regscale-cli 6.19.2.0__py3-none-any.whl → 6.20.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/__init__.py +1 -1
- regscale/airflow/config.py +2 -0
- regscale/airflow/tasks/groups.py +11 -47
- regscale/core/app/internal/login.py +49 -43
- regscale/core/app/internal/model_editor.py +2 -1
- regscale/dev/code_gen.py +2 -5
- regscale/integrations/commercial/synqly/assets.py +10 -0
- regscale/integrations/public/fedramp/appendix_parser.py +499 -104
- regscale/integrations/public/fedramp/fedramp_five.py +89 -43
- regscale/models/integration_models/cisa_kev_data.json +171 -21
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/regscale_models/__init__.py +5 -0
- regscale/models/regscale_models/business_impact_assessment.py +71 -0
- regscale/models/regscale_models/control_implementation.py +15 -0
- regscale/models/regscale_models/master_assessment.py +19 -0
- regscale/models/regscale_models/policy.py +90 -0
- regscale/models/regscale_models/question.py +30 -2
- regscale/models/regscale_models/questionnaire.py +4 -3
- regscale/models/regscale_models/questionnaire_instance.py +37 -14
- regscale/models/regscale_models/rbac.py +0 -1
- regscale/models/regscale_models/risk_trend.py +67 -0
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/METADATA +114 -55
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/RECORD +27 -24
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/LICENSE +0 -0
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/WHEEL +0 -0
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/top_level.txt +0 -0
|
@@ -11,7 +11,6 @@ from tempfile import gettempdir
|
|
|
11
11
|
from typing import Any, Dict, List, Optional, Tuple, Union
|
|
12
12
|
|
|
13
13
|
from dateutil.relativedelta import relativedelta
|
|
14
|
-
from packaging.version import Version
|
|
15
14
|
|
|
16
15
|
from regscale.core.app.api import Api
|
|
17
16
|
from regscale.core.app.application import Application
|
|
@@ -28,7 +27,6 @@ from regscale.models import (
|
|
|
28
27
|
ControlParameter,
|
|
29
28
|
File,
|
|
30
29
|
ImplementationObjective,
|
|
31
|
-
ImplementationObjectiveResponsibility,
|
|
32
30
|
ImplementationOption,
|
|
33
31
|
LeveragedAuthorization,
|
|
34
32
|
Parameter,
|
|
@@ -40,6 +38,7 @@ from regscale.models import (
|
|
|
40
38
|
StakeHolder,
|
|
41
39
|
SystemRole,
|
|
42
40
|
User,
|
|
41
|
+
ImplementationControlOrigin,
|
|
43
42
|
)
|
|
44
43
|
from regscale.utils.version import RegscaleVersion
|
|
45
44
|
|
|
@@ -1400,8 +1399,7 @@ def handle_parts(
|
|
|
1400
1399
|
else control_objectives
|
|
1401
1400
|
)
|
|
1402
1401
|
logger.debug(f"Matching Objectives: {matching_objectives}")
|
|
1403
|
-
|
|
1404
|
-
if len(regscale_version) >= 10 or Version(regscale_version) >= Version("6.13.0.0"):
|
|
1402
|
+
if RegscaleVersion.meets_minimum_version("6.13.0.0"):
|
|
1405
1403
|
status = status_map.get(status, status)
|
|
1406
1404
|
|
|
1407
1405
|
# Status should never be None
|
|
@@ -1510,44 +1508,33 @@ def map_responsibility(responsibility: str) -> str:
|
|
|
1510
1508
|
:return: The mapped responsibility.
