Cato Security Researchใซใ‚ˆใ‚‹่ฟ…้€ŸใชCVEๅฏพๅฟœ

OWASPใฏไปฎๆƒณใƒ‘ใƒƒใƒใฎ้ฉ็”จใซใคใ„ใฆใ€ใ€Œๆ—ข็Ÿฅใฎ่„†ๅผฑๆ€งใฎๆ‚ช็”จใ‚’้˜ฒใใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃใƒใƒชใ‚ทใƒผใฎๅฎŸ่กŒใƒฌใ‚คใƒคใƒผใ€ใจๅฎš็พฉใ—ใฆใ„ใพใ™ใ€‚Catoใฏใ€Catoใ‚ทใƒณใ‚ฐใƒซใƒ‘ใ‚นใ‚ฏใƒฉใ‚ฆใƒ‰ใ‚จใƒณใ‚ธใƒณ๏ผˆSPACE๏ผ‰ใฎIPSใƒฌใ‚คใƒคใƒผใ‚’้€šใ˜ใฆใ€ไปฎๆƒณใƒ‘ใƒƒใƒใฎ้ฉ็”จใ‚’ๅฎŸ่กŒใ—ใพใ™ใ€‚Catoใฎใ‚จใ‚ญใ‚นใƒ‘ใƒผใƒˆใŸใกใŒใ€ใŠๅฎขๆง˜ใฎ้–ขไธŽใ‚’ไธ€ๅˆ‡ๅฟ…่ฆใจใ™ใ‚‹ใ“ใจใชใใ€ๆ–ฐ่ฆใฎIPSใƒซใƒผใƒซใ‚’ใƒ‡ใƒ—ใƒญใ‚คใ—ใฆๆ–ฐใŸใชCVEใซ็ด ๆ—ฉใๅฏพๅฟœใ—ใพใ™ใ€‚

Catoใซใ‚ˆใฃใฆๅฏพๅฟœใ•ใ‚ŒใŸใ‚ฏใƒชใƒ†ใ‚ฃใ‚ซใƒซใชCVEใฎไธ€ไพ‹

Name

Apache Struts 2 File Upload Remote Code Execution

CVE

CVE-2023-50164

Severity Score

9.8 (Critical)

Detect to Protect

1ๆ—ฅ

Description

Apache Struts 2 Webใƒ•ใƒฌใƒผใƒ ใƒฏใƒผใ‚ฏใฎใƒ•ใ‚กใ‚คใƒซใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใƒญใ‚ธใƒƒใ‚ฏใฎๆฌ ้™ฅใซใ‚ˆใ‚Šใ€ใƒชใƒขใƒผใƒˆใงใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒๅฏ่ƒฝใชใŸใ‚ใ€ไปปๆ„ใฎใƒ•ใ‚กใ‚คใƒซใŒใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใ•ใ‚Œใฆใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใฆใ—ใพใ„ใพใ™ใ€‚

Detection

POCใฎๅ…ฌ้–‹ – 2023ๅนด12ๆœˆ12ๆ—ฅ

Opt-in Protection

2023ๅนด12ๆœˆ12ๆ—ฅ

Global Protection

2023ๅนด12ๆœˆ13ๆ—ฅ

Name

Cisco IOS XE Web UI Privilege Escalation Vulnerability

CVE

CVE-2023-20198

Severity Score

10 (Critical)

Detect to Protect

2ๆ—ฅ

Description

ใ‚คใƒณใ‚ฟใƒผใƒใƒƒใƒˆใซๅ…ฌ้–‹ใ•ใ‚Œใฆใ„ใ‚‹Ciscoใฎใƒ‡ใƒใ‚คใ‚นใงใ€IOS XEใŒๅฎŸ่กŒใ•ใ‚Œใ€HTTP Web UIๆฉŸ่ƒฝใŒๅฎŸ่กŒใ•ใ‚Œใฆใ„ใ‚‹ๅ ดๅˆใซใ€ๆจฉ้™ๆ˜‡ๆ ผใŒๅฏ่ƒฝใซใชใ‚Šใพใ™ใ€‚

Detection

POCใฎๅ…ฌ้–‹ – 2023ๅนด10ๆœˆ30ๆ—ฅๅˆๅพŒ8:30๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ31ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด11ๆœˆ1ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Name

cURL SOCKS5 Proxy Heap Buffer Overflow

CVE

CVE-2023-38545

Severity Score

7.5 (High)

Detect to Protect

1ๆ—ฅ๏ผ‹3ๆ™‚้–“

Description

SOCKS5ใƒ—ใƒญใ‚ญใ‚ทใƒใƒณใƒ‰ใ‚ทใ‚งใ‚คใ‚ฏไธญใฎใƒ›ใ‚นใƒˆๅ่งฃๆฑบใซใƒ’ใƒผใƒ—ใƒใƒƒใƒ•ใ‚กใƒผใ‚ชใƒผใƒใƒผใƒ•ใƒญใƒผใฎ่„†ๅผฑๆ€งใŒๅญ˜ๅœจใ™ใ‚‹ใŸใ‚ใ€่„†ๅผฑใชlibcurlใฎๅฎŸ่ฃ…ใซใ‚ˆใ‚Šใ€ๆ‚ช่ณชใชใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2023ๅนด10ๆœˆ11ๆ—ฅๅˆๅ‰6:30๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ11ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด10ๆœˆ12ๆ—ฅๅˆๅ‰9:30๏ผˆUTC๏ผ‰

