@blamejs/exceptd-skills 0.13.2 → 0.13.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. package/AGENTS.md +41 -4
  2. package/CHANGELOG.md +73 -0
  3. package/README.md +79 -13
  4. package/bin/exceptd.js +105 -1
  5. package/data/_indexes/_meta.json +47 -47
  6. package/data/_indexes/activity-feed.json +3 -3
  7. package/data/_indexes/catalog-summaries.json +3 -3
  8. package/data/_indexes/chains.json +125 -32
  9. package/data/_indexes/frequency.json +12 -0
  10. package/data/_indexes/handoff-dag.json +127 -57
  11. package/data/_indexes/section-offsets.json +541 -487
  12. package/data/_indexes/summary-cards.json +34 -34
  13. package/data/_indexes/token-budget.json +329 -299
  14. package/data/attack-techniques.json +2 -0
  15. package/data/cve-catalog.json +99 -146
  16. package/data/cwe-catalog.json +1 -0
  17. package/data/exploit-availability.json +0 -27
  18. package/data/framework-control-gaps.json +409 -0
  19. package/data/zeroday-lessons.json +71 -89
  20. package/lib/lint-skills.js +17 -13
  21. package/lib/schemas/playbook.schema.json +5 -0
  22. package/lib/source-advisories.js +26 -0
  23. package/manifest.json +82 -82
  24. package/orchestrator/index.js +147 -2
  25. package/package.json +1 -1
  26. package/sbom.cdx.json +61 -61
  27. package/skills/age-gates-child-safety/skill.md +2 -0
  28. package/skills/ai-attack-surface/skill.md +2 -0
  29. package/skills/ai-c2-detection/skill.md +2 -0
  30. package/skills/ai-risk-management/skill.md +2 -0
  31. package/skills/api-security/skill.md +16 -4
  32. package/skills/attack-surface-pentest/skill.md +2 -0
  33. package/skills/cloud-iam-incident/skill.md +1 -1
  34. package/skills/cloud-security/skill.md +2 -0
  35. package/skills/compliance-theater/skill.md +28 -2
  36. package/skills/container-runtime-security/skill.md +2 -0
  37. package/skills/coordinated-vuln-disclosure/skill.md +1 -1
  38. package/skills/defensive-countermeasure-mapping/skill.md +2 -0
  39. package/skills/dlp-gap-analysis/skill.md +2 -0
  40. package/skills/email-security-anti-phishing/skill.md +14 -4
  41. package/skills/exploit-scoring/skill.md +30 -1
  42. package/skills/framework-gap-analysis/skill.md +28 -1
  43. package/skills/fuzz-testing-strategy/skill.md +4 -2
  44. package/skills/global-grc/skill.md +2 -0
  45. package/skills/identity-assurance/skill.md +2 -0
  46. package/skills/kernel-lpe-triage/skill.md +2 -0
  47. package/skills/mcp-agent-trust/skill.md +4 -0
  48. package/skills/mlops-security/skill.md +2 -0
  49. package/skills/ot-ics-security/skill.md +2 -0
  50. package/skills/policy-exception-gen/skill.md +28 -1
  51. package/skills/pqc-first/skill.md +2 -0
  52. package/skills/rag-pipeline-security/skill.md +2 -0
  53. package/skills/researcher/skill.md +2 -0
  54. package/skills/sector-energy/skill.md +2 -0
  55. package/skills/sector-federal-government/skill.md +2 -0
  56. package/skills/sector-financial/skill.md +2 -0
  57. package/skills/sector-healthcare/skill.md +2 -0
  58. package/skills/security-maturity-tiers/skill.md +2 -0
  59. package/skills/skill-update-loop/skill.md +2 -0
  60. package/skills/supply-chain-integrity/skill.md +2 -0
  61. package/skills/threat-model-currency/skill.md +37 -1
  62. package/skills/threat-modeling-methodology/skill.md +2 -0
  63. package/skills/webapp-security/skill.md +2 -0