|
|
1511
1509
|
:rtype: str
|
|
1512
1510
|
"""
|
|
1513
|
-
|
|
1511
|
+
if not responsibility:
|
|
1512
|
+
return "" # Return empty string instead of None
|
|
1513
|
+
|
|
1514
|
+
# Handle comma-separated values
|
|
1515
|
+
if "," in responsibility:
|
|
1516
|
+
responsibility_values = [r.strip() for r in responsibility.split(",")]
|
|
1517
|
+
return ",".join([map_responsibility(r) for r in responsibility_values])
|
|
1518
|
+
|
|
1519
|
+
# This should be server code with proper enums, but this is the best we can do for now
|
|
1514
1520
|
responsibility_map = {
|
|
1515
|
-
"
|
|
1516
|
-
"Provider
|
|
1517
|
-
"
|
|
1518
|
-
"
|
|
1519
|
-
"
|
|
1520
|
-
"Shared
|
|
1521
|
-
"Inherited
|
|
1521
|
+
"Service Provider Corporate": ImplementationControlOrigin.SERVICE_PROVIDER_CORPORATE.value,
|
|
1522
|
+
"Service Provider System Specific": ImplementationControlOrigin.SERVICE_PROVIDER_SYSTEM.value,
|
|
1523
|
+
"Service Provider Hybrid (Corporate and System Specific)": ImplementationControlOrigin.SERVICE_PROVIDER_HYBRID.value, # Map to closest value
|
|
1524
|
+
"Configured by Customer (Customer System Specific)": ImplementationControlOrigin.CONFIGURED_BY_CUSTOMER.value,
|
|
1525
|
+
"Provided by Customer (Customer System Specific)": ImplementationControlOrigin.PROVIDED_BY_CUSTOMER.value,
|
|
1526
|
+
"Shared (Service Provider and Customer Responsibility)": ImplementationControlOrigin.SHARED.value,
|
|
1527
|
+
"Inherited from pre-existing FedRAMP Authorization": ImplementationControlOrigin.INHERITED_FROM_PRE_EXISTING_FEDRAMP_AUTHORIZATION.value,
|
|
1522
1528
|
}
|
|
1523
|
-
|
|
1524
|
-
|
|
1525
|
-
res = ImplementationObjectiveResponsibility.PROVIDER_SYSTEM_SPECIFIC.value
|
|
1526
|
-
if responsibility == SERVICE_PROVIDER_CORPORATE:
|
|
1527
|
-
res = ImplementationObjectiveResponsibility.PROVIDER.value
|
|
1528
|
-
if responsibility == "Provided by Customer (Customer System Specific)":
|
|
1529
|
-
res = ImplementationObjectiveResponsibility.CUSTOMER.value
|
|
1530
|
-
if responsibility == "Configured by Customer (Customer System Specific)":
|
|
1531
|
-
res = ImplementationObjectiveResponsibility.CUSTOMER_CONFIGURED.value
|
|
1532
|
-
if responsibility == "Service Provider Hybrid (Corporate and System Specific)":
|
|
1533
|
-
res = ImplementationObjectiveResponsibility.HYBRID.value
|
|
1534
|
-
if responsibility == "Inherited from pre-existing FedRAMP Authorization":
|
|
1535
|
-
res = ImplementationObjectiveResponsibility.INHERITED.value
|
|
1536
|
-
if responsibility == ImplementationObjectiveResponsibility.NOT_APPLICABLE.value:
|
|
1537
|
-
res = ImplementationObjectiveResponsibility.NOT_APPLICABLE.value
|
|
1538
|
-
if responsibility == "Shared (Service Provider and Customer Responsibility)":
|
|
1539
|
-
res = ImplementationObjectiveResponsibility.SHARED.value
|
|
1540
|
-
regscale_version = RegscaleVersion.get_platform_version()
|
|
1541
|
-
if len(regscale_version) >= 10 or Version(regscale_version) >= Version("6.13.0.0"):
|
|
1542
|
-
return responsibility_map.get(res, res)
|
|
1543
|
-
return res
|
|
1529
|
+
|
|
1530
|
+
return responsibility_map.get(responsibility, responsibility or "")
|
|
1544
1531
|
|
|
1545
1532
|
|
|
1546
1533
|
def handle_implementation_objectives(
|
|
1547
1534
|
objective: ControlObjective,
|
|
1548
1535
|
part_statement: str,
|
|
1549
1536
|
status: Optional[str],
|
|
1550
|
-
control_implementation: ControlImplementation,
|
|
1537
|
+
control_implementation: Union[ControlImplementation, int, None],
|
|
1551
1538
|
imp_objectives: List[ImplementationObjective],
|
|
1552
1539
|
control: SecurityControl,
|
|
1553
1540
|
duplicate: bool,
|
|
@@ -1555,26 +1542,30 @@ def handle_implementation_objectives(
|
|
|
1555
1542
|
):
|
|
1556
1543
|
"""
|
|
1557
1544
|
Handle the implementation objectives for the given objective, option, and control implementation.
