regscale-cli 6.19.2.0__py3-none-any.whl → 6.20.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

Files changed (27) hide show
  1. regscale/__init__.py +1 -1
  2. regscale/airflow/config.py +2 -0
  3. regscale/airflow/tasks/groups.py +11 -47
  4. regscale/core/app/internal/login.py +49 -43
  5. regscale/core/app/internal/model_editor.py +2 -1
  6. regscale/dev/code_gen.py +2 -5
  7. regscale/integrations/commercial/synqly/assets.py +10 -0
  8. regscale/integrations/public/fedramp/appendix_parser.py +499 -104
  9. regscale/integrations/public/fedramp/fedramp_five.py +89 -43
  10. regscale/models/integration_models/cisa_kev_data.json +171 -21
  11. regscale/models/integration_models/synqly_models/capabilities.json +1 -1
  12. regscale/models/regscale_models/__init__.py +5 -0
  13. regscale/models/regscale_models/business_impact_assessment.py +71 -0
  14. regscale/models/regscale_models/control_implementation.py +15 -0
  15. regscale/models/regscale_models/master_assessment.py +19 -0
  16. regscale/models/regscale_models/policy.py +90 -0
  17. regscale/models/regscale_models/question.py +30 -2
  18. regscale/models/regscale_models/questionnaire.py +4 -3
  19. regscale/models/regscale_models/questionnaire_instance.py +37 -14
  20. regscale/models/regscale_models/rbac.py +0 -1
  21. regscale/models/regscale_models/risk_trend.py +67 -0
  22. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/METADATA +114 -55
  23. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/RECORD +27 -24
  24. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/LICENSE +0 -0
  25. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/WHEEL +0 -0
  26. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/entry_points.txt +0 -0
  27. {regscale_cli-6.19.2.0.dist-info → regscale_cli-6.20.0.0.dist-info}/top_level.txt +0 -0
@@ -11,7 +11,6 @@ from tempfile import gettempdir
11
11
  from typing import Any, Dict, List, Optional, Tuple, Union
12
12
 
13
13
  from dateutil.relativedelta import relativedelta
14
- from packaging.version import Version
15
14
 
16
15
  from regscale.core.app.api import Api
17
16
  from regscale.core.app.application import Application
@@ -28,7 +27,6 @@ from regscale.models import (
28
27
  ControlParameter,
29
28
  File,
30
29
  ImplementationObjective,
31
- ImplementationObjectiveResponsibility,
32
30
  ImplementationOption,
33
31
  LeveragedAuthorization,
34
32
  Parameter,
@@ -40,6 +38,7 @@ from regscale.models import (
40
38
  StakeHolder,
41
39
  SystemRole,
42
40
  User,
41
+ ImplementationControlOrigin,
43
42
  )
44
43
  from regscale.utils.version import RegscaleVersion
45
44
 
@@ -1400,8 +1399,7 @@ def handle_parts(
1400
1399
  else control_objectives
1401
1400
  )
1402
1401
  logger.debug(f"Matching Objectives: {matching_objectives}")
1403
- regscale_version = RegscaleVersion.get_platform_version()
1404
- if len(regscale_version) >= 10 or Version(regscale_version) >= Version("6.13.0.0"):
1402
+ if RegscaleVersion.meets_minimum_version("6.13.0.0"):
1405
1403
  status = status_map.get(status, status)
1406
1404
 
1407
1405
  # Status should never be None
@@ -1510,44 +1508,33 @@ def map_responsibility(responsibility: str) -> str:
1510
1508
  :return: The mapped responsibility.
