regscale-cli 6.16.4.1__py3-none-any.whl → 6.18.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/__init__.py +1 -1
- regscale/core/app/api.py +9 -1
- regscale/core/app/utils/regscale_utils.py +2 -3
- regscale/core/login.py +3 -0
- regscale/dev/code_gen.py +10 -7
- regscale/integrations/commercial/aws/inventory/base.py +0 -2
- regscale/integrations/commercial/burp.py +4 -0
- regscale/integrations/commercial/durosuite/api.py +20 -9
- regscale/integrations/commercial/opentext/scanner.py +2 -2
- regscale/integrations/commercial/sap/sysdig/sysdig_scanner.py +40 -21
- regscale/integrations/commercial/sap/tenable/scanner.py +41 -15
- regscale/integrations/commercial/sicura/api.py +9 -1
- regscale/integrations/commercial/synqly/edr.py +84 -0
- regscale/integrations/commercial/tenablev2/click.py +24 -2
- regscale/integrations/commercial/tenablev2/scanner.py +1 -1
- regscale/integrations/scanner_integration.py +80 -27
- regscale/models/integration_models/cisa_kev_data.json +156 -10
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/integration_models/synqly_models/connectors/__init__.py +1 -0
- regscale/models/integration_models/synqly_models/connectors/edr.py +137 -0
- regscale/models/integration_models/synqly_models/ocsf_mapper.py +61 -11
- regscale/models/integration_models/synqly_models/synqly_model.py +8 -5
- regscale/models/regscale_models/file.py +3 -1
- regscale/models/regscale_models/master_assessment.py +127 -0
- regscale/models/regscale_models/regscale_model.py +2 -4
- regscale/models/regscale_models/risk.py +26 -31
- regscale/models/regscale_models/supply_chain.py +5 -5
- regscale/regscale.py +2 -0
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/METADATA +1 -1
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/RECORD +34 -31
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/LICENSE +0 -0
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/WHEEL +0 -0
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.16.4.1.dist-info → regscale_cli-6.18.0.0.dist-info}/top_level.txt +0 -0
|
@@ -7,6 +7,7 @@ from concurrent.futures import wait
|
|
|
7
7
|
from typing import TYPE_CHECKING
|
|
8
8
|
|
|
9
9
|
from regscale.integrations.integration_override import IntegrationOverride
|
|
10
|
+
from regscale.validation.record import validate_regscale_object
|
|
10
11
|
|
|
11
12
|
# Delay import of Tenable libraries
|
|
12
13
|
if TYPE_CHECKING:
|
|
@@ -46,6 +47,7 @@ from regscale.core.app.utils.app_utils import (
|
|
|
46
47
|
check_license,
|
|
47
48
|
create_progress_object,
|
|
48
49
|
epoch_to_datetime,
|
|
50
|
+
error_and_exit,
|
|
49
51
|
format_dict_to_html,
|
|
50
52
|
get_current_datetime,
|
|
51
53
|
regscale_string_to_epoch,
|
|
@@ -124,6 +126,9 @@ def import_nessus(folder_path: click.Path, regscale_ssp_id: click.INT, scan_date
|
|
|
124
126
|
"""Import Nessus scans, vulnerabilities and assets to RegScale."""
