regscale-cli 6.16.4.1__py3-none-any.whl → 6.18.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

Files changed (34) hide show
  1. regscale/__init__.py +1 -1
  2. regscale/core/app/api.py +9 -1
  3. regscale/core/app/utils/regscale_utils.py +2 -3
  4. regscale/core/login.py +3 -0
  5. regscale/dev/code_gen.py +10 -7
  6. regscale/integrations/commercial/aws/inventory/base.py +0 -2
  7. regscale/integrations/commercial/burp.py +4 -0
  8. regscale/integrations/commercial/durosuite/api.py +20 -9
  9. regscale/integrations/commercial/opentext/scanner.py +2 -2
  10. regscale/integrations/commercial/sap/sysdig/sysdig_scanner.py +40 -21
  11. regscale/integrations/commercial/sap/tenable/scanner.py +41 -15
  12. regscale/integrations/commercial/sicura/api.py +9 -1
  13. regscale/integrations/commercial/synqly/edr.py +84 -0
  14. regscale/integrations/commercial/tenablev2/click.py +24 -2
  15. regscale/integrations/commercial/tenablev2/scanner.py +1 -1
  16. regscale/integrations/scanner_integration.py +80 -27
  17. regscale/models/integration_models/cisa_kev_data.json +156 -10
  18. regscale/models/integration_models/synqly_models/capabilities.json +1 -1
  19. regscale/models/integration_models/synqly_models/connectors/__init__.py +1 -0
  20. regscale/models/integration_models/synqly_models/connectors/edr.py +137 -0
  21. regscale/models/integration_models/synqly_models/ocsf_mapper.py +61 -11
  22. regscale/models/integration_models/synqly_models/synqly_model.py +8 -5
  23. regscale/models/regscale_models/file.py +3 -1
  24. regscale/models/regscale_models/master_assessment.py +127 -0
  25. regscale/models/regscale_models/regscale_model.py +2 -4
  26. regscale/models/regscale_models/risk.py +26 -31
  27. regscale/models/regscale_models/supply_chain.py +5 -5
  28. regscale/regscale.py +2 -0
  29. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/METADATA +1 -1
  30. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/RECORD +34 -31
  31. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/LICENSE +0 -0
  32. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/WHEEL +0 -0
  33. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/entry_points.txt +0 -0
  34. {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/top_level.txt +0 -0
@@ -7,6 +7,7 @@ from concurrent.futures import wait
7
7
  from typing import TYPE_CHECKING
8
8
 
9
9
  from regscale.integrations.integration_override import IntegrationOverride
10
+ from regscale.validation.record import validate_regscale_object
10
11
 
11
12
  # Delay import of Tenable libraries
12
13
  if TYPE_CHECKING:
@@ -46,6 +47,7 @@ from regscale.core.app.utils.app_utils import (
46
47
  check_license,
47
48
  create_progress_object,
48
49
  epoch_to_datetime,
50
+ error_and_exit,
49
51
  format_dict_to_html,
50
52
  get_current_datetime,
51
53
  regscale_string_to_epoch,
@@ -124,6 +126,9 @@ def import_nessus(folder_path: click.Path, regscale_ssp_id: click.INT, scan_date
124
126
  """Import Nessus scans, vulnerabilities and assets to RegScale."""
125
127
  from regscale.integrations.commercial.nessus.scanner import NessusIntegration
126
128
 
129
+ if not validate_regscale_object(regscale_ssp_id, "securityplans"):
130
+ logger.warning("SSP #%i is not a valid RegScale Security Plan.", regscale_ssp_id)
131
+ return
127
132
  NessusIntegration.sync_assets(plan_id=regscale_ssp_id, path=folder_path)
128
133
  NessusIntegration.sync_findings(
129
134
  plan_id=regscale_ssp_id, path=folder_path, enable_finding_date_update=True, scan_date=scan_date
@@ -971,12 +976,13 @@ def gen_tsc(config: dict) -> "TenableSC":
971
976
  :return: Tenable client
972
977
  :rtype: "TenableSC"
973
978
  """
979
+ from restfly.errors import APIError
974
980
  from tenable.sc import TenableSC
975
981
 