|
|
1558
|
-
:param ControlObjective objective:
|
|
1559
|
-
:param str part_statement:
|
|
1560
|
-
:param Optional[str] status:
|
|
1561
|
-
:param ControlImplementation control_implementation:
|
|
1562
|
-
:param List[ImplementationObjective] imp_objectives:
|
|
1563
|
-
:param SecurityControl control:
|
|
1545
|
+
:param ControlObjective objective: The control objective.
|
|
1546
|
+
:param str part_statement: The statement text for this part.
|
|
1547
|
+
:param Optional[str] status: The implementation status.
|
|
1548
|
+
:param Union[ControlImplementation, int, None] control_implementation: The control implementation object or ID.
|
|
1549
|
+
:param List[ImplementationObjective] imp_objectives: List to collect implementation objectives.
|
|
1550
|
+
:param SecurityControl control: The security control.
|
|
1564
1551
|
:param bool duplicate: Whether the option is a duplicate will add note if True.
|
|
1565
1552
|
:param Optional[str] origination: The origination of the implementation.
|
|
1566
1553
|
"""
|
|
1567
1554
|
if isinstance(status, ControlImplementationStatus):
|
|
1568
1555
|
status = status.value
|
|
1556
|
+
|
|
1557
|
+
# Ensure part_statement is valid
|
|
1558
|
+
statement = part_statement if part_statement else ""
|
|
1559
|
+
|
|
1569
1560
|
imp_obj = ImplementationObjective(
|
|
1570
1561
|
securityControlId=control.id,
|
|
1571
|
-
implementationId=control_implementation.id,
|
|
1562
|
+
implementationId=control_implementation.id if hasattr(control_implementation, "id") else control_implementation,
|
|
1572
1563
|
objectiveId=objective.id,
|
|
1573
1564
|
optionId=None,
|
|
1574
1565
|
status=status,
|
|
1575
|
-
statement=
|
|
1566
|
+
statement=statement,
|
|
1576
1567
|
notes="#replicated-data-part" if duplicate else "",
|
|
1577
|
-
responsibility=origination
|
|
1568
|
+
responsibility=origination,
|
|
1578
1569
|
)
|
|
1579
1570
|
if imp_obj not in imp_objectives:
|
|
1580
1571
|
imp_objectives.append(imp_obj)
|
|
@@ -2341,3 +2332,58 @@ def get_max_version(entries: List[Dict]) -> Optional[str]:
|
|
|
2341
2332
|
max_version = max(max_version, version_str, key=parse_version)
|
|
2342
2333
|
logger.debug(f"Version: {max_version}")
|
|
2343
2334
|
return max_version
|
|
2335
|
+
|
|
2336
|
+
|
|
2337
|
+
def process_objective(
|
|
2338
|
+
objective: ControlObjective,
|
|
2339
|
+
processed_objective_ids: set,
|
|
2340
|
+
existing_objectives_by_objective_id: Dict,
|
|
2341
|
+
control: SecurityControl,
|
|
2342
|
+
part_statement: Optional[str],
|
|
2343
|
+
status: Optional[str],
|
|
2344
|
+
origination: Optional[str] = None,
|
|
2345
|
+
imp_objectives: List[ImplementationObjective] = None,
|
|
2346
|
+
):
|
|
2347
|
+
"""
|
|
2348
|
+
Process a single control objective.