Name

Atlassian Confluence Data Center & Server Privilege Escalation Vulnerability

CVE

CVE-2023-22515

Severity Score

10 (Critical)

Detect to Protect

1ๆ—ฅ๏ผ‹23ๆ™‚้–“

Description

Atlassian Confluence ServerใจData Centerใฎใ‚ชใƒณใƒ—ใƒฌใƒŸใ‚น็‰ˆใซๅญ˜ๅœจใ™ใ‚‹ๆจฉ้™ๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€งใงใ€ๆ”ปๆ’ƒ่€…ใŒ่„†ๅผฑใชใ‚จใƒณใƒ‰ใƒใ‚คใƒณใƒˆใ‚’ๆ‚ช็”จใ—ใฆไธๆญฃใช็ฎก็†่€…ใƒฆใƒผใ‚ถใƒผใ‚’ไฝœๆˆใ—ใ€ใ‚ตใƒผใƒใƒผใธใฎใ‚ขใ‚ฏใ‚ปใ‚นๆจฉใ‚’ๅ–ๅพ—ใ™ใ‚‹ใ“ใจใ‚’ๅฏ่ƒฝใซใ—ใพใ™ใ€‚

Detection

2023ๅนด10ๆœˆ4ๆ—ฅๅˆๅพŒ1:00๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ5ๆ—ฅๅˆๅ‰11:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด10ๆœˆ6ๆ—ฅๅˆๅพŒ0:00๏ผˆUTC๏ผ‰

Name

MOVEit Transfer SQLi

CVE

CVE-2023-34362

Severity Score

10 (Critical)

Detect to Protect

3ๆ—ฅ๏ผ‹6ๆ™‚้–“

Description

InProgress็คพใฎใƒžใƒใƒผใ‚ธใƒ‰ใƒ•ใ‚กใ‚คใƒซ่ปข้€๏ผˆMFT๏ผ‰ใ‚ฝใƒชใƒฅใƒผใ‚ทใƒงใƒณใ€ŒMOVEit Transferใ€ใซๆฝœใ‚€SQLใ‚คใƒณใ‚ธใ‚งใ‚ฏใ‚ทใƒงใƒณใฎ่„†ๅผฑๆ€งใซใ‚ˆใ‚Šใ€ๆ”ปๆ’ƒ่€…ใŒSQLใ‚ณใƒžใƒณใƒ‰ใ‚’ๅฎŸ่กŒใ—ใ€RCEใ‚’ๅฏ่ƒฝใจใ™ใ‚‹ๅฐ‚็”จใฎใƒใƒƒใ‚ฏใƒ‰ใ‚ขใ‚’ใ‚คใƒณใ‚นใƒˆใƒผใƒซใ™ใ‚‹ใ“ใจใŒๅฏ่ƒฝใ€‚

Detection

2023ๅนด6ๆœˆ6ๆ—ฅๅˆๅ‰8:00

Opt-in Protection

2023ๅนด6ๆœˆ8ๆ—ฅๅˆๅพŒ4:30

Global Protection

2023ๅนด6ๆœˆ9ๆ—ฅๅˆๅพŒ2:00

Name

Microsoft Outlook Remote Hash Vulnerability

CVE

CVE-2023-23397

Severity Score

9.8 (Critical)

Detect to Protect

0*

Description

Microsoft Outlookใฎๆจฉ้™ๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง * ใ‚ผใƒญใ‚ฟใ‚คใƒ ๅฏพๅฟœ๏ผšใ‚ขใ‚ฆใƒˆใƒใ‚ฆใƒณใƒ‰ใฎSMBใƒˆใƒฉใƒ•ใ‚ฃใƒƒใ‚ฏใฏCatoใฎใƒ•ใ‚กใ‚คใ‚ขใƒ•ใ‚ฉใƒผใƒซใŒใƒ‡ใƒ•ใ‚ฉใƒซใƒˆใงใƒ–ใƒญใƒƒใ‚ฏ

Detection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Opt-in Protection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Global Protection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Name

OWASSRF, MS Exchange RCE

CVE

CVE-2022-41082

Severity Score

8.8 (High)

Detect to Protect

23ๆ™‚้–“45ๅˆ†

Description

ProxyNotShellใ‚จใ‚ฏใ‚นใƒ—ใƒญใ‚คใƒˆใƒใ‚งใƒผใƒณใฎไธ€้ƒจใงใ€MS Exchangeใฎไธ€้ƒจใƒใƒผใ‚ธใƒงใƒณใŒRCE๏ผˆใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒ๏ผ‰ใซๅฏพใ™ใ‚‹่„†ๅผฑๆ€งใ‚’ๆœ‰ใ™ใ‚‹ใ€‚

Detection

2022ๅนด12ๆœˆ21ๆ—ฅๅˆๅพŒ5:00

Opt-in Protection

2022ๅนด12ๆœˆ21ๆ—ฅๅˆๅพŒ11:29

Global Protection

2022ๅนด12ๆœˆ22ๆ—ฅๅˆๅพŒ4:45

Name

Microsoft Exchange Remote Code Execution

CVE

CVE-2022-41040ใ€CVE-2022-41082

Severity Score

8.8 (High)

Detect to Protect

2ๆ—ฅ๏ผ‹10ๆ™‚้–“6ๅˆ†

Description

Microsoft Exchange Serverใฎ็‰นๆจฉๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ1:19