  64. package/skills/zeroday-gap-learn/skill.md +33 -1
@@ -217,6 +217,7 @@
217
217
  "name": "External Remote Services",
218
218
  "version": "v19",
219
219
  "cve_refs": [
220
+ "CVE-2024-21762",
220
221
  "CVE-2026-0300",
221
222
  "CVE-2026-39987"
222
223
  ]
@@ -232,6 +233,7 @@
232
233
  "CVE-2020-10148",
233
234
  "CVE-2023-3519",
234
235
  "CVE-2024-1709",
236
+ "CVE-2024-21762",
235
237
  "CVE-2025-12686",
236
238
  "CVE-2025-53773",
237
239
  "CVE-2025-59389",
@@ -55,15 +55,16 @@
55
55
  "ai_discovery_methodology": {
56
56
  "field_added": "2026-05-15",
57
57
  "agents_md_target": "Hard Rule #7 — '41% of 2025 zero-days were AI-discovered'. Catalog target rate floor: 0.40.",
58
- "current_rate": 0.154,
59
- "current_floor_enforced_by_test": 0.15,
58
+ "current_rate": 0.132,
59
+ "current_floor_enforced_by_test": 0.13,
60
60
  "ladder_to_target": [
61
+ 0.13,
61
62
  0.15,
62
63
  0.2,
63
64
  0.3,
64
65
  0.4
65
66
  ],
66
- "floor_correction_note": "v0.12.31 (cycle 11): floor dropped from 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries (PAN-OS, Marimo, Ivanti EPMM, Exchange OWA, Windows LNK APT28, Defender BlueHammer). All six are vendor- or threat-actor-discovered; none carry an AI-tool credit per Hard Rule #1. Catalog observed rate fell from 6/30 (0.200) to 6/36 (0.167); floor is reset below the new observed rate to keep the test honest, and a new 0.15 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs.",
67
+ "floor_correction_note": "v0.13.4: floor dropped from 0.15 → 0.13 after the v0.13.4 cleanup removed two stuck-draft CVEs (MAL-2026-ANTHROPIC-MCP-STDIO duplicate of CVE-2026-30623 + CVE-2026-GTIG-AI-2FA embargoed placeholder). The GTIG entry was the only ai_discovered=true of the two; catalog observed rate fell from 6/40 (0.15) to 5/38 (0.132). Floor is reset below the new observed rate to keep the test honest, and a new 0.13 rung is prepended to the ladder so monotonic non-decreasing is preserved without rewriting prior rungs. Prior correction note: v0.12.31 floor dropped 0.20 → 0.15 after the cycle-11 intake added six ai_discovered=false entries.",
67
68
  "ladder_note": "Test floor advances when each rung is exceeded with a margin (>= floor + 0.05). Surfaces incremental tightening without coincidence-passing failures.",
68
69
  "gap_explanation": "Catalog skews toward 2024 vendor-disclosed CVEs (xz-utils, runc, CRI-O, MLflow, containerd, SolarWinds, Citrix, ConnectWise) and Pwn2Own Ireland 2025 entries (Synacktiv, DEVCORE, Summoning Team, CyCraft) where AI-tooling involvement was either not used or not credited in the public disclosure. The 41% figure in AGENTS.md Hard Rule #7 reflects the broader 2025 zero-day population reported by Google Threat Intelligence Group; catalog membership is curated against a different sampling frame (operational impact + framework-coverage need) and so will lag the population-level rate.",
69
70
  "discovery_source_enum": [
@@ -2094,149 +2095,6 @@
2094
2095
  ],
2095
2096
  "related_threats_note": "MAL-2026-TANSTACK-MINI is a Mini-Shai-Hulud-wave incident (Microsoft Security Research, 2026-05-11). The framework was open-sourced 2026-05-12 (MAL-2026-SHAI-HULUD-OSS) — TanStack predates the public release by ~24h. Same threat-actor authorship class; same registry-pivot tradecraft."