|
|
2349
|
+
|
|
2350
|
+
:param ControlObjective objective: The objective to process.
|
|
2351
|
+
:param set processed_objective_ids: Set of already processed objective IDs.
|
|
2352
|
+
:param Dict existing_objectives_by_objective_id: Dictionary of existing objectives by ID.
|
|
2353
|
+
:param SecurityControl control: The security control.
|
|
2354
|
+
:param Optional[str] part_statement: The statement for this part, may be None.
|
|
2355
|
+
:param Optional[str] status: The implementation status for this objective.
|
|
2356
|
+
:param Optional[str] origination: The implementation origination for this objective.
|
|
2357
|
+
:param List[ImplementationObjective] imp_objectives: List to collect implementation objectives.
|
|
2358
|
+
:return: None
|
|
2359
|
+
"""
|
|
2360
|
+
logger.debug(f"Processing objective: {objective.id} - {objective.name}")
|
|
2361
|
+
|
|
2362
|
+
# Skip if already processed
|
|
2363
|
+
if objective.id in processed_objective_ids:
|
|
2364
|
+
logger.debug(f"Objective {objective.id} already processed")
|
|
2365
|
+
return
|
|
2366
|
+
|
|
2367
|
+
processed_objective_ids.add(objective.id)
|
|
2368
|
+
existing_objective = existing_objectives_by_objective_id.get(objective.id)
|
|
2369
|
+
|
|
2370
|
+
statement = part_statement if part_statement is not None else ""
|
|
2371
|
+
|
|
2372
|
+
# Update existing objective if found
|
|
2373
|
+
if existing_objective is not None:
|
|
2374
|
+
logger.debug(f"Updating existing objective: {existing_objective.id}")
|
|
2375
|
+
existing_objective.status = status
|
|
2376
|
+
existing_objective.statement = statement
|
|
2377
|
+
if origination is not None:
|
|
2378
|
+
existing_objective.responsibility = origination
|
|
2379
|
+
existing_objective.save()
|
|
2380
|
+
# Create new objective if implementation objectives list provided
|
|
2381
|
+
elif imp_objectives is not None:
|
|
2382
|
+
logger.debug(f"Creating new objective for {objective.id}")
|
|
2383
|
+
imp_obj = ImplementationObjective(
|
|
2384
|
+
objectiveId=objective.id,
|
|
2385
|
+
status=status,
|
|
2386
|
+
statement=statement,
|
|
2387
|
+
responsibility=origination,
|
|
2388
|
+
)
|
|
2389
|
+
imp_objectives.append(imp_obj)
|
|
@@ -1,9 +1,159 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.05.
|
|
4
|
-
"dateReleased": "2025-05-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.05.15",
|
|
4
|
+
"dateReleased": "2025-05-15T17:04:05.6633Z",
|
|
5
|
+
"count": 1345,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-42999",
|
|
9
|
+
"vendorProject": "SAP",
|
|
10
|
+
"product": "NetWeaver",
|
|
11
|
+
"vulnerabilityName": "SAP NetWeaver Deserialization Vulnerability",
|
|
12
|
+
"dateAdded": "2025-05-15",
|
|
13
|
+
"shortDescription": "SAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-06-05",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "SAP users must have an account to log in and access the patch: https:\/\/me.sap.com\/notes\/3604119 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-42999",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-502"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2024-12987",
|
|
24
|
+
"vendorProject": "DrayTek",
|
|
25
|
+
"product": "Vigor Routers",
|
|
26
|
+
"vulnerabilityName": "DrayTek Vigor Routers OS Command Injection Vulnerability",
|
|
27
|
+
"dateAdded": "2025-05-15",
|
|
28
|
+
"shortDescription": "DrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file \/cgi-bin\/mainfunction.cgi\/apmcfgupload of the component web management interface.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-06-05",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/fw.draytek.com.tw\/Vigor2960\/Firmware\/v1.5.1.5\/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor300B\/Firmware\/v1.5.1.5\/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor3900\/Firmware\/v1.5.1.5\/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-12987",