Opt-in Protection

2022ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ11:25

Global Protection

2022ๅนด10ๆœˆ2ๆ—ฅๅˆๅพŒ0:40

Name

DogWalk – Microsoft Windows Support Diagnostic Tool Remote Code Execution

CVE

CVE-2022-34713

Severity Score

7.8 (High)

Detect to Protect

2ๆ—ฅ๏ผ‹4ๆ™‚้–“54ๅˆ†

Description

Microsoft Windowsใ‚ตใƒใƒผใƒˆ่จบๆ–ญใƒ„ใƒผใƒซ๏ผˆMSDT๏ผ‰ใซๅญ˜ๅœจใ™ใ‚‹ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด8ๆœˆ10ๆ—ฅๅˆๅ‰11:22

Opt-in Protection

2022ๅนด8ๆœˆ11ๆ—ฅๅˆๅพŒ6:38

Global Protection

2022ๅนด8ๆœˆ12ๆ—ฅๅˆๅพŒ4:16

Name

Apache Spark Remote Code Execution

CVE

CVE-2022-33891

Severity Score

8.8 (High)

Detect to Protect

1ๆ—ฅ๏ผ‹7ๆ™‚้–“17ๅˆ†

Description

Apache SparkใฎUIใงใฏใ€ๆง‹ๆˆใ‚ชใƒ—ใ‚ทใƒงใƒณใ€Œspark.acls.enableใ€ใ‚’้€šใ˜ใฆใ€ACL๏ผˆใ‚ขใ‚ฏใ‚ปใ‚นๅˆถๅพกใƒชใ‚นใƒˆ๏ผ‰ใ‚’ๆœ‰ๅŠนใซใงใใ‚‹ๅฏ่ƒฝๆ€งใŒๅญ˜ๅœจใ—ใพใ™ใ€‚ใ“ใ‚Œใฏใ€่ช่จผใƒ•ใ‚ฃใƒซใ‚ฟใƒผใ‚’ไฝฟ็”จใ—ใฆใ€ใƒฆใƒผใ‚ถใƒผใซใ‚ขใƒ—ใƒชใ‚ฑใƒผใ‚ทใƒงใƒณใฎ่กจ็คบๆจฉ้™ใพใŸใฏๅค‰ๆ›ดๆจฉ้™ใŒใ‚ใ‚‹ใ‹ใฉใ†ใ‹ใ‚’ใƒใ‚งใƒƒใ‚ฏใ™ใ‚‹ๆฉŸ่ƒฝใงใ™ใ€‚ACLใŒๆœ‰ๅŠนใซใชใ‚‹ใจใ€HttpSecurityFilterใฎใ‚ณใƒผใƒ‰ใƒ‘ใ‚นใซใ‚ˆใ‚Šใ€ ่ชฐใ‹ใŒไปปๆ„ใฎใƒฆใƒผใ‚ถใƒผๅใ‚’ๆไพ›ใ™ใ‚‹ใ“ใจใงใชใ‚Šใ™ใพใ—ใŒใงใใ‚‹็Šถๆ…‹ใจใชใ‚Šใพใ™ใ€‚ใใฎๅ ดๅˆใ€ๆ‚ชๆ„ใฎใ‚ใ‚‹ใƒฆใƒผใ‚ถใƒผใŒๆจฉ้™ใƒใ‚งใƒƒใ‚ฏ้–ขๆ•ฐ๏ผˆๅ…ฅๅŠ›ๅ€คใซๅŸบใฅใ„ใฆๆœ€็ต‚็š„ใซUnixใ‚ทใ‚งใƒซใ‚ณใƒžใƒณใƒ‰ใ‚’ๆง‹็ฏ‰ใƒปๅฎŸ่กŒใ™ใ‚‹้–ขๆ•ฐ๏ผ‰ใซๅˆฐ้”ใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใใฎ็ตๆžœใ€็พๅœจSparkใ‚’ๅฎŸ่กŒใ—ใฆใ„ใ‚‹ใƒฆใƒผใ‚ถใƒผใจใ—ใฆใ€ไปปๆ„ใฎใ‚ทใ‚งใƒซใ‚ณใƒžใƒณใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใพใ™ใ€‚

Detection

2022ๅนด7ๆœˆ19ๆ—ฅๅˆๅ‰10:06

Opt-in Protection

2022ๅนด7ๆœˆ19ๆ—ฅๅˆๅพŒ7:25

Global Protection

2022ๅนด7ๆœˆ20ๆ—ฅๅˆๅพŒ5:23

Name

Microsoft Support Diagnostic Tool Remote Code Execution

CVE

CVE-2022-30190

Severity Score

7.8 (High)

Detect to Protect

1ๆ—ฅ๏ผ‹8ๆ™‚้–“17ๅˆ†

Description

Microsoft Windowsใ‚ตใƒใƒผใƒˆ่จบๆ–ญใƒ„ใƒผใƒซ๏ผˆMSDT๏ผ‰ใซๅญ˜ๅœจใ™ใ‚‹ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด5ๆœˆ31ๆ—ฅๅˆๅ‰8:43

Opt-in Protection

2022ๅนด5ๆœˆ31ๆ—ฅๅˆๅพŒ10:06

Global Protection

2022ๅนด6ๆœˆ1ๆ—ฅๅˆๅพŒ5:00

Name

VMware Tanzu Spring Cloud Function Remote Code Execution

CVE

CVE-2022-22963

Severity Score

9.8 (Critical)