976
982
  if not config:
977
983
  app = Application()
978
984
  config = app.config
979
- return TenableSC(
985
+ res = TenableSC(
980
986
  url=config["tenableUrl"],
981
987
  access_key=config["tenableAccessKey"],
982
988
  secret_key=config["tenableSecretKey"],
@@ -984,6 +990,11 @@ def gen_tsc(config: dict) -> "TenableSC":
984
990
  product=REGSCALE_CLI,
985
991
  build=__version__,
986
992
  )
993
+ try:
994
+ res.status.status()
995
+ except APIError:
996
+ error_and_exit("Unable to authenticate with Tenable SC. Please check your credentials.", False)
997
+ return res
987
998
 
988
999
 
989
1000
  def gen_tio(config: dict) -> "TenableIO":
@@ -995,9 +1006,10 @@ def gen_tio(config: dict) -> "TenableIO":
995
1006
  :rtype: "TenableIO"
996
1007
  """
997
1008
 
1009
+ from restfly.errors import UnauthorizedError
998
1010
  from tenable.io import TenableIO
999
1011
 
1000
- return TenableIO(
1012
+ res = TenableIO(
1001
1013
  url=config["tenableUrl"],
1002
1014
  access_key=config["tenableAccessKey"],
1003
1015
  secret_key=config["tenableSecretKey"],
@@ -1006,6 +1018,16 @@ def gen_tio(config: dict) -> "TenableIO":
1006
1018
  build=__version__,
1007
1019
  )
1008
1020
 
1021
+ try:
1022
+ # Check a quick API to make sure we have access
1023
+ res.scans.list(last_modified=datetime.now())
1024
+ except UnauthorizedError:
1025
+ error_and_exit(
1026
+ "Unable to authenticate with Tenable Vulnerability Management (IO). Please check your credentials.", False
1027
+ )
1028
+
1029
+ return res
1030
+
1009
1031
 
1010
1032
  def get_controls(catalog_id: int) -> List[Dict]:
1011
1033
  """
@@ -6,9 +6,9 @@ import datetime
6
6
  import json
7
7
  import linecache
8
8
  import logging
9
+ from pathlib import Path
9
10
  from typing import Any, Dict, Iterator, List, Optional, Tuple
10
11
 
11
- from pathlib import Path
12
12
  from tenable.errors import TioExportsError
13
13
 
14
14
  from regscale.core.app.utils.app_utils import get_current_datetime
@@ -2392,53 +2392,97 @@ class ScannerIntegration(ABC):
2392
2392
  :rtype: int
2393
2393
  """
2394
2394
  if not self.close_outdated_findings:
2395
- # This should normally be set to True, but on POAM import, we do not want to automatically close issues,
2396
- # unless the sheet specifies to do so
2397
2395
  logger.info("Skipping closing outdated issues.")
2398
2396
  return 0
2399
2397
 
2400
2398
  closed_count = 0
2401
2399
  affected_control_ids = set()
2400
+ count_lock = threading.Lock()
2402
2401
 
2403
- # Get all open issues for this security plan
2404
2402
  open_issues = regscale_models.Issue.fetch_issues_by_ssp(
2405
2403
  None, ssp_id=self.plan_id, status=regscale_models.IssueStatus.Open.value
2406
2404
  )
2407
-
2408
- # Create a progress bar
2409
2405
  task_id = self.finding_progress.add_task(
2410
2406
  f"[cyan]Analyzing {len(open_issues)} issue(s) and closing any outdated issue(s)...", total=len(open_issues)
2411
2407
  )
2412
2408
 
2413
- for issue in open_issues:
2414
- if self.should_close_issue(issue, current_vulnerabilities):
2415
- issue.status = regscale_models.IssueStatus.Closed
2416
- issue.dateCompleted = get_current_datetime()
2417
- changes_text = f"{get_current_datetime('%b %d, %Y')} - Closed by {self.title} for having no current vulnerabilities."
2418
- if issue.changes:
2419
- issue.changes += f"\n{changes_text}"
2420
- else:
2421
- issue.changes = changes_text
2422
- issue.save()
2423
- closed_count += 1
2409
+ def _process_single_issue(iss: regscale_models.Issue):
2410
+ """
2411
+ Process a single issue and update its status if necessary.
2424
2412
 