|
|
33
|
+
"cwes": [
|
|
34
|
+
"CWE-78"
|
|
35
|
+
]
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
"cveID": "CVE-2025-4664",
|
|
39
|
+
"vendorProject": "Google",
|
|
40
|
+
"product": "Chromium",
|
|
41
|
+
"vulnerabilityName": "Google Chromium Loader Insufficient Policy Enforcement Vulnerability",
|
|
42
|
+
"dateAdded": "2025-05-15",
|
|
43
|
+
"shortDescription": "Google Chromium contains an insufficient policy enforcement vulnerability that allows a remote attacker to leak cross-origin data via a crafted HTML page.",
|
|
44
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
45
|
+
"dueDate": "2025-06-05",
|
|
46
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
47
|
+
"notes": "https:\/\/chromereleases.googleblog.com\/2025\/05\/stable-channel-update-for-desktop_14.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4664",
|
|
48
|
+
"cwes": [
|
|
49
|
+
"CWE-346"
|
|
50
|
+
]
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
"cveID": "CVE-2025-32756",
|
|
54
|
+
"vendorProject": "Fortinet",
|
|
55
|
+
"product": "Multiple Products",
|
|
56
|
+
"vulnerabilityName": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability",
|
|
57
|
+
"dateAdded": "2025-05-14",
|
|
58
|
+
"shortDescription": "Fortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.",
|
|
59
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
60
|
+
"dueDate": "2025-06-04",
|
|
61
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
62
|
+
"notes": "https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-25-254 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32756",
|
|
63
|
+
"cwes": [
|
|
64
|
+
"CWE-124"
|
|
65
|
+
]
|
|
66
|
+
},
|
|
67
|
+
{
|
|
68
|
+
"cveID": "CVE-2025-32709",
|
|
69
|
+
"vendorProject": "Microsoft",
|
|
70
|
+
"product": "Windows",
|
|
71
|
+
"vulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability",
|
|
72
|
+
"dateAdded": "2025-05-13",
|
|
73
|
+
"shortDescription": "Microsoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.",
|
|
74
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
75
|
+
"dueDate": "2025-06-03",
|
|
76
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
77
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32709 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32709",
|
|
78
|
+
"cwes": [
|
|
79
|
+
"CWE-416"
|
|
80
|
+
]
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"cveID": "CVE-2025-30397",
|
|
84
|
+
"vendorProject": "Microsoft",
|
|
85
|
+
"product": "Windows",
|
|
86
|
+
"vulnerabilityName": "Microsoft Windows Scripting Engine Type Confusion Vulnerability",
|
|
87
|
+
"dateAdded": "2025-05-13",
|
|
88
|
+
"shortDescription": "Microsoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.",
|
|
89
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
90
|
+
"dueDate": "2025-06-03",
|
|
91
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
92
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-30397 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30397",
|
|
93
|
+
"cwes": [
|
|
94
|
+
"CWE-843"
|
|
95
|
+
]
|
|
96
|
+
},
|
|
97
|
+
{
|
|
98
|
+
"cveID": "CVE-2025-32706",
|
|
99
|
+
"vendorProject": "Microsoft",
|
|
100
|
+
"product": "Windows",
|
|
101
|
+
"vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability",
|
|
102
|
+
"dateAdded": "2025-05-13",
|
|
103
|
+
"shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.",
|
|
104
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
105
|
+
"dueDate": "2025-06-03",
|
|
106
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
107
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32706 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32706",
|
|
108
|
+
"cwes": [
|
|
109
|
+
"CWE-122"
|
|
110
|
+
]
|
|
111
|
+
},
|
|
112
|
+
{
|