|
|
125
127
|
from regscale.integrations.commercial.nessus.scanner import NessusIntegration
|
|
126
128
|
|
|
129
|
+
if not validate_regscale_object(regscale_ssp_id, "securityplans"):
|
|
130
|
+
logger.warning("SSP #%i is not a valid RegScale Security Plan.", regscale_ssp_id)
|
|
131
|
+
return
|
|
127
132
|
NessusIntegration.sync_assets(plan_id=regscale_ssp_id, path=folder_path)
|
|
128
133
|
NessusIntegration.sync_findings(
|
|
129
134
|
plan_id=regscale_ssp_id, path=folder_path, enable_finding_date_update=True, scan_date=scan_date
|
|
@@ -971,12 +976,13 @@ def gen_tsc(config: dict) -> "TenableSC":
|
|
|
971
976
|
:return: Tenable client
|
|
972
977
|
:rtype: "TenableSC"
|
|
973
978
|
"""
|
|
979
|
+
from restfly.errors import APIError
|
|
974
980
|
from tenable.sc import TenableSC
|
|
975
981
|
|
|
976
982
|
if not config:
|
|
977
983
|
app = Application()
|
|
978
984
|
config = app.config
|
|
979
|
-
|
|
985
|
+
res = TenableSC(
|
|
980
986
|
url=config["tenableUrl"],
|
|
981
987
|
access_key=config["tenableAccessKey"],
|
|
982
988
|
secret_key=config["tenableSecretKey"],
|
|
@@ -984,6 +990,11 @@ def gen_tsc(config: dict) -> "TenableSC":
|
|
|
984
990
|
product=REGSCALE_CLI,
|
|
985
991
|
build=__version__,
|
|
986
992
|
)
|
|
993
|
+
try:
|
|
994
|
+
res.status.status()
|
|
995
|
+
except APIError:
|
|
996
|
+
error_and_exit("Unable to authenticate with Tenable SC. Please check your credentials.", False)
|
|
997
|
+
return res
|
|
987
998
|
|
|
988
999
|
|
|
989
1000
|
def gen_tio(config: dict) -> "TenableIO":
|
|
@@ -995,9 +1006,10 @@ def gen_tio(config: dict) -> "TenableIO":
|
|
|
995
1006
|
:rtype: "TenableIO"
|
|
996
1007
|
"""
|
|
997
1008
|
|
|
1009
|
+
from restfly.errors import UnauthorizedError
|
|
998
1010
|
from tenable.io import TenableIO
|
|
999
1011
|
|
|
1000
|
-
|
|
1012
|
+
res = TenableIO(
|
|
1001
1013
|
url=config["tenableUrl"],
|
|
1002
1014
|
access_key=config["tenableAccessKey"],
|
|
1003
1015
|
secret_key=config["tenableSecretKey"],
|
|
@@ -1006,6 +1018,16 @@ def gen_tio(config: dict) -> "TenableIO":
|
|
|
1006
1018
|
build=__version__,
|
|
1007
1019
|
)
|
|
1008
1020
|
|
|
1021
|
+
try:
|
|
1022
|
+
# Check a quick API to make sure we have access
|
|
1023
|
+
res.scans.list(last_modified=datetime.now())
|
|
1024
|
+
except UnauthorizedError:
|
|
1025
|
+
error_and_exit(
|
|
1026
|
+
"Unable to authenticate with Tenable Vulnerability Management (IO). Please check your credentials.", False
|
|
1027
|
+
)
|
|
1028
|
+
|
|
1029
|
+
return res
|
|
1030
|
+
|
|
1009
1031
|
|
|
1010
1032
|
def get_controls(catalog_id: int) -> List[Dict]:
|
|
1011
1033
|
"""
|
|
@@ -6,9 +6,9 @@ import datetime
|
|
|
6
6
|
import json
|
|
7
7
|
import linecache
|
|
8
8
|
import logging
|
|
9
|
+
from pathlib import Path
|
|
9
10
|
from typing import Any, Dict, Iterator, List, Optional, Tuple
|
|
10
11
|
|
|
11
|
-
from pathlib import Path
|
|
12
12
|
from tenable.errors import TioExportsError
|
|
13
13
|
|
|
14
14
|
from regscale.core.app.utils.app_utils import get_current_datetime
|
|
@@ -2392,53 +2392,97 @@ class ScannerIntegration(ABC):
|
|
|
2392
2392
|
:rtype: int
|
|
2393
2393
|
"""
|
|
2394
2394
|
if not self.close_outdated_findings:
|
|
2395
|
-
# This should normally be set to True, but on POAM import, we do not want to automatically close issues,
|
|
2396
|
-
# unless the sheet specifies to do so
|
|
2397
2395
|
logger.info("Skipping closing outdated issues.")
|
|
2398
2396
|
return 0
|
|
2399
2397
|
|
|
2400
2398
|
closed_count = 0
|
|
2401
2399
|
affected_control_ids = set()
|
|
2400
|
+
count_lock = threading.Lock()
|
|
2402
2401
|
|
|
2403
|
-
# Get all open issues for this security plan
|
|
2404
2402
|
open_issues = regscale_models.Issue.fetch_issues_by_ssp(
|
|
2405
2403
|
None, ssp_id=self.plan_id, status=regscale_models.IssueStatus.Open.value
|
|
2406
2404
|
)
|
|
2407
|
-
|
|
2408
|
-
# Create a progress bar
|
|
2409
2405
|
task_id = self.finding_progress.add_task(
|
|
2410
2406
|
f"[cyan]Analyzing {len(open_issues)} issue(s) and closing any outdated issue(s)...", total=len(open_issues)
|
|
2411
2407
|
)
|
|
2412
2408
|
|
|
2413
|
-
|
|
2414
|
-
|
|
2415
|
-
|
|
2416
|
-
issue.dateCompleted = get_current_datetime()
|
|
2417
|
-
changes_text = f"{get_current_datetime('%b %d, %Y')} - Closed by {self.title} for having no current vulnerabilities."