1511
1509
  :rtype: str
1512
1510
  """
1513
- # This should be server code, sorry
1511
+ if not responsibility:
1512
+ return "" # Return empty string instead of None
1513
+
1514
+ # Handle comma-separated values
1515
+ if "," in responsibility:
1516
+ responsibility_values = [r.strip() for r in responsibility.split(",")]
1517
+ return ",".join([map_responsibility(r) for r in responsibility_values])
1518
+
1519
+ # This should be server code with proper enums, but this is the best we can do for now
1514
1520
  responsibility_map = {
1515
- "Provider": "Service Provider Corporate",
1516
- "Provider (System Specific)": "Service Provider System Specific",
1517
- "Customer": "Provided by Customer (Customer System Specific)",
1518
- "Hybrid": "Service Provider Hybrid (Corporate and System Specific)",
1519
- "Customer Configured": "Configured by Customer (Customer System Specific)",
1520
- "Shared": "Shared (Service Provider and Customer Responsibility)",
1521
- "Inherited": "Inherited from pre-existing FedRAMP Authorization",
1521
+ "Service Provider Corporate": ImplementationControlOrigin.SERVICE_PROVIDER_CORPORATE.value,
1522
+ "Service Provider System Specific": ImplementationControlOrigin.SERVICE_PROVIDER_SYSTEM.value,
1523
+ "Service Provider Hybrid (Corporate and System Specific)": ImplementationControlOrigin.SERVICE_PROVIDER_HYBRID.value, # Map to closest value
1524
+ "Configured by Customer (Customer System Specific)": ImplementationControlOrigin.CONFIGURED_BY_CUSTOMER.value,
1525
+ "Provided by Customer (Customer System Specific)": ImplementationControlOrigin.PROVIDED_BY_CUSTOMER.value,
1526
+ "Shared (Service Provider and Customer Responsibility)": ImplementationControlOrigin.SHARED.value,
1527
+ "Inherited from pre-existing FedRAMP Authorization": ImplementationControlOrigin.INHERITED_FROM_PRE_EXISTING_FEDRAMP_AUTHORIZATION.value,
1522
1528
  }
1523
- res = ""
1524
- if responsibility == "Service Provider System Specific":
1525
- res = ImplementationObjectiveResponsibility.PROVIDER_SYSTEM_SPECIFIC.value
1526
- if responsibility == SERVICE_PROVIDER_CORPORATE:
1527
- res = ImplementationObjectiveResponsibility.PROVIDER.value
1528
- if responsibility == "Provided by Customer (Customer System Specific)":
1529
- res = ImplementationObjectiveResponsibility.CUSTOMER.value
1530
- if responsibility == "Configured by Customer (Customer System Specific)":
1531
- res = ImplementationObjectiveResponsibility.CUSTOMER_CONFIGURED.value
1532
- if responsibility == "Service Provider Hybrid (Corporate and System Specific)":
1533
- res = ImplementationObjectiveResponsibility.HYBRID.value
1534
- if responsibility == "Inherited from pre-existing FedRAMP Authorization":
1535
- res = ImplementationObjectiveResponsibility.INHERITED.value
1536
- if responsibility == ImplementationObjectiveResponsibility.NOT_APPLICABLE.value:
1537
- res = ImplementationObjectiveResponsibility.NOT_APPLICABLE.value
1538
- if responsibility == "Shared (Service Provider and Customer Responsibility)":
1539
- res = ImplementationObjectiveResponsibility.SHARED.value
1540
- regscale_version = RegscaleVersion.get_platform_version()
1541
- if len(regscale_version) >= 10 or Version(regscale_version) >= Version("6.13.0.0"):
1542
- return responsibility_map.get(res, res)
1543
- return res
1529
+
1530
+ return responsibility_map.get(responsibility, responsibility or "")
1544
1531
 
1545
1532
 
1546
1533
  def handle_implementation_objectives(
1547
1534
  objective: ControlObjective,
1548
1535
  part_statement: str,
1549
1536
  status: Optional[str],
1550
- control_implementation: ControlImplementation,
1537
+ control_implementation: Union[ControlImplementation, int, None],
1551
1538
  imp_objectives: List[ImplementationObjective],
1552
1539
  control: SecurityControl,
1553
1540
  duplicate: bool,
@@ -1555,26 +1542,30 @@ def handle_implementation_objectives(
1555
1542
  ):
1556
1543
  """
1557
1544
  Handle the implementation objectives for the given objective, option, and control implementation.
1558
- :param ControlObjective objective:
1559
- :param str part_statement:
1560
- :param Optional[str] status:
1561
- :param ControlImplementation control_implementation:
1562
- :param List[ImplementationObjective] imp_objectives:
1563
- :param SecurityControl control:
1545
+ :param ControlObjective objective: The control objective.
1546
+ :param str part_statement: The statement text for this part.
1547
+ :param Optional[str] status: The implementation status.
1548
+ :param Union[ControlImplementation, int, None] control_implementation: The control implementation object or ID.
1549
+ :param List[ImplementationObjective] imp_objectives: List to collect implementation objectives.
1550
+ :param SecurityControl control: The security control.