|
113
|
+
"cveID": "CVE-2025-32701",
|
|
114
|
+
"vendorProject": "Microsoft",
|
|
115
|
+
"product": "Windows",
|
|
116
|
+
"vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability",
|
|
117
|
+
"dateAdded": "2025-05-13",
|
|
118
|
+
"shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
|
|
119
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
120
|
+
"dueDate": "2025-06-03",
|
|
121
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
122
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32701 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32701",
|
|
123
|
+
"cwes": [
|
|
124
|
+
"CWE-416"
|
|
125
|
+
]
|
|
126
|
+
},
|
|
127
|
+
{
|
|
128
|
+
"cveID": "CVE-2025-30400",
|
|
129
|
+
"vendorProject": "Microsoft",
|
|
130
|
+
"product": "Windows",
|
|
131
|
+
"vulnerabilityName": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability",
|
|
132
|
+
"dateAdded": "2025-05-13",
|
|
133
|
+
"shortDescription": "Microsoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
|
|
134
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
135
|
+
"dueDate": "2025-06-03",
|
|
136
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
137
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-30400 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30400",
|
|
138
|
+
"cwes": [
|
|
139
|
+
"CWE-416"
|
|
140
|
+
]
|
|
141
|
+
},
|
|
142
|
+
{
|
|
143
|
+
"cveID": "CVE-2025-47729",
|
|
144
|
+
"vendorProject": "TeleMessage",
|
|
145
|
+
"product": "TM SGNL",
|
|
146
|
+
"vulnerabilityName": "TeleMessage TM SGNL Hidden Functionality Vulnerability",
|
|
147
|
+
"dateAdded": "2025-05-12",
|
|
148
|
+
"shortDescription": "TeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users.",
|
|
149
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
150
|
+
"dueDate": "2025-06-02",
|
|
151
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
152
|
+
"notes": "Apply mitigations per vendor instructions. Absent mitigating instructions from the vendor, discontinue use of the product. ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-47729",
|
|
153
|
+
"cwes": [
|
|
154
|
+
"CWE-912"
|
|
155
|
+
]
|
|
156
|
+
},
|
|
7
157
|
{
|
|
8
158
|
"cveID": "CVE-2024-11120",
|
|
9
159
|
"vendorProject": "GeoVision",
|
|
@@ -133,7 +283,7 @@
|
|
|
133
283
|
"shortDescription": "SAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.",
|
|
134
284
|
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
135
285
|
"dueDate": "2025-05-20",
|
|
136
|
-
"knownRansomwareCampaignUse": "
|
|
286
|
+
"knownRansomwareCampaignUse": "Known",
|
|
137
287
|
"notes": "https:\/\/me.sap.com\/notes\/3594142 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31324",
|
|
138
288
|
"cwes": [
|
|
139
289
|
"CWE-434"
|
|
@@ -322,7 +472,7 @@
|
|
|
322
472
|
"shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
|
|
323
473
|
"requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.",
|
|
324
474
|
"dueDate": "2025-04-11",
|
|
325
|
-
"knownRansomwareCampaignUse": "
|
|
475
|
+
"knownRansomwareCampaignUse": "Known",
|
|
326
476
|
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
|
|
327
477
|
"cwes": [
|
|
328
478
|
"CWE-121"
|
|
@@ -1250,7 +1400,7 @@
|
|
|
1250
1400
|
"shortDescription": "SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.",
|
|
1251
1401
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
1252
1402
|
"dueDate": "2025-02-14",
|
|
1253
|
-
"knownRansomwareCampaignUse": "
|
|
1403
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1254
1404
|
"notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2025-0002 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-23006",
|
|
1255
1405
|
"cwes": [
|
|
1256
1406
|
"CWE-502"
|
|
@@ -1385,7 +1535,7 @@
|
|
|
1385
1535
|
"shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.",
|
|
1386
1536
|