|
|
2418
|
-
if issue.changes:
|
|
2419
|
-
issue.changes += f"\n{changes_text}"
|
|
2420
|
-
else:
|
|
2421
|
-
issue.changes = changes_text
|
|
2422
|
-
issue.save()
|
|
2423
|
-
closed_count += 1
|
|
2409
|
+
def _process_single_issue(iss: regscale_models.Issue):
|
|
2410
|
+
"""
|
|
2411
|
+
Process a single issue and update its status if necessary.
|
|
2424
2412
|
|
|
2425
|
-
|
|
2426
|
-
|
|
2427
|
-
|
|
2413
|
+
:param regscale_models.Issue iss: The issue to process
|
|
2414
|
+
"""
|
|
2415
|
+
if self.should_close_issue(iss, current_vulnerabilities):
|
|
2416
|
+
self._close_issue(iss, count_lock, affected_control_ids)
|
|
2417
|
+
with count_lock:
|
|
2418
|
+
self.finding_progress.update(task_id, advance=1)
|
|
2428
2419
|
|
|
2429
|
-
|
|
2430
|
-
|
|
2420
|
+
max_workers = get_thread_workers_max()
|
|
2421
|
+
if max_workers == 1:
|
|
2422
|
+
for issue in open_issues:
|
|
2423
|
+
_process_single_issue(issue)
|
|
2424
|
+
else:
|
|
2425
|
+
self._process_issues_multithreaded(open_issues, _process_single_issue, max_workers)
|
|
2431
2426
|
|
|
2432
|
-
# Update status of affected control implementations
|
|
2433
2427
|
for control_id in affected_control_ids:
|
|
2434
2428
|
self.update_control_implementation_status_after_close(control_id)
|
|
2435
2429
|
|
|
2436
|
-
|
|
2430
|
+
(
|
|
2437
2431
|
logger.info("Closed %d outdated issues.", closed_count)
|
|
2438
|
-
|
|
2439
|
-
logger.info("No outdated issues to close.")
|
|
2432
|
+
if closed_count > 0
|
|
2433
|
+
else logger.info("No outdated issues to close.")
|
|
2434
|
+
)
|
|
2440
2435
|
return closed_count
|
|
2441
2436
|
|
|
2437
|
+
def _close_issue(self, issue: regscale_models.Issue, count_lock: threading.Lock, affected_control_ids: set):
|
|
2438
|
+
"""
|
|
2439
|
+
Close an issue and update related data.
|
|
2440
|
+
|
|
2441
|
+
:param regscale_models.Issue issue: The issue to close
|
|
2442
|
+
:param threading.Lock count_lock: A lock to synchronize access to shared variables
|
|
2443
|
+
:param set affected_control_ids: A set to store affected control implementation IDs
|
|
2444
|
+
"""
|
|
2445
|
+
issue.status = regscale_models.IssueStatus.Closed
|
|
2446
|
+
issue.dateCompleted = get_current_datetime()
|
|
2447
|
+
changes_text = (
|
|
2448
|
+
f"{get_current_datetime('%b %d, %Y')} - Closed by {self.title} for having no current vulnerabilities."
|
|
2449
|
+
)
|
|
2450
|
+
issue.changes = f"{issue.changes}\n{changes_text}" if issue.changes else changes_text
|
|
2451
|
+
issue.save()
|
|
2452
|
+
|
|
2453
|
+
with count_lock:
|
|
2454
|
+
self.closed_count += 1
|
|
2455
|
+
if issue.controlImplementationIds:
|
|
2456
|
+
affected_control_ids.update(issue.controlImplementationIds)
|
|
2457
|
+
|
|
2458
|
+
def _process_issues_multithreaded(self, open_issues: list, process_issue: callable, max_workers: int):
|
|
2459
|
+
"""
|
|
2460
|
+
Process issues using multiple threads.