Detect to Protect

2ๆ—ฅ๏ผ‹1ๆ™‚้–“54ๅˆ†

Description

Spring Cloud Functionใฎใƒใƒผใ‚ธใƒงใƒณ3.1.6ใ€3.2.2ใŠใ‚ˆใณใใ‚Œใ‚ˆใ‚Šๅคใ„ใ‚ตใƒใƒผใƒˆๅฏพ่ฑกๅค–ใฎใƒใƒผใ‚ธใƒงใƒณใซใŠใ„ใฆใ€ ใƒซใƒผใƒ†ใ‚ฃใƒณใ‚ฐๆฉŸ่ƒฝใ‚’ไฝฟ็”จใ™ใ‚‹้š›ใซใ€ใƒฆใƒผใ‚ถใƒผใŒ็‰นๅˆฅใซ็ดฐๅทฅใ—ใŸSpELใ‚’ใƒซใƒผใƒ†ใ‚ฃใƒณใ‚ฐ่กจ็พใจใ—ใฆๆไพ›ใ™ใ‚‹ใ“ใจใŒใงใใ€ใใฎ็ตๆžœใ€ใƒชใƒขใƒผใƒˆใงใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใ€ใƒญใƒผใ‚ซใƒซใƒชใ‚ฝใƒผใ‚นใซใ‚ขใ‚ฏใ‚ปใ‚นใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2022ๅนด3ๆœˆ30ๆ—ฅๅˆๅพŒ6๏ผš00

Opt-in Protection

2022ๅนด3ๆœˆ30ๆ—ฅๅˆๅพŒ11:09

Global Protection

2022ๅนด4ๆœˆ1ๆ—ฅๅˆๅพŒ7:54

Name

Log4shell

CVE

CVE-2021-44228

Severity Score

10.0 (Critical)

Detect to Protect

17ๆ™‚้–“2ๅˆ†

Description

Apache Log4j2ใฎใƒใƒผใ‚ธใƒงใƒณ2.0-beta9ใ‹ใ‚‰2.15.0๏ผˆใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃใƒชใƒชใƒผใ‚น2.12.2ใ€2.12.3ใ€2.3.1ใ‚’้™คใ๏ผ‰ใซใŠใ„ใฆใ€ๆง‹ๆˆใ€ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใ€ใƒ‘ใƒฉใƒกใƒผใ‚ฟใƒผใงไฝฟ็”จใ•ใ‚Œใ‚‹JNDIๆฉŸ่ƒฝใฏใ€ๆ”ปๆ’ƒ่€…ใŒLDAPใ‚„ใใฎไป–ใฎJNDI้–ข้€ฃใฎใ‚จใƒณใƒ‰ใƒใ‚คใƒณใƒˆใฎๅˆถๅพกใ‚’ๅฅชใฃใŸๅ ดๅˆใซ้˜ฒๅพกใ™ใ‚‹ใ“ใจใŒใงใใพใ›ใ‚“ใ€‚ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใ‚„ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใฎใƒ‘ใƒฉใƒกใƒผใ‚ฟใƒผใฎๅˆถๅพกใŒๅฏ่ƒฝใจใชใฃใŸๆ”ปๆ’ƒ่€…ใฏใ€ใƒกใƒƒใ‚ปใƒผใ‚ธใฎๆคœ็ดขใƒป็ฝฎๆ›ๆฉŸ่ƒฝใŒๆœ‰ๅŠนใซใชใฃใฆใ„ใ‚‹ๅ ดๅˆใซใ€LDAPใ‚ตใƒผใƒใƒผใ‹ใ‚‰่ชญใฟ่พผใพใ‚Œใ‚‹ไปปๆ„ใฎใ‚ณใƒผใƒ‰ใ‚’ๅฎŸ่กŒใงใใพใ™ใ€‚

Detection

2021ๅนด12ๆœˆ10ๆ—ฅๅˆๅพŒ8:45

Opt-in Protection

2021ๅนด12ๆœˆ11ๆ—ฅๅˆๅ‰3:16

Global Protection

2021ๅนด12ๆœˆ11ๆ—ฅๅˆๅพŒ1:47

Name

Apache HTTP Server Path Traversal

CVE

CVE-2021-41773

Severity Score

7.5 (High)