"requiredAction": "Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",
|
|
1387
1537
|
"dueDate": "2025-01-15",
|
|
1388
|
-
"knownRansomwareCampaignUse": "
|
|
1538
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1389
1539
|
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0282",
|
|
1390
1540
|
"cwes": [
|
|
1391
1541
|
"CWE-121"
|
|
@@ -1413,7 +1563,7 @@
|
|
|
1413
1563
|
"shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
|
|
1414
1564
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
1415
1565
|
"dueDate": "2025-01-28",
|
|
1416
|
-
"knownRansomwareCampaignUse": "
|
|
1566
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1417
1567
|
"notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-55550",
|
|
1418
1568
|
"cwes": [
|
|
1419
1569
|
"CWE-22"
|
|
@@ -1428,7 +1578,7 @@
|
|
|
1428
1578
|
"shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
|
|
1429
1579
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
1430
1580
|
"dueDate": "2025-01-28",
|
|
1431
|
-
"knownRansomwareCampaignUse": "
|
|
1581
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1432
1582
|
"notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41713 ",
|
|
1433
1583
|
"cwes": [
|
|
1434
1584
|
"CWE-22"
|
|
@@ -1787,7 +1937,7 @@
|
|
|
1787
1937
|
"shortDescription": "Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.",
|
|
1788
1938
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.",
|
|
1789
1939
|
"dueDate": "2024-12-09",
|
|
1790
|
-
"knownRansomwareCampaignUse": "
|
|
1940
|
+
"knownRansomwareCampaignUse": "Known",
|
|
1791
1941
|
"notes": "https:\/\/security.paloaltonetworks.com\/CVE-2024-0012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0012",
|
|
1792
1942
|
"cwes": [
|
|
1793
1943
|
"CWE-306"
|
|
@@ -5029,7 +5179,7 @@
|
|
|
5029
5179
|
"shortDescription": "Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert\/maintenance\/diagnostic\/nslookup URI.",
|
|
5030
5180
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
5031
5181
|
"dueDate": "2023-10-09",
|
|
5032
|
-
"knownRansomwareCampaignUse": "
|
|
5182
|
+
"knownRansomwareCampaignUse": "Known",
|
|
5033
5183
|
"notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https:\/\/www.zyxelguard.com\/Zyxel-EOL.asp; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-6884",
|
|
5034
5184
|
"cwes": [
|
|
5035
5185
|
"CWE-78"
|
|
@@ -7170,7 +7320,7 @@
|
|
|
7170
7320
|
"shortDescription": "Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.",
|
|
7171
7321
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
7172
7322
|
"dueDate": "2022-12-09",
|
|
7173
|
-
"knownRansomwareCampaignUse": "
|
|
7323
|
+
"knownRansomwareCampaignUse": "Known",
|
|
7174
7324
|
"notes": "https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-41091; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41091",
|
|
7175
7325
|
"cwes": [
|
|
7176
7326
|
"CWE-863"
|
|
@@ -7875,7 +8025,7 @@
|
|
|
7875
8025
|
"shortDescription": "WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.",
|
|
7876
8026
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
7877
8027
|
"dueDate": "2022-09-15",
|
|
7878
|
-
"knownRansomwareCampaignUse": "
|
|
8028
|
+
"knownRansomwareCampaignUse": "Known",
|
|
7879
8029
|
"notes": "https:\/\/groups.google.com\/g\/discuss-webrtc\/c\/5KBtZx2gvcQ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-2294",
|
|
7880
8030
|
"cwes": [
|
|
7881
8031
|
"CWE-122"
|
|
@@ -8326,7 +8476,7 @@
|
|
|
8326
8476
|
"shortDescription": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application.",
|
|
8327
8477
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
8328
8478
|
"dueDate": "2022-07-05",
|
|
8329
|
-
"knownRansomwareCampaignUse": "
|
|
8479
|
+
"knownRansomwareCampaignUse": "Known",
|
|
8330
8480
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-30190",
|
|
8331
8481
|
"cwes": [
|
|
8332
8482