|
|
2461
|
+
|
|
2462
|
+
:param list open_issues: List of open issues to process
|
|
2463
|
+
:param callable process_issue: Function to process an issue
|
|
2464
|
+
:param int max_workers: Maximum number of threads
|
|
2465
|
+
"""
|
|
2466
|
+
batch_size = max_workers * 2
|
|
2467
|
+
with ThreadPoolExecutor(max_workers=max_workers) as executor:
|
|
2468
|
+
batch = []
|
|
2469
|
+
futures = []
|
|
2470
|
+
|
|
2471
|
+
for issue in open_issues:
|
|
2472
|
+
batch.append(issue)
|
|
2473
|
+
if len(batch) >= batch_size:
|
|
2474
|
+
futures.extend([executor.submit(process_issue, issue) for issue in batch])
|
|
2475
|
+
batch = []
|
|
2476
|
+
|
|
2477
|
+
if batch:
|
|
2478
|
+
futures.extend([executor.submit(process_issue, issue) for issue in batch])
|
|
2479
|
+
|
|
2480
|
+
for future in concurrent.futures.as_completed(futures):
|
|
2481
|
+
try:
|
|
2482
|
+
future.result()
|
|
2483
|
+
except Exception as exc:
|
|
2484
|
+
self.log_error("Error processing issue: %s", exc)
|
|
2485
|
+
|
|
2442
2486
|
def update_control_implementation_status_after_close(self, control_id: int) -> None:
|
|
2443
2487
|
"""
|
|
2444
2488
|
Updates the status of a control implementation after closing issues.
|
|
@@ -2520,6 +2564,8 @@ class ScannerIntegration(ABC):
|
|
|
2520
2564
|
scan_history.vHigh += 1
|
|
2521
2565
|
elif severity == regscale_models.IssueSeverity.Critical:
|
|
2522
2566
|
scan_history.vCritical += 1
|
|
2567
|
+
else:
|
|
2568
|
+
scan_history.vInfo += 1
|
|
2523
2569
|
|
|
2524
2570
|
@classmethod
|
|
2525
2571
|
def cci_assessment(cls, plan_id: int) -> None:
|
|
@@ -2601,7 +2647,13 @@ class ScannerIntegration(ABC):
|
|
|
2601
2647
|
logger.info("All findings have been processed successfully.")
|
|
2602
2648
|
|
|
2603
2649
|
if scan_history := instance._results.get("scan_history"):
|
|
2604
|
-
open_count =
|
|
2650
|
+
open_count = (
|
|
2651
|
+
scan_history.vCritical
|
|
2652
|
+
+ scan_history.vHigh
|
|
2653
|
+
+ scan_history.vMedium
|
|
2654
|
+
+ scan_history.vLow
|
|
2655
|
+
+ scan_history.vInfo
|
|
2656
|
+
)
|
|
2605
2657
|
closed_count = findings_processed - open_count
|
|
2606
2658
|
logger.info(
|
|
2607
2659
|
"Processed %d total findings. Open vulnerabilities: %d & Closed vulnerabilities: %d",
|
|
@@ -2610,12 +2662,13 @@ class ScannerIntegration(ABC):
|
|
|
2610
2662
|
closed_count,
|
|
2611
2663
|
)
|
|
2612
2664
|
logger.info(
|
|
2613
|
-
"%d Open vulnerabilities: Critical(s): %d, High(s): %d, Medium(s): %d, Low(s): %d",
|
|
2665
|
+
"%d Open vulnerabilities: Critical(s): %d, High(s): %d, Medium(s): %d, Low(s): %d, and %d Info(s).",
|
|
2614
2666
|
open_count,
|
|
2615
2667
|
scan_history.vCritical,
|
|
2616
2668
|
scan_history.vHigh,
|
|
2617
2669
|
scan_history.vMedium,
|
|
2618
2670
|
scan_history.vLow,
|
|
2671
|
+
scan_history.vInfo,
|
|
2619
2672
|
)
|
|
2620
2673
|
else:
|
|
2621
2674
|
logger.info("Processed %d findings.", findings_processed)
|
|
@@ -1,9 +1,155 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.04.