Detect to Protect

1ๆ—ฅ๏ผ‹16ๆ™‚้–“46ๅˆ†

Description

Apache HTTP Server 2.4.49ใฎใƒ‘ใ‚นๆญฃ่ฆๅŒ–ๅ‡ฆ็†ใซๅŠ ใˆใ‚‰ใ‚ŒใŸๅค‰ๆ›ดใซๆฌ ้™ฅใŒ่ฆ‹ใคใ‹ใ‚Šใพใ—ใŸใ€‚ๆ”ปๆ’ƒ่€…ใฏใƒ‘ใ‚นใƒˆใƒฉใƒใƒผใ‚ตใƒซๆ”ปๆ’ƒใ‚’ไฝฟใฃใฆใ€URLใ‚’Alias๏ผˆใพใŸใฏ้กžไผผใฎ๏ผ‰ใƒ‡ใ‚ฃใƒฌใ‚ฏใƒ†ใ‚ฃใƒ–ใ‚ˆใฃใฆๆง‹ๆˆใ•ใ‚ŒใŸใƒ‡ใ‚ฃใƒฌใ‚ฏใƒˆใƒชไปฅๅค–ใฎใƒ•ใ‚กใ‚คใƒซใซใƒžใƒƒใƒ”ใƒณใ‚ฐใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใ“ใ‚Œใ‚‰ใฎใƒ‡ใ‚ฃใƒฌใ‚ฏใƒˆใƒชใฎๅค–ใซใ‚ใ‚‹ใƒ•ใ‚กใ‚คใƒซใŒใ€้€šๅธธใฎใƒ‡ใƒ•ใ‚ฉใƒซใƒˆใฎๆง‹ๆˆใงใ‚ใ‚‹ใ€Œrequire all deniedใ€ใซใ‚ˆใฃใฆไฟ่ญทใ•ใ‚Œใฆใ„ใชใ„ๅ ดๅˆใ€ใƒชใ‚ฏใ‚จใ‚นใƒˆใŒๆˆๅŠŸใ™ใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใ‚จใ‚คใƒชใ‚ขใ‚นใŒ่จญๅฎšใ•ใ‚ŒใŸใƒ‘ใ‚นใซๅฏพใ—ใฆCGIใ‚นใ‚ฏใƒชใƒ—ใƒˆใ‚‚ๆœ‰ๅŠนใซใชใฃใฆใ„ใ‚‹ๅ ดๅˆใฏใ€ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ใฎๅฎŸ่กŒใŒ่จฑๅฏใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2021ๅนด10ๆœˆ6ๆ—ฅๅˆๅ‰7:19

Opt-in Protection

2021ๅนด10ๆœˆ7ๆ—ฅๅˆๅพŒ2:01

Global Protection

2021ๅนด10ๆœˆ8ๆ—ฅๅˆๅ‰0:05

Name

Exchange Autodiscover Password

CVE

Severity Score

(Critical)

Detect to Protect

5ๆ—ฅ๏ผ‹5ๆ™‚้–“30ๅˆ†

Description

Detection

2021ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ2:33

Opt-in Protection

2021ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ5:40

Global Protection

2021ๅนด10ๆœˆ5ๆ—ฅๅˆๅพŒ8:03

Name

VMware vCenter RCE (II)

CVE

CVE-2021-22005

Severity Score

9.8 (Critical)

Detect to Protect

3ๆ—ฅ๏ผ‹10ๆ™‚้–“1ๅˆ†

Description

vCenter Serverใซใฏใ€Analyticsใ‚ตใƒผใƒ“ใ‚นใซไปปๆ„ใฎใƒ•ใ‚กใ‚คใƒซใ‚’ใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใงใใ‚‹่„†ๅผฑๆ€งใŒๅญ˜ๅœจใ—ใพใ™ใ€‚vCenter Serverใฎ443็•ชใƒใƒผใƒˆใซใƒใƒƒใƒˆใƒฏใƒผใ‚ฏใ‹ใ‚‰ใ‚ขใ‚ฏใ‚ปใ‚นใงใใ‚‹ๆ‚ชๆ„ใฎใ‚ใ‚‹่กŒ็‚บ่€…ใŒใ€ใ“ใฎๅ•้กŒใ‚’ๆ‚ช็”จใ—ใฆใ€็‰นๅˆฅใซ็ดฐๅทฅใ•ใ‚ŒใŸใƒ•ใ‚กใ‚คใƒซใ‚’ใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใ™ใ‚‹ใ“ใจใงใ€vCenter ServerไธŠใงใ‚ณใƒผใƒ‰ใ‚’ๅฎŸ่กŒใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2021ๅนด9ๆœˆ23ๆ—ฅๅˆๅ‰8:36

Opt-in Protection

2021ๅนด9ๆœˆ23ๆ—ฅๅˆๅพŒ6:23

Global Protection

2021ๅนด9ๆœˆ26ๆ—ฅๅˆๅพŒ6:37

Name

PrintNightmare Spooler RCE Vulnerability

CVE

CVE-2021-1675

Severity Score

8.8 (High)

Detect to Protect

6ๆ—ฅ๏ผ‹6ๆ™‚้–“28ๅˆ†

Description

Windows Printใ‚นใƒ—ใƒผใƒฉใƒผใฎ็‰นๆจฉๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง

Detection

2021ๅนด7ๆœˆ5ๆ—ฅๅˆๅพŒ0:16

Opt-in Protection

2021ๅนด7ๆœˆ11ๆ—ฅๅˆๅ‰10:52

Global Protection

2021ๅนด7ๆœˆ11ๆ—ฅๅˆๅพŒ6:44

Name

Sphere Client (HTML5) Remote Code Execution

CVE

CVE-2021-21985

Severity Score

9.8 (Critical)

Detect to Protect

3 days, 11 hours, 29 minutes

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server

Detection

May 31, 2021 at 10:55 AM

Opt-in Protection

June 1, 2021 at 9:47 PM

Global Protection

June 3, 2021 at 10:24 PM

Name

F5 Vulnerability

CVE

CVE-2021-22986

Severity Score

9.8 (Critical)

Detect to Protect

2 days, 19 hours, 38 minutes

Description

On specific versions of BIG-IP and BIG-IQ , the iControl REST interface has an unauthenticated remote command execution vulnerability

Detection

Mar 20th, 2021 at 11:43ย PM

Opt-in Protection

Mar 23rd, 2021 at 12:12ย PM

Global Protection

March 23, 2021 at 7:21 PM

Name

MS Exchange SSRF

CVE

CVE-2021-26855

Severity Score

9.8 (Critical)

Detect to Protect

4 days, 2 hours, 23 minutes

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

Detection

March 3, 2021 at 11:03 AM

Opt-in Protection

March 4, 2021 at 10:48 PM

Global Protection

March 7, 2021 at 1:26 PM

Name

VMWare VCenter RCE

CVE

CVE-2021-21972

Severity Score

9.8 (Critical)