1564
1551
  :param bool duplicate: Whether the option is a duplicate will add note if True.
1565
1552
  :param Optional[str] origination: The origination of the implementation.
1566
1553
  """
1567
1554
  if isinstance(status, ControlImplementationStatus):
1568
1555
  status = status.value
1556
+
1557
+ # Ensure part_statement is valid
1558
+ statement = part_statement if part_statement else ""
1559
+
1569
1560
  imp_obj = ImplementationObjective(
1570
1561
  securityControlId=control.id,
1571
- implementationId=control_implementation.id,
1562
+ implementationId=control_implementation.id if hasattr(control_implementation, "id") else control_implementation,
1572
1563
  objectiveId=objective.id,
1573
1564
  optionId=None,
1574
1565
  status=status,
1575
- statement=part_statement,
1566
+ statement=statement,
1576
1567
  notes="#replicated-data-part" if duplicate else "",
1577
- responsibility=origination if origination else None,
1568
+ responsibility=origination,
1578
1569
  )
1579
1570
  if imp_obj not in imp_objectives:
1580
1571
  imp_objectives.append(imp_obj)
@@ -2341,3 +2332,58 @@ def get_max_version(entries: List[Dict]) -> Optional[str]:
2341
2332
  max_version = max(max_version, version_str, key=parse_version)
2342
2333
  logger.debug(f"Version: {max_version}")
2343
2334
  return max_version
2335
+
2336
+
2337
+ def process_objective(
2338
+ objective: ControlObjective,
2339
+ processed_objective_ids: set,
2340
+ existing_objectives_by_objective_id: Dict,
2341
+ control: SecurityControl,
2342
+ part_statement: Optional[str],
2343
+ status: Optional[str],
2344
+ origination: Optional[str] = None,
2345
+ imp_objectives: List[ImplementationObjective] = None,
2346
+ ):
2347
+ """
2348
+ Process a single control objective.
2349
+
2350
+ :param ControlObjective objective: The objective to process.
2351
+ :param set processed_objective_ids: Set of already processed objective IDs.
2352
+ :param Dict existing_objectives_by_objective_id: Dictionary of existing objectives by ID.
2353
+ :param SecurityControl control: The security control.
2354
+ :param Optional[str] part_statement: The statement for this part, may be None.
2355
+ :param Optional[str] status: The implementation status for this objective.
2356
+ :param Optional[str] origination: The implementation origination for this objective.
2357
+ :param List[ImplementationObjective] imp_objectives: List to collect implementation objectives.
2358
+ :return: None
2359
+ """
2360
+ logger.debug(f"Processing objective: {objective.id} - {objective.name}")
2361
+
2362
+ # Skip if already processed
2363
+ if objective.id in processed_objective_ids:
2364
+ logger.debug(f"Objective {objective.id} already processed")
2365
+ return
2366
+
2367
+ processed_objective_ids.add(objective.id)
2368
+ existing_objective = existing_objectives_by_objective_id.get(objective.id)
2369
+
2370
+ statement = part_statement if part_statement is not None else ""
2371
+
2372
+ # Update existing objective if found
2373
+ if existing_objective is not None:
2374
+ logger.debug(f"Updating existing objective: {existing_objective.id}")
2375
+ existing_objective.status = status
2376
+ existing_objective.statement = statement
2377
+ if origination is not None:
2378
+ existing_objective.responsibility = origination
2379
+ existing_objective.save()
2380
+ # Create new objective if implementation objectives list provided
2381
+ elif imp_objectives is not None:
2382
+ logger.debug(f"Creating new objective for {objective.id}")
2383
+ imp_obj = ImplementationObjective(
2384
+ objectiveId=objective.id,
2385
+ status=status,
2386
+ statement=statement,
2387
+ responsibility=origination,
2388
+ )
2389
+ imp_objectives.append(imp_obj)
@@ -1,9 +1,159 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.05.08",
4
- "dateReleased": "2025-05-08T15:49:01.7238Z",
5
- "count": 1335,
3
+ "catalogVersion": "2025.05.15",
4
+ "dateReleased": "2025-05-15T17:04:05.6633Z",
5
+ "count": 1345,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-42999",
9
+ "vendorProject": "SAP",
10
+ "product": "NetWeaver",
11
+ "vulnerabilityName": "SAP NetWeaver Deserialization Vulnerability",
12
+ "dateAdded": "2025-05-15",
13