2096
2097
  },
2097
- "MAL-2026-ANTHROPIC-MCP-STDIO": {
2098
- "_draft": true,
2099
- "_quarantine": true,
2100
- "_quarantine_reason": "Duplicate of CVE-2026-30623 (Anthropic MCP SDK stdio command-injection). This entry was the pre-CVE-assignment embargoed placeholder for the OX Security MCP stdio command-injection disclosure (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); the embargo lifted with the April 2026 vendor advisory and the issue received CVE-2026-30623. Canonical id: CVE-2026-30623. Retained as _draft: true so the validator treats it as a non-failing draft warning; downstream tooling should filter on _quarantine: true and skip these entries.",
2101
- "ai_assisted_weaponization": false,
2102
- "name": "Anthropic SDK MCP STDIO command-injection (embargoed)",
2103
- "type": "command-injection",
2104
- "cvss_score": 9,
2105
- "cvss_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
2106
- "cisa_kev": false,
2107
- "cisa_kev_date": null,
2108
- "poc_available": false,
2109
- "poc_description": "Embargoed — operator-supplied configuration parameter reaches subprocess exec argv concatenation.",
2110
- "ai_discovered": false,
2111
- "active_exploitation": "unknown",
2112
- "active_exploitation_notes": "Embargoed disclosure pending vendor advisory.",
2113
- "affected": "Anthropic MCP-client STDIO transport in published SDK versions handling operator-configured server-spawn commands.",
2114
- "affected_versions": [
2115
- "anthropic-sdk pending-vendor-advisory"
2116
- ],
2117
- "vector": "MCP-client spawns server subprocess from operator config — argument parsing concatenates user-controlled fields into the exec argv via shell-like splitting rather than argv-array passing.",
2118
- "complexity": "low",
2119
- "patch_available": false,
2120
- "patch_required_reboot": false,
2121
- "live_patch_available": true,
2122
- "live_patch_tools": [
2123
- "Operator-side allowlist of MCP server configurations",
2124
- "Pin MCP server commands to immutable absolute paths",
2125
- "Disable user-provided MCP server config until vendor advisory lands"
2126
- ],
2127
- "vendor_update_paths": [
2128
- "Pending Anthropic SDK security release"
2129
- ],
2130
- "framework_control_gaps": {
2131
- "NIST-AI-RMF-MEASURE-2.7": "MCP-client trust boundary not specifically called out — operator-config-as-input is treated as platform-trusted.",
2132
- "OWASP-LLM-Top-10-2025-LLM05": "Improper output handling on LLM-side; this is the symmetric upstream — improper INPUT handling on transport side.",
2133
- "ISO-27001-2022-A.8.28": "Secure coding assumed in vendor SDKs without tooling to attest."
2134
- },
2135
- "atlas_refs": [
2136
- "AML.T0040"
2137
- ],
2138
- "attack_refs": [
2139
- "T1059"
2140
- ],
2141
- "rwep_score": 25,
2142
- "rwep_factors": {
2143
- "cisa_kev": 0,
2144
- "poc_available": 0,
2145
- "ai_factor": 0,
2146
- "active_exploitation": 5,
2147
- "blast_radius": 30,
2148
- "patch_available": 0,
2149
- "live_patch_available": -10,
2150
- "reboot_required": 0
2151
- },
2152
- "epss_score": null,
2153
- "epss_date": "2026-05-14",
2154
- "cwe_refs": [
2155
- "CWE-78",
2156
- "CWE-88"
2157
- ],
2158
- "source_verified": "2026-05-14",
2159
- "verification_sources": [
2160
- "https://docs.anthropic.com/security",
2161
- "https://modelcontextprotocol.io/"
2162
- ],
2163
- "last_updated": "2026-05-15",
2164
- "discovery_attribution_note": "Discovered by OX Security research team (Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok); part of the four-exploitation-family April 2026 MCP advisory. Named-human research; no AI-tool credited for the discovery despite the target being an AI SDK. Source: https://www.ox.security/blog/the-mother-of-all-ai-supply-chains-critical-systemic-vulnerability-at-the-core-of-the-mcp/.",
2165
- "rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
2166
- },
2167
- "CVE-2026-GTIG-AI-2FA": {
2168
- "_draft": true,
2169