Detect to Protect

1 day, 1 hour, 57 minutes

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

Detection

February 25, 2021 at 10:06 AM

Opt-in Protection

February 25, 2021 at 7:16 PM

Global Protection

February 26, 2021 at 12:03 PM

Name

Apache Struts 2 File Upload Remote Code Execution

CVE

CVE-2023-50164

Severity Score

9.8

Detect to Protect

1ๆ—ฅ

Description

Apache Struts 2 Webใƒ•ใƒฌใƒผใƒ ใƒฏใƒผใ‚ฏใฎใƒ•ใ‚กใ‚คใƒซใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใƒญใ‚ธใƒƒใ‚ฏใฎๆฌ ้™ฅใซใ‚ˆใ‚Šใ€ใƒชใƒขใƒผใƒˆใงใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒๅฏ่ƒฝใชใŸใ‚ใ€ไปปๆ„ใฎใƒ•ใ‚กใ‚คใƒซใŒใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใ•ใ‚Œใฆใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใฆใ—ใพใ„ใพใ™ใ€‚

Detection

POCใฎๅ…ฌ้–‹ – 2023ๅนด12ๆœˆ12ๆ—ฅ

Opt-in Protection

2023ๅนด12ๆœˆ12ๆ—ฅ

Global Protection

2023ๅนด12ๆœˆ13ๆ—ฅ

Name

Cisco IOS XE Web UI Privilege Escalation Vulnerability

CVE

CVE-2023-20198

Severity Score

10

Detect to Protect

2ๆ—ฅ

Description

ใ‚คใƒณใ‚ฟใƒผใƒใƒƒใƒˆใซๅ…ฌ้–‹ใ•ใ‚Œใฆใ„ใ‚‹Ciscoใฎใƒ‡ใƒใ‚คใ‚นใงใ€IOS XEใŒๅฎŸ่กŒใ•ใ‚Œใ€HTTP Web UIๆฉŸ่ƒฝใŒๅฎŸ่กŒใ•ใ‚Œใฆใ„ใ‚‹ๅ ดๅˆใซใ€ๆจฉ้™ๆ˜‡ๆ ผใŒๅฏ่ƒฝใซใชใ‚Šใพใ™ใ€‚

Detection

POCใฎๅ…ฌ้–‹ – 2023ๅนด10ๆœˆ30ๆ—ฅๅˆๅพŒ8:30๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ31ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด11ๆœˆ1ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Name

cURL SOCKS5 Proxy Heap Buffer Overflow

CVE

CVE-2023-38545

Severity Score

7.5

Detect to Protect

1ๆ—ฅ๏ผ‹3ๆ™‚้–“

Description

SOCKS5ใƒ—ใƒญใ‚ญใ‚ทใƒใƒณใƒ‰ใ‚ทใ‚งใ‚คใ‚ฏไธญใฎใƒ›ใ‚นใƒˆๅ่งฃๆฑบใซใƒ’ใƒผใƒ—ใƒใƒƒใƒ•ใ‚กใƒผใ‚ชใƒผใƒใƒผใƒ•ใƒญใƒผใฎ่„†ๅผฑๆ€งใŒๅญ˜ๅœจใ™ใ‚‹ใŸใ‚ใ€่„†ๅผฑใชlibcurlใฎๅฎŸ่ฃ…ใซใ‚ˆใ‚Šใ€ๆ‚ช่ณชใชใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2023ๅนด10ๆœˆ11ๆ—ฅๅˆๅ‰6:30๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ11ๆ—ฅๅˆๅพŒ8:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด10ๆœˆ12ๆ—ฅๅˆๅ‰9:30๏ผˆUTC๏ผ‰

Name

Atlassian Confluence Data Center & Server Privilege Escalation Vulnerability

CVE

CVE-2023-22515

Severity Score

10

Detect to Protect

1ๆ—ฅ๏ผ‹23ๆ™‚้–“

Description

Atlassian Confluence ServerใจData Centerใฎใ‚ชใƒณใƒ—ใƒฌใƒŸใ‚น็‰ˆใซๅญ˜ๅœจใ™ใ‚‹ๆจฉ้™ๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€งใงใ€ๆ”ปๆ’ƒ่€…ใŒ่„†ๅผฑใชใ‚จใƒณใƒ‰ใƒใ‚คใƒณใƒˆใ‚’ๆ‚ช็”จใ—ใฆไธๆญฃใช็ฎก็†่€…ใƒฆใƒผใ‚ถใƒผใ‚’ไฝœๆˆใ—ใ€ใ‚ตใƒผใƒใƒผใธใฎใ‚ขใ‚ฏใ‚ปใ‚นๆจฉใ‚’ๅ–ๅพ—ใ™ใ‚‹ใ“ใจใ‚’ๅฏ่ƒฝใซใ—ใพใ™ใ€‚