+ "shortDescription": "SAP NetWeaver Visual Composer Metadata Uploader contains a deserialization vulnerability that allows a privileged attacker to compromise the confidentiality, integrity, and availability of the host system by deserializing untrusted or malicious content.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-06-05",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "SAP users must have an account to log in and access the patch: https:\/\/me.sap.com\/notes\/3604119 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-42999",
18
+ "cwes": [
19
+ "CWE-502"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2024-12987",
24
+ "vendorProject": "DrayTek",
25
+ "product": "Vigor Routers",
26
+ "vulnerabilityName": "DrayTek Vigor Routers OS Command Injection Vulnerability",
27
+ "dateAdded": "2025-05-15",
28
+ "shortDescription": "DrayTek Vigor2960, Vigor300B, and Vigor3900 routers contain an OS command injection vulnerability due to an unknown function of the file \/cgi-bin\/mainfunction.cgi\/apmcfgupload of the component web management interface.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-06-05",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/fw.draytek.com.tw\/Vigor2960\/Firmware\/v1.5.1.5\/DrayTek_Vigor2960_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor300B\/Firmware\/v1.5.1.5\/DrayTek_Vigor300B_V1.5.1.5_01release-note.pdf ; https:\/\/fw.draytek.com.tw\/Vigor3900\/Firmware\/v1.5.1.5\/DrayTek_Vigor3900_V1.5.1.5_01release-note.pdf ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-12987",
33
+ "cwes": [
34
+ "CWE-78"
35
+ ]
36
+ },
37
+ {
38
+ "cveID": "CVE-2025-4664",
39
+ "vendorProject": "Google",
40
+ "product": "Chromium",
41
+ "vulnerabilityName": "Google Chromium Loader Insufficient Policy Enforcement Vulnerability",
42
+ "dateAdded": "2025-05-15",
43
+ "shortDescription": "Google Chromium contains an insufficient policy enforcement vulnerability that allows a remote attacker to leak cross-origin data via a crafted HTML page.",
44
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45
+ "dueDate": "2025-06-05",
46
+ "knownRansomwareCampaignUse": "Unknown",
47
+ "notes": "https:\/\/chromereleases.googleblog.com\/2025\/05\/stable-channel-update-for-desktop_14.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4664",
48
+ "cwes": [
49
+ "CWE-346"
50
+ ]
51
+ },
52
+ {
53
+ "cveID": "CVE-2025-32756",
54
+ "vendorProject": "Fortinet",
55
+ "product": "Multiple Products",
56
+ "vulnerabilityName": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability",
57
+ "dateAdded": "2025-05-14",
58
+ "shortDescription": "Fortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.",
59
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
60
+ "dueDate": "2025-06-04",
61
+ "knownRansomwareCampaignUse": "Unknown",
62
+ "notes": "https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-25-254 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32756",
63
+ "cwes": [
64
+ "CWE-124"
65
+ ]
66
+ },
67
+ {
68
+ "cveID": "CVE-2025-32709",
69
+ "vendorProject": "Microsoft",
70
+ "product": "Windows",
71
+ "vulnerabilityName": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability",
72
+ "dateAdded": "2025-05-13",
73
+ "shortDescription": "Microsoft Windows Ancillary Function Driver for WinSock contains a use-after-free vulnerability that allows an authorized attacker to escalate privileges to administrator.",
74
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
75
+ "dueDate": "2025-06-03",
76
+ "knownRansomwareCampaignUse": "Unknown",
77
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32709 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32709",
78
+ "cwes": [
79
+ "CWE-416"
80
+ ]
81
+ },
82
+ {
83
+ "cveID": "CVE-2025-30397",
84
+ "vendorProject": "Microsoft",
85
+ "product": "Windows",
86
+ "vulnerabilityName": "Microsoft Windows Scripting Engine Type Confusion Vulnerability",
87
+ "dateAdded": "2025-05-13",
88
+ "shortDescription": "Microsoft Windows Scripting Engine contains a type confusion vulnerability that allows an unauthorized attacker to execute code over a network via a specially crafted URL.",
89
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
90
+ "dueDate": "2025-06-03",
91
+ "knownRansomwareCampaignUse": "Unknown",
92
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-30397 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30397",
93
+ "cwes": [
94
+ "CWE-843"
95
+ ]
96
+ },
97
+ {
98
+ "cveID": "CVE-2025-32706",
99
+ "vendorProject": "Microsoft",
100
+ "product": "Windows",
101