|
|
4
|
-
"dateReleased": "2025-04-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.04.17",
|
|
4
|
+
"dateReleased": "2025-04-17T17:01:44.4538Z",
|
|
5
|
+
"count": 1323,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-24054",
|
|
9
|
+
"vendorProject": "Microsoft",
|
|
10
|
+
"product": "Windows",
|
|
11
|
+
"vulnerabilityName": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability",
|
|
12
|
+
"dateAdded": "2025-04-17",
|
|
13
|
+
"shortDescription": "Microsoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorized attacker to perform spoofing over a network.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-05-08",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-24054 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-24054",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-73"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2025-31201",
|
|
24
|
+
"vendorProject": "Apple",
|
|
25
|
+
"product": "Multiple Products",
|
|
26
|
+
"vulnerabilityName": "Apple Multiple Products Arbitrary Read and Write Vulnerability",
|
|
27
|
+
"dateAdded": "2025-04-17",
|
|
28
|
+
"shortDescription": "Apple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read and write vulnerability that allows an attacker to bypass Pointer Authentication.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-05-08",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/support.apple.com\/en-us\/122282 ; https:\/\/support.apple.com\/en-us\/122400 ; https:\/\/support.apple.com\/en-us\/122401 ; https:\/\/support.apple.com\/en-us\/122402 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31201",
|
|
33
|
+
"cwes": []
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"cveID": "CVE-2025-31200",
|
|
37
|
+
"vendorProject": "Apple",
|
|
38
|
+
"product": "Multiple Products",
|
|
39
|
+
"vulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability",
|
|
40
|
+
"dateAdded": "2025-04-17",
|
|
41
|
+
"shortDescription": "Apple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.",
|
|
42
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
43
|
+
"dueDate": "2025-05-08",
|
|
44
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
45
|
+
"notes": "https:\/\/support.apple.com\/en-us\/122282 ; https:\/\/support.apple.com\/en-us\/122400 ; https:\/\/support.apple.com\/en-us\/122401 ; https:\/\/support.apple.com\/en-us\/122402 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31200",
|
|
46
|
+
"cwes": []
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
"cveID": "CVE-2021-20035",
|
|
50
|
+
"vendorProject": "SonicWall",
|
|
51
|
+
"product": "SMA100 Appliances",
|
|
52
|
+
"vulnerabilityName": "SonicWall SMA100 Appliances OS Command Injection Vulnerability",
|
|
53
|
+
"dateAdded": "2025-04-16",
|
|
54
|
+
"shortDescription": "SonicWall SMA100 appliances contain an OS command injection vulnerability in the management interface that allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user, which could potentially lead to code execution.",
|
|
55
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
56
|
+
"dueDate": "2025-05-07",
|
|
57
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
58
|
+
"notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2021-0022 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20035",
|
|
59
|
+
"cwes": [
|
|
60
|
+
"CWE-78"
|
|
61
|
+
]
|
|
62
|
+
},
|
|
63
|
+
{
|
|
64
|
+
"cveID": "CVE-2024-53150",
|
|
65
|
+
"vendorProject": "Linux",
|
|
66
|
+
"product": "Kernel",
|
|
67
|
+
"vulnerabilityName": "Linux Kernel Out-of-Bounds Read Vulnerability",
|
|
68
|
+
"dateAdded": "2025-04-09",
|
|
69
|
+
"shortDescription": "Linux Kernel contains an out-of-bounds read vulnerability in the USB-audio driver that allows a local, privileged attacker to obtain potentially sensitive information.",
|
|
70
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
71
|
+
"dueDate": "2025-04-30",
|
|
72
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
73
|
+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024122427-CVE-2024-53150-3a7d@gregkh\/ ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-04-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53150",
|
|
74
|
+
"cwes": [
|
|
75
|
+
"CWE-125"
|
|
76
|
+
]
|
|
77
|
+
},
|
|
78
|
+
{
|
|
79
|
+
"cveID": "CVE-2024-53197",