2425
- # Track affected control implementations
2426
- if issue.controlImplementationIds:
2427
- affected_control_ids.update(issue.controlImplementationIds)
2413
+ :param regscale_models.Issue iss: The issue to process
2414
+ """
2415
+ if self.should_close_issue(iss, current_vulnerabilities):
2416
+ self._close_issue(iss, count_lock, affected_control_ids)
2417
+ with count_lock:
2418
+ self.finding_progress.update(task_id, advance=1)
2428
2419
 
2429
- # Update the progress bar
2430
- self.finding_progress.update(task_id, advance=1)
2420
+ max_workers = get_thread_workers_max()
2421
+ if max_workers == 1:
2422
+ for issue in open_issues:
2423
+ _process_single_issue(issue)
2424
+ else:
2425
+ self._process_issues_multithreaded(open_issues, _process_single_issue, max_workers)
2431
2426
 
2432
- # Update status of affected control implementations
2433
2427
  for control_id in affected_control_ids:
2434
2428
  self.update_control_implementation_status_after_close(control_id)
2435
2429
 
2436
- if closed_count > 0:
2430
+ (
2437
2431
  logger.info("Closed %d outdated issues.", closed_count)
2438
- else:
2439
- logger.info("No outdated issues to close.")
2432
+ if closed_count > 0
2433
+ else logger.info("No outdated issues to close.")
2434
+ )
2440
2435
  return closed_count
2441
2436
 
2437
+ def _close_issue(self, issue: regscale_models.Issue, count_lock: threading.Lock, affected_control_ids: set):
2438
+ """
2439
+ Close an issue and update related data.
2440
+
2441
+ :param regscale_models.Issue issue: The issue to close
2442
+ :param threading.Lock count_lock: A lock to synchronize access to shared variables
2443
+ :param set affected_control_ids: A set to store affected control implementation IDs
2444
+ """
2445
+ issue.status = regscale_models.IssueStatus.Closed
2446
+ issue.dateCompleted = get_current_datetime()
2447
+ changes_text = (
2448
+ f"{get_current_datetime('%b %d, %Y')} - Closed by {self.title} for having no current vulnerabilities."
2449
+ )
2450
+ issue.changes = f"{issue.changes}\n{changes_text}" if issue.changes else changes_text
2451
+ issue.save()
2452
+
2453
+ with count_lock:
2454
+ self.closed_count += 1
2455
+ if issue.controlImplementationIds:
2456
+ affected_control_ids.update(issue.controlImplementationIds)
2457
+
2458
+ def _process_issues_multithreaded(self, open_issues: list, process_issue: callable, max_workers: int):
2459
+ """
2460
+ Process issues using multiple threads.
2461
+
2462
+ :param list open_issues: List of open issues to process
2463
+ :param callable process_issue: Function to process an issue
2464
+ :param int max_workers: Maximum number of threads
2465
+ """
2466
+ batch_size = max_workers * 2
2467
+ with ThreadPoolExecutor(max_workers=max_workers) as executor:
2468
+ batch = []
2469
+ futures = []
2470
+
2471
+ for issue in open_issues:
2472
+ batch.append(issue)
2473
+ if len(batch) >= batch_size:
2474
+ futures.extend([executor.submit(process_issue, issue) for issue in batch])
2475
+ batch = []
2476
+
2477
+ if batch:
2478
+ futures.extend([executor.submit(process_issue, issue) for issue in batch])
2479
+
2480
+ for future in concurrent.futures.as_completed(futures):
2481
+ try:
2482
+ future.result()
2483
+ except Exception as exc:
2484
+ self.log_error("Error processing issue: %s", exc)
2485
+
2442
2486
  def update_control_implementation_status_after_close(self, control_id: int) -> None:
2443
2487
  """
2444
2488
  Updates the status of a control implementation after closing issues.
@@ -2520,6 +2564,8 @@ class ScannerIntegration(ABC):
2520
2564
  scan_history.vHigh += 1
2521
2565
  elif severity == regscale_models.IssueSeverity.Critical:
2522
2566
  scan_history.vCritical += 1
2567
+ else:
2568
+ scan_history.vInfo += 1
2523
2569
 