+ "vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability",
102
+ "dateAdded": "2025-05-13",
103
+ "shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.",
104
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
105
+ "dueDate": "2025-06-03",
106
+ "knownRansomwareCampaignUse": "Unknown",
107
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32706 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32706",
108
+ "cwes": [
109
+ "CWE-122"
110
+ ]
111
+ },
112
+ {
113
+ "cveID": "CVE-2025-32701",
114
+ "vendorProject": "Microsoft",
115
+ "product": "Windows",
116
+ "vulnerabilityName": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability",
117
+ "dateAdded": "2025-05-13",
118
+ "shortDescription": "Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
119
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
120
+ "dueDate": "2025-06-03",
121
+ "knownRansomwareCampaignUse": "Unknown",
122
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-32701 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32701",
123
+ "cwes": [
124
+ "CWE-416"
125
+ ]
126
+ },
127
+ {
128
+ "cveID": "CVE-2025-30400",
129
+ "vendorProject": "Microsoft",
130
+ "product": "Windows",
131
+ "vulnerabilityName": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability",
132
+ "dateAdded": "2025-05-13",
133
+ "shortDescription": "Microsoft Windows DWM Core Library contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.",
134
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
135
+ "dueDate": "2025-06-03",
136
+ "knownRansomwareCampaignUse": "Unknown",
137
+ "notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-30400 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-30400",
138
+ "cwes": [
139
+ "CWE-416"
140
+ ]
141
+ },
142
+ {
143
+ "cveID": "CVE-2025-47729",
144
+ "vendorProject": "TeleMessage",
145
+ "product": "TM SGNL",
146
+ "vulnerabilityName": "TeleMessage TM SGNL Hidden Functionality Vulnerability",
147
+ "dateAdded": "2025-05-12",
148
+ "shortDescription": "TeleMessage TM SGNL contains a hidden functionality vulnerability in which the archiving backend holds cleartext copies of messages from TM SGNL application users.",
149
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
150
+ "dueDate": "2025-06-02",
151
+ "knownRansomwareCampaignUse": "Unknown",
152
+ "notes": "Apply mitigations per vendor instructions. Absent mitigating instructions from the vendor, discontinue use of the product. ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-47729",
153
+ "cwes": [
154
+ "CWE-912"
155
+ ]
156
+ },
7
157
  {
8
158
  "cveID": "CVE-2024-11120",
9
159
  "vendorProject": "GeoVision",
@@ -133,7 +283,7 @@
133
283
  "shortDescription": "SAP NetWeaver Visual Composer Metadata Uploader contains an unrestricted file upload vulnerability that allows an unauthenticated agent to upload potentially malicious executable binaries.",
134
284
  "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
135
285
  "dueDate": "2025-05-20",
136
- "knownRansomwareCampaignUse": "Unknown",
286
+ "knownRansomwareCampaignUse": "Known",
137
287
  "notes": "https:\/\/me.sap.com\/notes\/3594142 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-31324",
138
288
  "cwes": [
139
289
  "CWE-434"
@@ -322,7 +472,7 @@
322
472
  "shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contains a stack-based buffer overflow vulnerability that allows a remote unauthenticated attacker to achieve remote code execution. ",
323
473
  "requiredAction": "Apply mitigations as set forth in the CISA instructions linked below.",
324
474
  "dueDate": "2025-04-11",
325
- "knownRansomwareCampaignUse": "Unknown",
475
+ "knownRansomwareCampaignUse": "Known",
326
476
  "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-cve-2025-22457 ; Additional References: https:\/\/forums.ivanti.com\/s\/article\/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-22457",
327
477
  "cwes": [
328
478
  "CWE-121"
@@ -1250,7 +1400,7 @@
1250
1400
  "shortDescription": "SonicWall SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC) contain a deserialization of untrusted data vulnerability, which can enable a remote, unauthenticated attacker to execute arbitrary OS commands.",
1251
1401
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1252
1402
  "dueDate": "2025-02-14",
1253
- "knownRansomwareCampaignUse": "Unknown",
1403
+ "knownRansomwareCampaignUse": "Known",