|
|
80
|
+
"vendorProject": "Linux",
|
|
81
|
+
"product": "Kernel",
|
|
82
|
+
"vulnerabilityName": "Linux Kernel Out-of-Bounds Access Vulnerability",
|
|
83
|
+
"dateAdded": "2025-04-09",
|
|
84
|
+
"shortDescription": "Linux Kernel contains an out-of-bounds access vulnerability in the USB-audio driver that allows an attacker with physical access to the system to use a malicious USB device to potentially manipulate system memory, escalate privileges, or execute arbitrary code.",
|
|
85
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
86
|
+
"dueDate": "2025-04-30",
|
|
87
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
88
|
+
"notes": "This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: https:\/\/lore.kernel.org\/linux-cve-announce\/2024122725-CVE-2024-53197-6aef@gregkh\/ ; https:\/\/source.android.com\/docs\/security\/bulletin\/2025-04-01 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53197",
|
|
89
|
+
"cwes": [
|
|
90
|
+
"CWE-787"
|
|
91
|
+
]
|
|
92
|
+
},
|
|
93
|
+
{
|
|
94
|
+
"cveID": "CVE-2025-29824",
|
|
95
|
+
"vendorProject": "Microsoft",
|
|
96
|
+
"product": "Windows",
|
|
97
|
+
"vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability",
|
|
98
|
+
"dateAdded": "2025-04-08",
|
|
99
|
+
"shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
|
|
100
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
101
|
+
"dueDate": "2025-04-29",
|
|
102
|
+
"knownRansomwareCampaignUse": "Known",
|
|
103
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-29824 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-29824",
|
|
104
|
+
"cwes": [
|
|
105
|
+
"CWE-416"
|
|
106
|
+
]
|
|
107
|
+
},
|
|
108
|
+
{
|
|
109
|
+
"cveID": "CVE-2025-30406",
|
|
110
|
+
"vendorProject": "Gladinet",
|
|
111
|
+
"product": "CentreStack",
|
|
112
|
+
"vulnerabilityName": "Gladinet CentreStack Use of Hard-coded Cryptographic Key Vulnerability",
|
|
113
|
+
"dateAdded": "2025-04-08",
|
|
114
|
+
"shortDescription": "Gladinet CentreStack contains a use of hard-coded cryptographic key vulnerability in the way that the application manages keys used for ViewState integrity verification. Successful exploitation allows an attacker to forge ViewState payloads for server-side deserialization, allowing for remote code execution.",
|
|
115
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
116
|
+
"dueDate": "2025-04-29",
|
|
117
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
118
|
+
"notes": "https:\/\/gladinetsupport.s3.us-east-1.amazonaws.com\/gladinet\/securityadvisory-cve-2005.pdf ; https:\/\/www.centrestack.com\/p\/gce_latest_release.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30406",
|
|
119
|
+
"cwes": [
|
|
120
|
+
"CWE-321"
|
|
121
|
+
]
|
|
122
|
+
},
|
|
123
|
+
{
|
|
124
|
+
"cveID": "CVE-2025-31161",
|
|
125
|
+
"vendorProject": "CrushFTP",
|
|
126
|
+
"product": "CrushFTP",
|
|
127
|
+
"vulnerabilityName": "CrushFTP Authentication Bypass Vulnerability",
|
|
128
|
+
"dateAdded": "2025-04-07",
|
|
129
|
+
"shortDescription": "CrushFTP contains an authentication bypass vulnerability in the HTTP authorization header that allows a remote unauthenticated attacker to authenticate to any known or guessable user account (e.g., crushadmin), potentially leading to a full compromise. ",
|
|
130
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
131
|
+
"dueDate": "2025-04-28",
|
|
132
|
+
"knownRansomwareCampaignUse": "Known",
|
|
133
|
+
"notes": "https:\/\/www.crushftp.com\/crush11wiki\/Wiki.jsp?page=Update ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31161",
|
|
134
|
+
"cwes": [
|
|
135
|
+
"CWE-305"
|
|
136
|
+
]
|
|
137
|
+
},
|
|
138
|
+
{
|
|
139
|
+
"cveID": "CVE-2025-22457",
|
|
140
|
+
"vendorProject": "Ivanti",
|
|
141
|
+
"product": "Connect Secure, Policy Secure and ZTA Gateways",
|
|
142
|
+
"vulnerabilityName": "Ivanti Connect Secure, Policy Secure and ZTA Gateways Stack-Based Buffer Overflow Vulnerability",
|
|
143
|
+
"dateAdded": "2025-04-04",
|
|
144
|
+
"shortDescription": "Ivanti Connect Secure, Policy Secure and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
|
|
145
|
+
"requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.",
|
|
146
|
+
"dueDate": "2025-04-11",
|
|
147
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
148
|
+