- "_draft_reason": "Placeholder entry — affected product is unnamed under GTIG embargo and affected_versions is set to \"pending-disclosure\". The key itself is not a real CVE identifier (GTIG-tracked, no MITRE assignment yet). Hard Rule #1 fields cannot be verified against a vendor advisory until the embargo lifts and a real CVE id is assigned. Re-triage once GTIG/MITRE publishes the canonical id and affected-product list.",
2170
- "name": "GTIG-tracked AI-built 2FA-bypass zero-day (placeholder)",
2171
- "type": "auth-bypass",
2172
- "cvss_score": 8.1,
2173
- "cvss_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
2174
- "cisa_kev": false,
2175
- "cisa_kev_date": null,
2176
- "poc_available": false,
2177
- "poc_description": "Embargoed — GTIG 2026-05-11 report references in-the-wild exploitation by a financially motivated threat actor using AI-built exploit code targeting an unnamed enterprise 2FA service.",
2178
- "ai_discovered": true,
2179
- "ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild.",
2180
- "ai_assisted_weaponization": true,
2181
- "ai_assisted_notes": "Per GTIG attribution analysis — exploit code structure consistent with AI-generated output.",
2182
- "active_exploitation": "confirmed",
2183
- "affected": "Unnamed enterprise 2FA service per GTIG embargo; placeholder entry pending CVE assignment.",
2184
- "affected_versions": [
2185
- "pending-disclosure"
2186
- ],
2187
- "vector": "Authentication state-machine confusion — exploit payload bypasses second-factor challenge by manipulating session token at the post-primary-auth / pre-2FA-challenge boundary.",
2188
- "complexity": "moderate",
2189
- "patch_available": false,
2190
- "patch_required_reboot": false,
2191
- "live_patch_available": true,
2192
- "live_patch_tools": [
2193
- "Vendor-side rate-limiting on 2FA challenge endpoint",
2194
- "Anomaly detection on session-token mutation between auth phases",
2195
- "Out-of-band MFA fallback"
2196
- ],
2197
- "vendor_update_paths": [
2198
- "Pending vendor advisory"
2199
- ],
2200
- "framework_control_gaps": {
2201
- "NIST-AI-RMF-MEASURE-2.7": "AI-discovered + AI-built exploit class not anchored in any framework.",
2202
- "NIS2-Art21-incident-handling": "EU NIS2 incident-handling SLA does not differentiate AI-built vs human-built exploit class.",
2203
- "ISO-27001-2022-A.5.7": "Threat intelligence control does not specifically require AI-attack-development feeds.",
2204
- "FedRAMP-IA-2": "MFA requirement satisfied on paper; AI-built bypass operates at a layer below the MFA control surface.",
2205
- "EU-AI-Act-Art-15": "AI Act robustness requirement applies to AI SYSTEMS not to defending against AI-built attacks."
2206
- },
2207
- "atlas_refs": [
2208
- "AML.T0040",
2209
- "AML.T0051"
2210
- ],
2211
- "attack_refs": [
2212
- "T1078",
2213
- "T1556"
2214
- ],
2215
- "rwep_score": 55,
2216
- "rwep_factors": {
2217
- "cisa_kev": 0,
2218
- "poc_available": 0,
2219
- "ai_factor": 15,
2220
- "active_exploitation": 20,
2221
- "blast_radius": 30,
2222
- "patch_available": 0,
2223
- "live_patch_available": -10,
2224
- "reboot_required": 0
2225
- },
2226
- "epss_score": null,
2227
- "epss_date": "2026-05-14",
2228
- "cwe_refs": [
2229
- "CWE-287"
2230
- ],
2231
- "source_verified": "2026-05-14",
2232
- "verification_sources": [
2233
- "https://cloud.google.com/blog/topics/threat-intelligence/",
2234
- "https://services.google.com/fh/files/misc/gtig-2026-ai-attack-trends.pdf"
2235
- ],
2236
- "last_updated": "2026-05-15",
2237
- "discovery_attribution_note": "AI-developed zero-day per Google Threat Intelligence Group 2026-05-11 disclosure; first publicly-attributed in-the-wild AI-built zero-day exploit. GTIG assesses with high confidence that an LLM was weaponized to facilitate discovery + weaponization of a 2FA bypass in a popular open-source web administration tool. Source: https://cloud.google.com/blog/topics/threat-intelligence/ai-vulnerability-exploitation-initial-access and https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html.",
2238
- "rwep_correction_note": "v0.12.30: canonicalized rwep_factors to satisfy Shape B invariant (Σ factors === rwep_score). Prior values used non-canonical weights and/or blast_radius > 30 (over-cap). Stored rwep_score unchanged; factor block now reproducible from canonical RWEP_WEIGHTS + operational fields."