1254
1404
  "notes": "https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2025-0002 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-23006",
1255
1405
  "cwes": [
1256
1406
  "CWE-502"
@@ -1385,7 +1535,7 @@
1385
1535
  "shortDescription": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways contain a stack-based buffer overflow which can lead to unauthenticated remote code execution.",
1386
1536
  "requiredAction": "Apply mitigations as set forth in the CISA instructions linked below to include conducting hunt activities, taking remediation actions if applicable, and applying updates prior to returning a device to service.",
1387
1537
  "dueDate": "2025-01-15",
1388
- "knownRansomwareCampaignUse": "Unknown",
1538
+ "knownRansomwareCampaignUse": "Known",
1389
1539
  "notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/cisa-mitigation-instructions-CVE-2025-0282 Additional References: https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-0282",
1390
1540
  "cwes": [
1391
1541
  "CWE-121"
@@ -1413,7 +1563,7 @@
1413
1563
  "shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
1414
1564
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1415
1565
  "dueDate": "2025-01-28",
1416
- "knownRansomwareCampaignUse": "Unknown",
1566
+ "knownRansomwareCampaignUse": "Known",
1417
1567
  "notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-55550",
1418
1568
  "cwes": [
1419
1569
  "CWE-22"
@@ -1428,7 +1578,7 @@
1428
1578
  "shortDescription": "Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.",
1429
1579
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1430
1580
  "dueDate": "2025-01-28",
1431
- "knownRansomwareCampaignUse": "Unknown",
1581
+ "knownRansomwareCampaignUse": "Known",
1432
1582
  "notes": "https:\/\/www.mitel.com\/support\/security-advisories\/mitel-product-security-advisory-misa-2024-0029 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-41713 ",
1433
1583
  "cwes": [
1434
1584
  "CWE-22"
@@ -1787,7 +1937,7 @@
1787
1937
  "shortDescription": "Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.",
1788
1938
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.",
1789
1939
  "dueDate": "2024-12-09",
1790
- "knownRansomwareCampaignUse": "Unknown",
1940
+ "knownRansomwareCampaignUse": "Known",
1791
1941
  "notes": "https:\/\/security.paloaltonetworks.com\/CVE-2024-0012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0012",
1792
1942
  "cwes": [
1793
1943
  "CWE-306"
@@ -5029,7 +5179,7 @@
5029
5179
  "shortDescription": "Zyxel EMG2926 routers contain a command injection vulnerability located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute malicious commands on the router, such as the ping_ip parameter to the expert\/maintenance\/diagnostic\/nslookup URI.",
5030
5180
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
5031
5181
  "dueDate": "2023-10-09",
5032
- "knownRansomwareCampaignUse": "Unknown",
5182
+ "knownRansomwareCampaignUse": "Known",
5033
5183
  "notes": "https:\/\/www.zyxel.com\/global\/en\/support\/security-advisories\/zyxel-security-advisory-for-command-injection-vulnerability-in-emg2926-q10a-ethernet-cpe, https:\/\/www.zyxelguard.com\/Zyxel-EOL.asp; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-6884",
5034
5184
  "cwes": [
5035
5185
  "CWE-78"
@@ -7170,7 +7320,7 @@
7170
7320
  "shortDescription": "Microsoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.",
7171
7321
  "requiredAction": "Apply updates per vendor instructions.",
7172
7322
  "dueDate": "2022-12-09",
7173
- "knownRansomwareCampaignUse": "Unknown",
7323
+ "knownRansomwareCampaignUse": "Known",
7174
7324
  "notes": "https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2022-41091; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-41091",
7175
7325
  "cwes": [
7176
7326
  "CWE-863"
@@ -7875,7 +8025,7 @@
7875
8025
  "shortDescription": "WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.",
7876
8026
  "requiredAction": "Apply updates per vendor instructions.",
7877
8027
  "dueDate": "2022-09-15",
7878
- "knownRansomwareCampaignUse": "Unknown",
8028
+ "knownRansomwareCampaignUse": "Known",
7879
8029
  "notes": "https:\/\/groups.google.com\/g\/discuss-webrtc\/c\/5KBtZx2gvcQ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-2294",
7880
8030
  "cwes": [
7881
8031
  "CWE-122"
@@ -8326,7 +8476,7 @@
8326
8476
