admin-to-host-OS escalation test results"
3938
+ ],
3939
+ "verdict_when_failed": "compliance-theater"
3940
+ }
3941
+ },
3942
+ "ISO-27001-2022-A.8.7": {
3943
+ "framework": "ISO/IEC 27001:2022",
3944
+ "control_id": "A.8.7",
3945
+ "control_name": "Protection against malware",
3946
+ "designed_for": "Endpoint AV / EDR posture — deployment coverage, signature currency, behavioural detection, quarantine workflows. Presumes the malware-protection agent is the defence, not an attack surface.",
3947
+ "misses": [
3948
+ "EDR-is-the-vulnerability pattern (CVE-2026-33825 Defender BlueHammer): the AV agent's elevated remediation context is itself the exploit primitive — A.8.7 does not anticipate the AV being the vulnerability",
3949
+ "Incomplete-patch re-exploit class (CVE-2026-32202 as the re-exploit of CVE-2026-21510's incomplete fix): A.8.7 treats 'AV signatures current + AV platform updated' as adequacy, with no model for vendor-side incomplete-patch sequences",
3950
+ "Application-admin-surface-to-host-OS escalation paths via vendor code-execution sinks (Ivanti EPMM admin RCE) are not in A.8.7's vocabulary — the control set focuses on file-based malware, not on application-admin RCE as a malware-equivalent vector",
3951
+ "No requirement for AV / EDR agent itself to be subject to coercion-resistance testing as part of A.8.7 effectiveness evaluation"
3952
+ ],
3953
+ "real_requirement": "A.8.7 must require: (a) AV / EDR agent inclusion in the in-scope-for-pentest asset list with TOCTOU and symlink-coercion-resistance testing, (b) tracking of incomplete-patch sequences (CVE-2026-21510 → CVE-2026-32202 → ...) as a distinct finding class with explicit re-test obligation on each follow-up CVE, (c) application-admin-surface RCE explicitly named as a malware-equivalent vector with the same response tempo as classical malware detection, (d) quarterly AV / EDR coercion-resistance testing as part of A.8.7 effectiveness evaluation.",
3954
+ "status": "open",
3955
+ "opened_date": "2026-05-15",
3956
+ "evidence_cves": [
3957
+ "CVE-2026-6973",
3958
+ "CVE-2026-32202",
3959
+ "CVE-2026-33825"
3960
+ ],
3961
+ "atlas_refs": [],
3962
+ "attack_refs": [
3963
+ "T1068",
3964
+ "T1027"
3965
+ ],
3966
+ "theater_test": {
3967
+ "claim": "Our ISO 27001:2022 A.8.7 protection-against-malware controls cover the AV / EDR agent itself as an attack surface.",
3968
+ "test": "Pull the A.8.7 effectiveness-evaluation document. Confirm the AV / EDR agent is in the in-scope-for-pentest asset list. Confirm TOCTOU and symlink-coercion-resistance testing of the AV / EDR remediation path within the past 12 months. Confirm incomplete-patch sequences are tracked as a distinct finding class. Theater verdict if the AV / EDR agent appears only as 'defence', if coercion-resistance testing is absent, or if incomplete-patch sequences are handled as one-off CVEs without sequence-level tracking.",
3969
+ "evidence_required": [
3970
+ "A.8.7 effectiveness-evaluation document",
3971
+ "AV / EDR coercion-resistance test results within past 12 months",
3972
+ "incomplete-patch sequence register"
3973
+ ],
3974
+ "verdict_when_failed": "compliance-theater"
3975
+ }
3976
+ },
3977
+ "NIST-800-53-SC-44": {
3978
+ "framework": "NIST SP 800-53 Rev 5",
3979
+ "control_id": "SC-44",
3980
+ "control_name": "Detonation Chambers",
3981
+ "designed_for": "Sandboxed pre-execution analysis of files, URLs, and email attachments to detect malicious behaviour before delivery to the user endpoint. Presumes the sandbox layer observes a meaningful execution context that mirrors the eventual user environment.",
3982
+ "misses": [
3983
+ "MOTW-bypass class (CVE-2026-32202 LNK + APT28 weaponization): the sandbox layer is bypassed by the LNK file's protection-mechanism failure at the user-endpoint Shell-resolve stage, not at the sandbox detonation stage — SC-44 verdicts can be 'clean' while the endpoint-side resolution produces execution",
3984
+ "AV-as-sandbox-substitute fallacy: organisations rely on Defender's real-time-protection scanning as a sandbox-equivalent, but Defender's remediation pipeline itself can be coerced (CVE-2026-33825) — the sandbox layer is the attack surface",
3985
+ "LNK-shortcut detonation is structurally weak — sandbox typically detonates the LNK target, not the LNK's MOTW-handling code path; the bypass primitive is in the MOTW handling, invisible to target-detonation telemetry",
3986
+ "No requirement that SC-44 sandboxes test for protection-mechanism-bypass classes (MOTW, AMSI, SmartScreen) explicitly, not just observed behaviour of the detonated artifact"
3987
+ ],
3988