2239
- },
2240
2098
  "CVE-2026-30623": {
2241
2099
  "ai_assisted_weaponization": false,
2242
2100
  "name": "Anthropic MCP SDK stdio command-injection",
@@ -3704,5 +3562,100 @@
3704
3562
  ],
3705
3563
  "last_updated": "2026-05-17",
3706
3564
  "discovery_attribution_note": "TeamPCP threat-actor framework, not a vulnerability discovery. The framework was open-sourced 2026-05-12 on GitHub under MIT license by the same actor group responsible for the September 2025 / November 2025 / May 2026 Shai-Hulud npm-worm waves. TeamPCP self-describes the framework as \"vibe coded\" — AI-coding-assistant-mediated authoring. Adoption-side weaponization is accelerated by AI coding assistants + the BreachForums-hosted $1,000 USD bounty contest."
3565
+ },
3566
+ "CVE-2024-21762": {
3567
+ "ai_assisted_weaponization": false,
3568
+ "name": "Fortinet FortiOS / FortiProxy SSL-VPN out-of-bounds write (sslvpnd preauth RCE)",
3569
+ "type": "out-of-bounds-write-preauth-rce",
3570
+ "cvss_score": 9.8,
3571
+ "cvss_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
3572
+ "cvss_note": "NVD 9.8. Fortinet PSIRT FG-IR-24-015 advisory scored 9.6; the 0.2 delta is the scope (S:U vs S:C) interpretation. Operationally treated as 9.8 — unauthenticated network reach to the SSL-VPN web surface with code execution on the appliance.",
3573
+ "cisa_kev": true,
3574
+ "cisa_kev_date": "2024-02-09",
3575
+ "cisa_kev_due_date": "2024-02-16",
3576
+ "poc_available": true,
3577
+ "poc_description": "Multiple public PoCs published within days of Fortinet's 2024-02-08 disclosure (h4x0r-dz/CVE-2024-21762 on GitHub among the earliest). The vulnerability is an out-of-bounds write in sslvpnd reachable via a specially crafted unauthenticated HTTP request to the SSL-VPN web surface.",
3578
+ "ai_discovered": false,
3579
+ "ai_discovery_source": "vendor_research",
3580
+ "ai_discovery_notes": "Vendor-internal discovery by Fortinet PSIRT; no AI tooling credited.",
3581
+ "active_exploitation": "confirmed",
3582
+ "active_exploitation_notes": "Fortinet's 2024-02-08 advisory stated the vulnerability was 'potentially being exploited in the wild'; CISA KEV-listed the next day (2024-02-09) with a 7-day federal remediation deadline. Multiple state-aligned and ransomware-affiliate clusters subsequently observed exploiting the bug for initial access. Canadian Centre for Cyber Security joint advisory (2024) bundled CVE-2024-21762 with CVE-2022-42475 and CVE-2023-27997 as the canonical FortiGate persistent-access trio. Fortinet's 2025-04-11 advisory documented a post-exploitation technique establishing persistence on devices patched after compromise — read-only symlinks left behind in the SSL-VPN language-file directory grant ongoing filesystem read access even on fully patched firmware, requiring an additional cleanup step beyond the patch itself.",
3583
+ "affected": "Fortinet FortiOS and FortiProxy SSL-VPN feature on FortiGate appliances. Any internet-facing FortiGate with SSL-VPN enabled is in scope; FortiGates without SSL-VPN enabled are not reachable via this vector.",
3584
+ "affected_versions": [
3585
+ "fortios 7.6.0 (pre-7.6.2)",
3586
+ "fortios 7.4.0-7.4.6 (pre-7.4.7)",
3587
+ "fortios 7.2.0-7.2.10 (pre-7.2.11)",
3588
+ "fortios 7.0.0-7.0.16 (pre-7.0.17)",
3589
+ "fortios 6.4.0-6.4.15 (pre-6.4.16)",
3590
+ "fortiproxy 7.4.0-7.4.2 (pre-7.4.3)",
3591