Detection

2023ๅนด10ๆœˆ4ๆ—ฅๅˆๅพŒ1:00๏ผˆUTC๏ผ‰

Opt-in Protection

2023ๅนด10ๆœˆ5ๆ—ฅๅˆๅ‰11:00๏ผˆUTC๏ผ‰

Global Protection

2023ๅนด10ๆœˆ6ๆ—ฅๅˆๅพŒ0:00๏ผˆUTC๏ผ‰

Name

MOVEit Transfer SQLi

CVE

CVE-2023-34362

Severity Score

10

Detect to Protect

3ๆ—ฅ๏ผ‹6ๆ™‚้–“

Description

InProgress็คพใฎใƒžใƒใƒผใ‚ธใƒ‰ใƒ•ใ‚กใ‚คใƒซ่ปข้€๏ผˆMFT๏ผ‰ใ‚ฝใƒชใƒฅใƒผใ‚ทใƒงใƒณใ€ŒMOVEit Transferใ€ใซๆฝœใ‚€SQLใ‚คใƒณใ‚ธใ‚งใ‚ฏใ‚ทใƒงใƒณใฎ่„†ๅผฑๆ€งใซใ‚ˆใ‚Šใ€ๆ”ปๆ’ƒ่€…ใŒSQLใ‚ณใƒžใƒณใƒ‰ใ‚’ๅฎŸ่กŒใ—ใ€RCEใ‚’ๅฏ่ƒฝใจใ™ใ‚‹ๅฐ‚็”จใฎใƒใƒƒใ‚ฏใƒ‰ใ‚ขใ‚’ใ‚คใƒณใ‚นใƒˆใƒผใƒซใ™ใ‚‹ใ“ใจใŒๅฏ่ƒฝใ€‚

Detection

2023ๅนด6ๆœˆ6ๆ—ฅๅˆๅ‰8:00

Opt-in Protection

2023ๅนด6ๆœˆ8ๆ—ฅๅˆๅพŒ4:30

Global Protection

2023ๅนด6ๆœˆ9ๆ—ฅๅˆๅพŒ2:00

Name

Microsoft Outlook Remote Hash Vulnerability

CVE

CVE-2023-23397

Severity Score

9.8

Detect to Protect

0*

Description

Microsoft Outlookใฎๆจฉ้™ๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง * ใ‚ผใƒญใ‚ฟใ‚คใƒ ๅฏพๅฟœ๏ผšใ‚ขใ‚ฆใƒˆใƒใ‚ฆใƒณใƒ‰ใฎSMBใƒˆใƒฉใƒ•ใ‚ฃใƒƒใ‚ฏใฏCatoใฎใƒ•ใ‚กใ‚คใ‚ขใƒ•ใ‚ฉใƒผใƒซใŒใƒ‡ใƒ•ใ‚ฉใƒซใƒˆใงใƒ–ใƒญใƒƒใ‚ฏ

Detection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Opt-in Protection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Global Protection

2023ๅนด3ๆœˆ3ๆ—ฅๅˆๅ‰8:02

Name

OWASSRF, MS Exchange RCE

CVE

CVE-2022-41082

Severity Score

8.8

Detect to Protect

23ๆ™‚้–“45ๅˆ†

Description

ProxyNotShellใ‚จใ‚ฏใ‚นใƒ—ใƒญใ‚คใƒˆใƒใ‚งใƒผใƒณใฎไธ€้ƒจใงใ€MS Exchangeใฎไธ€้ƒจใƒใƒผใ‚ธใƒงใƒณใŒRCE๏ผˆใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒ๏ผ‰ใซๅฏพใ™ใ‚‹่„†ๅผฑๆ€งใ‚’ๆœ‰ใ™ใ‚‹ใ€‚

Detection

2022ๅนด12ๆœˆ21ๆ—ฅๅˆๅพŒ5:00

Opt-in Protection

2022ๅนด12ๆœˆ21ๆ—ฅๅˆๅพŒ11:29

Global Protection

2022ๅนด12ๆœˆ22ๆ—ฅๅˆๅพŒ4:45

Name

Microsoft Exchange Remote Code Execution

CVE

CVE-2022-41040ใ€CVE-2022-41082

Severity Score

8.8

Detect to Protect

2ๆ—ฅ๏ผ‹10ๆ™‚้–“6ๅˆ†

Description

Microsoft Exchange Serverใฎ็‰นๆจฉๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ1:19

Opt-in Protection

2022ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ11:25

Global Protection

2022ๅนด10ๆœˆ2ๆ—ฅๅˆๅพŒ0:40

Name

DogWalk – Microsoft Windows Support Diagnostic Tool Remote Code Execution

CVE

CVE-2022-34713

Severity Score

7.8

Detect to Protect

2ๆ—ฅ๏ผ‹4ๆ™‚้–“54ๅˆ†

Description

Microsoft Windowsใ‚ตใƒใƒผใƒˆ่จบๆ–ญใƒ„ใƒผใƒซ๏ผˆMSDT๏ผ‰ใซๅญ˜ๅœจใ™ใ‚‹ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด8ๆœˆ10ๆ—ฅๅˆๅ‰11:22