2524
2570
  @classmethod
2525
2571
  def cci_assessment(cls, plan_id: int) -> None:
@@ -2601,7 +2647,13 @@ class ScannerIntegration(ABC):
2601
2647
  logger.info("All findings have been processed successfully.")
2602
2648
 
2603
2649
  if scan_history := instance._results.get("scan_history"):
2604
- open_count = scan_history.vCritical + scan_history.vHigh + scan_history.vMedium + scan_history.vLow
2650
+ open_count = (
2651
+ scan_history.vCritical
2652
+ + scan_history.vHigh
2653
+ + scan_history.vMedium
2654
+ + scan_history.vLow
2655
+ + scan_history.vInfo
2656
+ )
2605
2657
  closed_count = findings_processed - open_count
2606
2658
  logger.info(
2607
2659
  "Processed %d total findings. Open vulnerabilities: %d & Closed vulnerabilities: %d",
@@ -2610,12 +2662,13 @@ class ScannerIntegration(ABC):
2610
2662
  closed_count,
2611
2663
  )
2612
2664
  logger.info(
2613
- "%d Open vulnerabilities: Critical(s): %d, High(s): %d, Medium(s): %d, Low(s): %d",
2665
+ "%d Open vulnerabilities: Critical(s): %d, High(s): %d, Medium(s): %d, Low(s): %d, and %d Info(s).",
2614
2666
  open_count,
2615
2667
  scan_history.vCritical,
2616
2668
  scan_history.vHigh,
2617
2669
  scan_history.vMedium,
2618
2670
  scan_history.vLow,
2671
+ scan_history.vInfo,
2619
2672
  )
2620
2673
  else:
2621
2674
  logger.info("Processed %d findings.", findings_processed)
@@ -1,9 +1,155 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.04.03",
4
- "dateReleased": "2025-04-03T12:34:57.2906Z",
5
- "count": 1313,
3
+ "catalogVersion": "2025.04.17",
4
+ "dateReleased": "2025-04-17T17:01:44.4538Z",
5
+ "count": 1323,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-24054",
9
+ "vendorProject": "Microsoft",
10
+ "product": "Windows",
11
+ "vulnerabilityName": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability",
12
+ "dateAdded": "2025-04-17",
13
+ "shortDescription": "Microsoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-05-08",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24054 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24054",
18
+ "cwes": [
19
+ "CWE-73"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2025-31201",
24
+ "vendorProject": "Apple",
25
+ "product": "Multiple Products",
26
+ "vulnerabilityName": "Apple Multiple Products Arbitrary Read and Write Vulnerability",
27
+ "dateAdded": "2025-04-17",
28
+ "shortDescription": "Apple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-05-08",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/support.apple.com\/en-us\/122282 ; https:\/\/support.apple.com\/en-us\/122400 ; https:\/\/support.apple.com\/en-us\/122401 ; https:\/\/support.apple.com\/en-us\/122402 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31201",
33
+ "cwes": []
34
+ },
35
+ {
36
+ "cveID": "CVE-2025-31200",
37
+ "vendorProject": "Apple",
38
+ "product": "Multiple Products",
39
+ "vulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability",
40
+ "dateAdded": "2025-04-17",
41
+ "shortDescription": "Apple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.",
42
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
43
+ "dueDate": "2025-05-08",
44
+ "knownRansomwareCampaignUse": "Unknown",
45
+ "notes": "https:\/\/support.apple.com\/en-us\/122282 ; https:\/\/support.apple.com\/en-us\/122400 ; https:\/\/support.apple.com\/en-us\/122401 ; https:\/\/support.apple.com\/en-us\/122402 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31200",
46
+ "cwes": []
47
+ },
48
+ {
49
+ "cveID": "CVE-2021-20035",
50
+ "vendorProject": "SonicWall",
51
+ "product": "SMA100 Appliances",
52
+ "vulnerabilityName": "SonicWall SMA100 Appliances OS Command Injection Vulnerability",
53
+ "dateAdded": "2025-04-16",
54
+ "shortDescription": "SonicWall SMA100 appliances contain an OS command injection vulnerability in the management interface that allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution.",
55
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
56
+ "dueDate": "2025-05-07",
57