+ "fortiproxy 7.2.0-7.2.8 (pre-7.2.9)",
3592
+ "fortiproxy 7.0.0-7.0.14 (pre-7.0.15)",
3593
+ "fortiproxy 2.0.0-2.0.13 (pre-2.0.14)"
3594
+ ],
3595
+ "vector": "Out-of-bounds write in the sslvpnd daemon's HTTP request handling. An unauthenticated remote attacker sends a specially crafted HTTP request to the SSL-VPN web surface, corrupting memory and achieving code execution as the sslvpnd process on the appliance. Workaround pre-patch: disable SSL-VPN entirely (Fortinet's recommended interim mitigation).",
3596
+ "complexity": "low",
3597
+ "complexity_notes": "Single-request exploitation, no preconditions beyond SSL-VPN being enabled and network-reachable. Public PoCs available; mass-scanning observed within hours of disclosure.",
3598
+ "patch_available": true,
3599
+ "patch_required_reboot": true,
3600
+ "live_patch_available": false,
3601
+ "live_patch_tools": [],
3602
+ "live_patch_notes": "FortiOS firmware updates require a device reboot. No live-patching primitive exists for FortiGate appliances. Fortinet's 2025-04 post-exploitation advisory adds an additional cleanup requirement on top of the firmware update — operators must follow the FortiGuard remediation steps to remove read-only symlinks left behind by attackers who compromised the device before patching.",
3603
+ "vendor_update_paths": [
3604
+ "FortiOS 7.6.2+",
3605
+ "FortiOS 7.4.7+",
3606
+ "FortiOS 7.2.11+",
3607
+ "FortiOS 7.0.17+",
3608
+ "FortiOS 6.4.16+",
3609
+ "FortiProxy 7.4.3+",
3610
+ "FortiProxy 7.2.9+",
3611
+ "FortiProxy 7.0.15+",
3612
+ "FortiProxy 2.0.14+"
3613
+ ],
3614
+ "framework_control_gaps": {
3615
+ "NIST-800-53-SI-2": "30-day patch SLA is multiple orders of magnitude longer than the observed exploitation window (hours from disclosure to mass-scanning). Reboot-required nature breaks the standard maintenance-window assumption; many operators delayed patching until the next scheduled window, extending exposure.",
3616
+ "ISO-27001-2022-A.8.8": "'Appropriate timescales' undefined; standard 30-day interpretation is unsafe for an unauthenticated preauth RCE on an internet-facing security appliance with public PoCs and confirmed in-wild exploitation.",
3617
+ "NIS2-Art21-network-security": "EU NIS2 treats VPN concentrators as essential-function infrastructure but lacks a CISA-KEV-style compressed remediation SLA. Operators in NIS2 sectors typically discovered the vulnerability via vendor advisory, not via the regulatory channel.",
3618
+ "DORA-Art-9": "ICT incident management presumes vendor-patch cadence; the appliance-reboot requirement breaks the standard SLA assumption for financial-entity SSL-VPN concentrators.",
3619
+ "UK-CAF-B4": "System security principle is silent on the operational reality that fully patched FortiGates can carry attacker persistence (symlink-based filesystem read access) seeded before the patch was applied. Patch alone is insufficient; cleanup verification is required.",
3620
+ "AU-ISM-1546": "Essential 8 patch-applications ML3 (48h) is closer to the operational reality than NIST SI-2 but still misses the mass-scanning window. Internet-facing-appliance class deserves a tighter SLA than general application patching.",
3621
+ "PCI-DSS-4.0-6.3.3": "30-day critical patch window is exploitation acceptance for an unauthenticated preauth RCE on a perimeter SSL-VPN appliance carrying CDE traffic."