+ "real_requirement": "SC-44 must require: (a) explicit detonation of LNK files with verification that the sandbox observes the MOTW-enforcement code path, not only the LNK target's behaviour, (b) sandbox-quality auditing that distinguishes protection-mechanism-bypass classes from execution-behaviour anomalies, (c) compensating controls (ASR rules, WDAC policies, attachment-quarantine path enforcement) where the sandbox cannot model the user-endpoint protection-mechanism state, (d) explicit non-reliance on AV real-time-protection as a sandbox substitute when the AV itself has been a recent exploit primitive.",
3989
+ "status": "open",
3990
+ "opened_date": "2026-05-15",
3991
+ "evidence_cves": [
3992
+ "CVE-2026-32202",
3993
+ "CVE-2026-33825"
3994
+ ],
3995
+ "atlas_refs": [],
3996
+ "attack_refs": [
3997
+ "T1027",
3998
+ "T1059",
3999
+ "T1566"
4000
+ ],
4001
+ "theater_test": {
4002
+ "claim": "Our SC-44 detonation chambers cover the LNK-MOTW protection-mechanism path, not only the LNK target's behaviour.",
4003
+ "test": "Sample 10 LNK-bearing inbound messages or downloads from the past 90 days. For each, confirm the sandbox verdict includes MOTW-enforcement code-path observation (not just target detonation telemetry). Confirm compensating ASR / WDAC / SmartScreen policies are active on the user-endpoint protection-mechanism path. Confirm AV real-time-protection is not the sole sandbox substitute. Theater verdict if MOTW-enforcement code-path observation is absent from the sandbox verdicts, or if compensating controls on the endpoint protection-mechanism path are missing.",
4004
+ "evidence_required": [
4005
+ "sandbox verdict export for sampled LNK detonations",
4006
+ "endpoint ASR / WDAC / SmartScreen policy snapshot",
4007
+ "documented non-reliance on AV real-time-protection as sandbox substitute"
4008
+ ],
4009
+ "verdict_when_failed": "compliance-theater"
4010
+ }
4011
+ },
4012
+ "CIS-Controls-v8-10.1": {
4013
+ "framework": "CIS Controls v8",
4014
+ "control_id": "10.1",
4015
+ "control_name": "Deploy and Maintain Anti-Malware Software",
4016
+ "designed_for": "Deployment coverage + signature currency of anti-malware software on enterprise endpoints. Targets the deployment-and-update lifecycle; presumes a deployed-and-current AV is a functional defence.",
4017
+ "misses": [
4018
+ "MOTW / AMSI / Defender-engine bypass surface (CVE-2026-32202 LNK + APT28 weaponization): AV is deployed and current, but the protection-mechanism path is functionally evaded — deployment-coverage metrics report 'compliant' while detection is voided",
4019
+ "AV-as-exploit-primitive (CVE-2026-33825 Defender BlueHammer): the deployed AV's elevated remediation context is itself the exploit primitive — Control 10.1's deployment-coverage focus does not model the AV as an attack surface",
4020
+ "Platform-update-channel reliance: Defender platform updates close BlueHammer-class bugs without a Windows reboot; Control 10.1 doesn't differentiate between signature updates (passive) and platform updates (carry vulnerability fixes)",
4021
+ "Incomplete-patch re-exploit class (CVE-2026-32202 as the re-exploit of CVE-2026-21510's incomplete fix) is invisible to deployment-coverage metrics"
4022
+ ],
4023
+ "real_requirement": "Control 10.1 must require: (a) AV protection-mechanism path testing (MOTW enforcement, AMSI hook integrity, SmartScreen prompt enforcement) in addition to deployment-coverage and signature-currency metrics, (b) explicit tracking of AV platform-update currency as distinct from signature currency (platform updates carry vulnerability fixes), (c) AV / EDR coercion-resistance testing as part of the deployment-effectiveness evaluation, (d) incomplete-patch sequence tracking with re-test obligation on each follow-up CVE in the sequence.",
4024
+ "status": "open",
4025
+ "opened_date": "2026-05-15",
4026
+ "evidence_cves": [
4027
+ "CVE-2026-32202",
4028
+ "CVE-2026-33825"
4029
+ ],
4030
+ "atlas_refs": [],
4031
+ "attack_refs": [
4032
+ "T1027",
4033
+ "T1068"
4034
+ ],
4035
+ "theater_test": {
4036
+ "claim": "Our CIS Control 10.1 anti-malware deployment includes protection-mechanism-path testing and platform-update currency tracking.",
4037
+ "test": "Pull the anti-malware deployment report. Confirm protection-mechanism path testing (MOTW enforcement, AMSI hook integrity, SmartScreen prompt enforcement) is included alongside deployment-coverage and signature-currency metrics. Confirm AV platform-update currency is tracked as a distinct metric from signature currency. Sample 5 endpoints and verify AV / EDR coercion-resistance testing in the past 12 months. Theater verdict if deployment-coverage and signature-currency are the only reported metrics, or if platform-update currency is conflated with signature currency.",
4038
+ "evidence_required": [
4039
+ "anti-malware deployment report with protection-mechanism-path test fields",
4040
+ "AV platform-update currency metric (distinct from signature currency)",
4041
+ "AV / EDR coercion-resistance test results for sampled endpoints"
4042
+ ],
4043
+ "verdict_when_failed": "compliance-theater"
4044
+ }
3720
4045
  }
3721
4046
  }