+ "knownRansomwareCampaignUse": "Unknown",
58
+ "notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2021-0022 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20035",
59
+ "cwes": [
60
+ "CWE-78"
61
+ ]
62
+ },
63
+ {
64
+ "cveID": "CVE-2024-53150",
65
+ "vendorProject": "Linux",
66
+ "product": "Kernel",
67
+ "vulnerabilityName": "Linux Kernel Out-of-Bounds Read Vulnerability",
68
+ "dateAdded": "2025-04-09",
69
+ "shortDescription": "Linux Kernel contains an out-of-bounds read vulnerability in the USB-audio driver that allows a local, privileged attacker to obtain potentially sensitive information.",
70
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
71
+ "dueDate": "2025-04-30",
72
+ "knownRansomwareCampaignUse": "Unknown",
73
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024122427-CVE-2024-53150-3a7d@gregkh\/ ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-04-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53150",
74
+ "cwes": [
75
+ "CWE-125"
76
+ ]
77
+ },
78
+ {
79
+ "cveID": "CVE-2024-53197",
80
+ "vendorProject": "Linux",
81
+ "product": "Kernel",
82
+ "vulnerabilityName": "Linux Kernel Out-of-Bounds Access Vulnerability",
83
+ "dateAdded": "2025-04-09",
84
+ "shortDescription": "Linux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code.",
85
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
86
+ "dueDate": "2025-04-30",
87
+ "knownRansomwareCampaignUse": "Unknown",
88
+ "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024122725-CVE-2024-53197-6aef@gregkh\/ ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-04-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53197",
89
+ "cwes": [
90
+ "CWE-787"
91
+ ]
92
+ },
93
+ {
94
+ "cveID": "CVE-2025-29824",
95
+ "vendorProject": "Microsoft",
96
+ "product": "Windows",
97
+ "vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability",
98
+ "dateAdded": "2025-04-08",
99
+ "shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
100
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
101
+ "dueDate": "2025-04-29",
102
+ "knownRansomwareCampaignUse": "Known",
103
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-29824 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-29824",
104
+ "cwes": [
105
+ "CWE-416"
106
+ ]
107
+ },
108
+ {
109
+ "cveID": "CVE-2025-30406",
110
+ "vendorProject": "Gladinet",
111
+ "product": "CentreStack",
112
+ "vulnerabilityName": "Gladinet CentreStack Use of Hard-coded Cryptographic Key Vulnerability",
113
+ "dateAdded": "2025-04-08",
114
+ "shortDescription": "Gladinet CentreStack contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.",
115
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
116
+ "dueDate": "2025-04-29",
117
+ "knownRansomwareCampaignUse": "Unknown",
118
+ "notes": "https:\/\/gladinetsupport.s3.us-east-1.amazonaws.com\/gladinet\/securityadvisory-cve-2005.pdf ; https:\/\/www.centrestack.com\/p\/gce_latest_release.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30406",
119
+ "cwes": [
120
+ "CWE-321"
121
+ ]
122
+ },
123
+ {
124
+ "cveID": "CVE-2025-31161",
125
+ "vendorProject": "CrushFTP",
126
+ "product": "CrushFTP",
127
+ "vulnerabilityName": "CrushFTP Authentication Bypass Vulnerability",
128
+ "dateAdded": "2025-04-07",
129
+ "shortDescription": "CrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. ",
130
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
131
+ "dueDate": "2025-04-28",
132
+ "knownRansomwareCampaignUse": "Known",
133
+ "notes": "https:\/\/www.crushftp.com\/crush11wiki\/Wiki.jsp?page=Update ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31161",
134
+ "cwes": [
135
+ "CWE-305"
136
+ ]
137
+ },
138
+ {
139
+ "cveID": "CVE-2025-22457",
140
+ "vendorProject": "Ivanti",
141
+ "product": "Connect Secure, Policy Secure and ZTA Gateways",
142
+ "vulnerabilityName": "Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",
143
+ "dateAdded": "2025-04-04",
144
+ "shortDescription": "Ivanti Connect Secure, Policy Secure and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