3622
+ },
3623
+ "atlas_refs": [],
3624
+ "attack_refs": [
3625
+ "T1190",
3626
+ "T1133"
3627
+ ],
3628
+ "rwep_score": 85,
3629
+ "rwep_factors": {
3630
+ "cisa_kev": 25,
3631
+ "poc_available": 20,
3632
+ "ai_factor": 0,
3633
+ "active_exploitation": 20,
3634
+ "blast_radius": 30,
3635
+ "patch_available": -15,
3636
+ "live_patch_available": 0,
3637
+ "reboot_required": 5
3638
+ },
3639
+ "rwep_notes": "RWEP 85. cisa_kev (+25) + poc_available (+20) + active_exploitation confirmed (+20) + blast_radius 30 (every internet-facing FortiGate with SSL-VPN enabled — global perimeter-appliance install base, frequently used as ransomware initial-access vector through 2024-2026) - patch_available (-15) + reboot_required (+5). Live-patch credit not available — FortiOS has no live-patching primitive. Operationally exceeds the live-patching ceiling because patching requires a maintenance window; many fleets remained exposed for weeks after the patch shipped.",
3640
+ "epss_score": null,
3641
+ "epss_date": null,
3642
+ "cwe_refs": [
3643
+ "CWE-787"
3644
+ ],
3645
+ "source_verified": "2026-05-17",
3646
+ "verification_sources": [
3647
+ "https://nvd.nist.gov/vuln/detail/CVE-2024-21762",
3648
+ "https://www.fortiguard.com/psirt/FG-IR-24-015",
3649
+ "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
3650
+ "https://www.tenable.com/blog/cve-2024-21762-critical-fortinet-fortios-out-of-bound-write-ssl-vpn-vulnerability",
3651
+ "https://www.rapid7.com/blog/post/2024/02/12/etr-critical-fortinet-fortios-cve-2024-21762-exploited/",
3652
+ "https://www.huntress.com/threat-library/vulnerabilities/cve-2024-21762",
3653
+ "https://www.helpnetsecurity.com/2024/02/12/critical-fortinet-fortios-flaw-exploited-in-the-wild-cve-2024-21762/",
3654
+ "https://www.cisa.gov/news-events/alerts/2025/04/11/fortinet-releases-advisory-new-post-exploitation-technique-known-vulnerabilities",
3655
+ "https://www.cyber.gc.ca/en/alerts-advisories/compromise-persistent-access-fortinet-fortios-products-cve-2022-42475-cve-2023-27997-cve-2024-21762"
3656
+ ],
3657
+ "_draft": false,
3658
+ "last_updated": "2026-05-17",
3659
+ "discovery_attribution_note": "Vendor-internal discovery by Fortinet PSIRT, disclosed 2024-02-08 via advisory FG-IR-24-015. No external researcher byline. CISA KEV-listed 2024-02-09 with a 7-day federal remediation deadline. Post-exploitation symlink-persistence technique documented in Fortinet's 2025-04-11 advisory after operators reported residual filesystem access on devices patched after compromise."
3707
3660
  }
3708
3661
  }
@@ -1369,6 +1369,7 @@
1369
1369
  ],
1370
1370
  "evidence_cves": [
1371
1371
  "CVE-2023-3519",
1372
+ "CVE-2024-21762",
1372
1373
  "CVE-2026-0300",
1373
1374
  "CVE-2026-42945",
1374
1375
  "CVE-2026-43500",
@@ -287,33 +287,6 @@
287
287
  "last_verified": "2026-05-15",
288
288
  "verification_source": "TanStack security advisory 2026-05-11, npm advisories"
289
289
  },
290
- "MAL-2026-ANTHROPIC-MCP-STDIO": {
291
- "poc_status": "private",
292
- "poc_description": "Embargoed reproduction in vendor channel; operator-side mitigations published while CVE assignment is pending.",
293
- "weaponization_stage": "partially_weaponized",
294
- "ai_discovery_confirmed": false,
295
- "ai_discovery_source": "vendor_research",
296
- "ai_assist_factor": "moderate",
297
- "ai_assisted_weaponization": false,
298
- "exploit_complexity": "low",
299
- "active_exploitation": "unknown",
300
- "last_verified": "2026-05-15",
301
- "verification_source": "Anthropic security channel, MCP project advisory"
302
- },
303
- "CVE-2026-GTIG-AI-2FA": {
304
- "poc_status": "private",
305
- "poc_description": "Embargoed per GTIG. AI-built exploit code observed in-the-wild against an unnamed enterprise 2FA service.",
306
- "weaponization_stage": "fully_weaponized",
307
- "ai_discovery_confirmed": true,
308
- "ai_discovery_source": "threat_actor_ai_built",
309
- "ai_assist_factor": "very_high",
310
- "ai_discovery_notes": "First documented case of a fully AI-BUILT zero-day exploit observed in-the-wild — threat actor used a frontier LLM to construct the auth-state-confusion payload.",
311
- "ai_assisted_weaponization": true,
312
- "exploit_complexity": "moderate",
313
- "active_exploitation": "confirmed",
314
- "last_verified": "2026-05-15",
315
- "verification_source": "GTIG 2026-05-11 report, Google Cloud Threat Intelligence"
316
- },
317
290
  "CVE-2026-30623": {
318
291
  "poc_status": "public",
319
292
  "poc_description": "Public advisory documents the argv-string concatenation in MCP-client stdio transport; researcher-published PoC chains operator-config to shell-meta injection.",