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457) ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
|
|
149
|
+
"cwes": [
|
|
150
|
+
"CWE-121"
|
|
151
|
+
]
|
|
152
|
+
},
|
|
7
153
|
{
|
|
8
154
|
"cveID": "CVE-2025-24813",
|
|
9
155
|
"vendorProject": "Apache",
|
|
@@ -448,7 +594,7 @@
|
|
|
448
594
|
"shortDescription": "Microsoft Windows Win32k contains an improper resource shutdown or release vulnerability that allows for local, authenticated privilege escalation. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.",
|
|
449
595
|
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
450
596
|
"dueDate": "2025-03-24",
|
|
451
|
-
"knownRansomwareCampaignUse": "
|
|
597
|
+
"knownRansomwareCampaignUse": "Known",
|
|
452
598
|
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2018-8639 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-8639",
|
|
453
599
|
"cwes": [
|
|
454
600
|
"CWE-404"
|
|
@@ -1731,7 +1877,7 @@
|
|
|
1731
1877
|
"shortDescription": "Microsoft SharePoint contains a deserialization vulnerability that allows for remote code execution.",
|
|
1732
1878
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
1733
1879
|
"dueDate": "2024-11-12",
|
|
1734
|
-
"knownRansomwareCampaignUse": "
|
|
1880
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1735
1881
|
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38094 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38094",
|
|
1736
1882
|
"cwes": [
|
|
1737
1883
|
"CWE-502"
|
|
@@ -3104,7 +3250,7 @@
|
|
|
3104
3250
|
"shortDescription": "Microsoft DWM Core Library contains a privilege escalation vulnerability that allows an attacker to gain SYSTEM privileges.",
|
|
3105
3251
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
3106
3252
|
"dueDate": "2024-06-04",
|
|
3107
|
-
"knownRansomwareCampaignUse": "
|
|
3253
|
+
"knownRansomwareCampaignUse": "Known",
|
|
3108
3254
|
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30051; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-30051",
|
|
3109
3255
|
"cwes": [
|
|
3110
3256
|
"CWE-122"
|
|
@@ -3222,7 +3368,7 @@
|
|
|
3222
3368
|
"shortDescription": "Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.",
|
|
3223
3369
|
"requiredAction": "Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.",
|
|
3224
3370
|
"dueDate": "2024-04-19",
|
|
3225
|
-
"knownRansomwareCampaignUse": "
|
|
3371
|
+
"knownRansomwareCampaignUse": "Known",
|
|
3226
3372
|
"notes": "https:\/\/security.paloaltonetworks.com\/CVE-2024-3400 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3400",
|
|
3227
3373
|
"cwes": [
|
|
3228
3374
|
"CWE-20",
|
|
@@ -4469,10 +4615,10 @@
|
|
|
4469
4615
|
"vulnerabilityName": "HTTP\/2 Rapid Reset Attack Vulnerability",
|
|
4470
4616
|
"dateAdded": "2023-10-10",
|
|
4471
4617
|
"shortDescription": "HTTP\/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).",
|
|
4472
|
-
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
4618
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
4473
4619
|
"dueDate": "2023-10-31",
|
|
4474
4620
|
"knownRansomwareCampaignUse": "Unknown",
|
|
4475
|
-
"notes": "This vulnerability affects a common open-source component, third-party library, or
|
|
4621
|
+
"notes": "This vulnerability affects a common open-source component, third-party library, or protocol used by different products. For more information, please see: HTTP\/2 Rapid Reset Vulnerability, CVE-2023-44487 | CISA: https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/10\/10\/http2-rapid-reset-vulnerability-cve-2023-44487; https:\/\/blog.cloudflare.com\/technical-breakdown-http2-rapid-reset-ddos-attack\/; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-44487",
|
|
4476
4622
|
"cwes": [
|
|
4477
4623
|
"CWE-400"
|
|
4478
4624
|
]
|
|
@@ -6709,7 +6855,7 @@
|
|
|
6709
6855
|
"shortDescription": "Multiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.",
|
|
6710
6856
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
6711
6857
|
"dueDate": "2023-01-03",
|
|
6712
|
-
"knownRansomwareCampaignUse": "
|
|
6858
|
+
"knownRansomwareCampaignUse": "Known",
|
|
6713
6859
|
"notes": "https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-398; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-42475",
|
|
6714
6860
|
"cwes": [
|
|
6715
6861
|
"CWE-197"
|