145
+ "requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.",
146
+ "dueDate": "2025-04-11",
147
+ "knownRansomwareCampaignUse": "Unknown",
148
+ "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457) ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
149
+ "cwes": [
150
+ "CWE-121"
151
+ ]
152
+ },
7
153
  {
8
154
  "cveID": "CVE-2025-24813",
9
155
  "vendorProject": "Apache",
@@ -448,7 +594,7 @@
448
594
  "shortDescription": "Microsoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.",
449
595
  "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
450
596
  "dueDate": "2025-03-24",
451
- "knownRansomwareCampaignUse": "Unknown",
597
+ "knownRansomwareCampaignUse": "Known",
452
598
  "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2018-8639 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8639",
453
599
  "cwes": [
454
600
  "CWE-404"
@@ -1731,7 +1877,7 @@
1731
1877
  "shortDescription": "Microsoft SharePoint contains a deserialization vulnerability that allows for remote code execution.",
1732
1878
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1733
1879
  "dueDate": "2024-11-12",
1734
- "knownRansomwareCampaignUse": "Unknown",
1880
+ "knownRansomwareCampaignUse": "Known",
1735
1881
  "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38094 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38094",
1736
1882
  "cwes": [
1737
1883
  "CWE-502"
@@ -3104,7 +3250,7 @@
3104
3250
  "shortDescription": "Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.",
3105
3251
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
3106
3252
  "dueDate": "2024-06-04",
3107
- "knownRansomwareCampaignUse": "Unknown",
3253
+ "knownRansomwareCampaignUse": "Known",
3108
3254
  "notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30051; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-30051",
3109
3255
  "cwes": [
3110
3256
  "CWE-122"
@@ -3222,7 +3368,7 @@
3222
3368
  "shortDescription": "Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.",
3223
3369
  "requiredAction": "Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.",
3224
3370
  "dueDate": "2024-04-19",
3225
- "knownRansomwareCampaignUse": "Unknown",
3371
+ "knownRansomwareCampaignUse": "Known",
3226
3372
  "notes": "https:\/\/security.paloaltonetworks.com\/CVE-2024-3400 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3400",
3227
3373
  "cwes": [
3228
3374
  "CWE-20",
@@ -4469,10 +4615,10 @@
4469
4615
  "vulnerabilityName": "HTTP\/2 Rapid Reset Attack Vulnerability",
4470
4616
  "dateAdded": "2023-10-10",
4471
4617
  "shortDescription": "HTTP\/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).",
4472
- "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
4618
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
4473
4619
  "dueDate": "2023-10-31",
4474
4620
  "knownRansomwareCampaignUse": "Unknown",
4475
- "notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https:\/\/blog.cloudflare.com\/technical-breakdown-http2-rapid-reset-ddos-attack\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-44487",
4621
+ "notes": "This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP\/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/10\/10\/http2-rapid-reset-vulnerability-cve-2023-44487; https:\/\/blog.cloudflare.com\/technical-breakdown-http2-rapid-reset-ddos-attack\/; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-44487",
4476
4622
  "cwes": [
4477
4623
  "CWE-400"
4478
4624
  ]
@@ -6709,7 +6855,7 @@
6709
6855
  "shortDescription": "Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.",
6710
6856
  "requiredAction": "Apply updates per vendor instructions.",
6711
6857
  "dueDate": "2023-01-03",
6712
- "knownRansomwareCampaignUse": "Unknown",
6858
+ "knownRansomwareCampaignUse": "Known",
6713
6859
  "notes": "https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-398; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-42475",
6714
6860
  "cwes": [
6715
6861
  "CWE-197"