  "shortDescription": "A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run code with the privileges of the calling application.",
8327
8477
  "requiredAction": "Apply updates per vendor instructions.",
8328
8478
  "dueDate": "2022-07-05",
8329
- "knownRansomwareCampaignUse": "Unknown",
8479
+ "knownRansomwareCampaignUse": "Known",
8330
8480
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-30190",
8331
8481
  "cwes": [
8332
8482
  "CWE-610"
@@ -11412,7 +11562,7 @@
11412
11562
  "shortDescription": "Microsoft Windows Print Spooler contains an unspecified vulnerability which can allow for privilege escalation.",
11413
11563
  "requiredAction": "Apply updates per vendor instructions.",
11414
11564
  "dueDate": "2022-04-15",
11415
- "knownRansomwareCampaignUse": "Unknown",
11565
+ "knownRansomwareCampaignUse": "Known",
11416
11566
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-21999",
11417
11567
  "cwes": [
11418
11568
  "CWE-40",
@@ -13604,7 +13754,7 @@
13604
13754
  "shortDescription": "Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.",
13605
13755
  "requiredAction": "The impacted product is end-of-life and should be disconnected if still in use.",
13606
13756
  "dueDate": "2022-03-24",
13607
- "knownRansomwareCampaignUse": "Unknown",
13757
+ "knownRansomwareCampaignUse": "Known",
13608
13758
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7645",
13609
13759
  "cwes": []
13610
13760
  },
@@ -14098,7 +14248,7 @@
14098
14248
  "shortDescription": "Adobe Acrobat and Reader contain an input validation issue in a JavaScript method that could potentially lead to remote code execution.",
14099
14249
  "requiredAction": "Apply updates per vendor instructions.",
14100
14250
  "dueDate": "2022-03-24",
14101
- "knownRansomwareCampaignUse": "Unknown",
14251
+ "knownRansomwareCampaignUse": "Known",
14102
14252
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2008-2992",
14103
14253
  "cwes": [
14104
14254
  "CWE-119"
@@ -15215,7 +15365,7 @@
15215
15365
  "shortDescription": "Microsoft Windows AppX Installer contains a spoofing vulnerability which has a high impacts to confidentiality, integrity, and availability.",
15216
15366
  "requiredAction": "Apply updates per vendor instructions.",
15217
15367
  "dueDate": "2021-12-29",
15218
- "knownRansomwareCampaignUse": "Unknown",
15368
+ "knownRansomwareCampaignUse": "Known",
15219
15369
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-43890",
15220
15370
  "cwes": []
15221
15371
  },
@@ -16340,7 +16490,7 @@
16340
16490
  "shortDescription": "Atlassian Crowd and Crowd Data Center contain a remote code execution vulnerability resulting from a pdkinstall development plugin being incorrectly enabled in release builds.",
16341
16491
  "requiredAction": "Apply updates per vendor instructions.",
16342
16492
  "dueDate": "2022-05-03",
16343
- "knownRansomwareCampaignUse": "Unknown",
16493
+ "knownRansomwareCampaignUse": "Known",
16344
16494
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11580",
16345
16495
  "cwes": []
16346
16496
  },
@@ -16756,7 +16906,7 @@
16756
16906
  "shortDescription": "GitHub Community and Enterprise Editions that utilize the ability to upload images through GitLab Workhorse are vulnerable to remote code execution. Workhorse passes image file extensions through ExifTool, which improperly validates the image files.",
16757
16907
  "requiredAction": "Apply updates per vendor instructions.",
16758
16908
  "dueDate": "2021-11-17",
16759
- "knownRansomwareCampaignUse": "Unknown",
16909
+ "knownRansomwareCampaignUse": "Known",
16760
16910
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22205",
16761
16911
  "cwes": [
16762
16912
  "CWE-20",
@@ -17421,7 +17571,7 @@
17421
17571
  "shortDescription": "Microsoft Windows Active Directory contains a privilege escalation vulnerability due to the way it distributes passwords that are configured using Group Policy preferences. An authenticated attacker who successfully exploits the vulnerability could decrypt the passwords and use them to elevate privileges on the domain.",
17422
17572
  "requiredAction": "Apply updates per vendor instructions.",
17423
17573
  "dueDate": "2022-05-03",
17424
- "knownRansomwareCampaignUse": "Unknown",
17574
+ "knownRansomwareCampaignUse": "Known",
17425
17575
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-1812",
17426
17576
  "cwes": [
17427
17577
  "CWE-255"