|
"CWE-610"
|
|
@@ -11412,7 +11562,7 @@
|
|
|
11412
11562
|
"shortDescription": "Microsoft Windows Print Spooler contains an unspecified vulnerability which can allow for privilege escalation.",
|
|
11413
11563
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
11414
11564
|
"dueDate": "2022-04-15",
|
|
11415
|
-
"knownRansomwareCampaignUse": "
|
|
11565
|
+
"knownRansomwareCampaignUse": "Known",
|
|
11416
11566
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-21999",
|
|
11417
11567
|
"cwes": [
|
|
11418
11568
|
"CWE-40",
|
|
@@ -13604,7 +13754,7 @@
|
|
|
13604
13754
|
"shortDescription": "Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.",
|
|
13605
13755
|
"requiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
|
|
13606
13756
|
"dueDate": "2022-03-24",
|
|
13607
|
-
"knownRansomwareCampaignUse": "
|
|
13757
|
+
"knownRansomwareCampaignUse": "Known",
|
|
13608
13758
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7645",
|
|
13609
13759
|
"cwes": []
|
|
13610
13760
|
},
|
|
@@ -14098,7 +14248,7 @@
|
|
|
14098
14248
|
"shortDescription": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.",
|
|
14099
14249
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
14100
14250
|
"dueDate": "2022-03-24",
|
|
14101
|
-
"knownRansomwareCampaignUse": "
|
|
14251
|
+
"knownRansomwareCampaignUse": "Known",
|
|
14102
14252
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2008-2992",
|
|
14103
14253
|
"cwes": [
|
|
14104
14254
|
"CWE-119"
|
|
@@ -15215,7 +15365,7 @@
|
|
|
15215
15365
|
"shortDescription": "Microsoft Windows AppX Installer contains a spoofing vulnerability which has a high impacts to confidentiality, integrity, and availability.",
|
|
15216
15366
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
15217
15367
|
"dueDate": "2021-12-29",
|
|
15218
|
-
"knownRansomwareCampaignUse": "
|
|
15368
|
+
"knownRansomwareCampaignUse": "Known",
|
|
15219
15369
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43890",
|
|
15220
15370
|
"cwes": []
|
|
15221
15371
|
},
|
|
@@ -16340,7 +16490,7 @@
|
|
|
16340
16490
|
"shortDescription": "Atlassian Crowd and Crowd Data Center contain a remote code execution vulnerability resulting from a pdkinstall development plugin being incorrectly enabled in release builds.",
|
|
16341
16491
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
16342
16492
|
"dueDate": "2022-05-03",
|
|
16343
|
-
"knownRansomwareCampaignUse": "
|
|
16493
|
+
"knownRansomwareCampaignUse": "Known",
|
|
16344
16494
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11580",
|
|
16345
16495
|
"cwes": []
|
|
16346
16496
|
},
|
|
@@ -16756,7 +16906,7 @@
|
|
|
16756
16906
|
"shortDescription": "GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.",
|
|
16757
16907
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
16758
16908
|
"dueDate": "2021-11-17",
|
|
16759
|
-
"knownRansomwareCampaignUse": "
|
|
16909
|
+
"knownRansomwareCampaignUse": "Known",
|
|
16760
16910
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22205",
|
|
16761
16911
|
"cwes": [
|
|
16762
16912
|
"CWE-20",
|
|
@@ -17421,7 +17571,7 @@
|
|
|
17421
17571
|
"shortDescription": "Microsoft Windows Active Directory contains a privilege escalation vulnerability due to the way it distributes passwords that are configured using Group Policy preferences. An authenticated attacker who successfully exploits the vulnerability could decrypt the passwords and use them to elevate privileges on the domain.",
|
|
17422
17572
|
"requiredAction": "Apply updates per vendor instructions.",
|
|
17423
17573
|
"dueDate": "2022-05-03",
|
|
17424
|
-
"knownRansomwareCampaignUse": "
|
|
17574
|
+
"knownRansomwareCampaignUse": "Known",
|
|
17425
17575
|
"notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-1812",
|
|
17426
17576
|
"cwes": [
|
|
17427
17577
|
"CWE-255"
|