Opt-in Protection

2022ๅนด8ๆœˆ11ๆ—ฅๅˆๅพŒ6:38

Global Protection

2022ๅนด8ๆœˆ12ๆ—ฅๅˆๅพŒ4:16

Name

Apache Spark Remote Code Execution

CVE

CVE-2022-33891

Severity Score

8.8

Detect to Protect

1ๆ—ฅ๏ผ‹7ๆ™‚้–“17ๅˆ†

Description

Apache SparkใฎUIใงใฏใ€ๆง‹ๆˆใ‚ชใƒ—ใ‚ทใƒงใƒณใ€Œspark.acls.enableใ€ใ‚’้€šใ˜ใฆใ€ACL๏ผˆใ‚ขใ‚ฏใ‚ปใ‚นๅˆถๅพกใƒชใ‚นใƒˆ๏ผ‰ใ‚’ๆœ‰ๅŠนใซใงใใ‚‹ๅฏ่ƒฝๆ€งใŒๅญ˜ๅœจใ—ใพใ™ใ€‚ใ“ใ‚Œใฏใ€่ช่จผใƒ•ใ‚ฃใƒซใ‚ฟใƒผใ‚’ไฝฟ็”จใ—ใฆใ€ใƒฆใƒผใ‚ถใƒผใซใ‚ขใƒ—ใƒชใ‚ฑใƒผใ‚ทใƒงใƒณใฎ่กจ็คบๆจฉ้™ใพใŸใฏๅค‰ๆ›ดๆจฉ้™ใŒใ‚ใ‚‹ใ‹ใฉใ†ใ‹ใ‚’ใƒใ‚งใƒƒใ‚ฏใ™ใ‚‹ๆฉŸ่ƒฝใงใ™ใ€‚ACLใŒๆœ‰ๅŠนใซใชใ‚‹ใจใ€HttpSecurityFilterใฎใ‚ณใƒผใƒ‰ใƒ‘ใ‚นใซใ‚ˆใ‚Šใ€ ่ชฐใ‹ใŒไปปๆ„ใฎใƒฆใƒผใ‚ถใƒผๅใ‚’ๆไพ›ใ™ใ‚‹ใ“ใจใงใชใ‚Šใ™ใพใ—ใŒใงใใ‚‹็Šถๆ…‹ใจใชใ‚Šใพใ™ใ€‚ใใฎๅ ดๅˆใ€ๆ‚ชๆ„ใฎใ‚ใ‚‹ใƒฆใƒผใ‚ถใƒผใŒๆจฉ้™ใƒใ‚งใƒƒใ‚ฏ้–ขๆ•ฐ๏ผˆๅ…ฅๅŠ›ๅ€คใซๅŸบใฅใ„ใฆๆœ€็ต‚็š„ใซUnixใ‚ทใ‚งใƒซใ‚ณใƒžใƒณใƒ‰ใ‚’ๆง‹็ฏ‰ใƒปๅฎŸ่กŒใ™ใ‚‹้–ขๆ•ฐ๏ผ‰ใซๅˆฐ้”ใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใใฎ็ตๆžœใ€็พๅœจSparkใ‚’ๅฎŸ่กŒใ—ใฆใ„ใ‚‹ใƒฆใƒผใ‚ถใƒผใจใ—ใฆใ€ไปปๆ„ใฎใ‚ทใ‚งใƒซใ‚ณใƒžใƒณใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใพใ™ใ€‚

Detection

2022ๅนด7ๆœˆ19ๆ—ฅๅˆๅ‰10:06

Opt-in Protection

2022ๅนด7ๆœˆ19ๆ—ฅๅˆๅพŒ7:25

Global Protection

2022ๅนด7ๆœˆ20ๆ—ฅๅˆๅพŒ5:23

Name

Microsoft Support Diagnostic Tool Remote Code Execution

CVE

CVE-2022-30190

Severity Score

7.8

Detect to Protect

1ๆ—ฅ๏ผ‹8ๆ™‚้–“17ๅˆ†

Description

Microsoft Windowsใ‚ตใƒใƒผใƒˆ่จบๆ–ญใƒ„ใƒผใƒซ๏ผˆMSDT๏ผ‰ใซๅญ˜ๅœจใ™ใ‚‹ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ๅฎŸ่กŒใฎ่„†ๅผฑๆ€ง

Detection

2022ๅนด5ๆœˆ31ๆ—ฅๅˆๅ‰8:43

Opt-in Protection

2022ๅนด5ๆœˆ31ๆ—ฅๅˆๅพŒ10:06

Global Protection

2022ๅนด6ๆœˆ1ๆ—ฅๅˆๅพŒ5:00

Name

VMware Tanzu Spring Cloud Function Remote Code Execution

CVE

CVE-2022-22963

Severity Score

9.8

Detect to Protect

2ๆ—ฅ๏ผ‹1ๆ™‚้–“54ๅˆ†

Description

Spring Cloud Functionใฎใƒใƒผใ‚ธใƒงใƒณ3.1.6ใ€3.2.2ใŠใ‚ˆใณใใ‚Œใ‚ˆใ‚Šๅคใ„ใ‚ตใƒใƒผใƒˆๅฏพ่ฑกๅค–ใฎใƒใƒผใ‚ธใƒงใƒณใซใŠใ„ใฆใ€ ใƒซใƒผใƒ†ใ‚ฃใƒณใ‚ฐๆฉŸ่ƒฝใ‚’ไฝฟ็”จใ™ใ‚‹้š›ใซใ€ใƒฆใƒผใ‚ถใƒผใŒ็‰นๅˆฅใซ็ดฐๅทฅใ—ใŸSpELใ‚’ใƒซใƒผใƒ†ใ‚ฃใƒณใ‚ฐ่กจ็พใจใ—ใฆๆไพ›ใ™ใ‚‹ใ“ใจใŒใงใใ€ใใฎ็ตๆžœใ€ใƒชใƒขใƒผใƒˆใงใ‚ณใƒผใƒ‰ใŒๅฎŸ่กŒใ•ใ‚Œใ€ใƒญใƒผใ‚ซใƒซใƒชใ‚ฝใƒผใ‚นใซใ‚ขใ‚ฏใ‚ปใ‚นใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2022ๅนด3ๆœˆ30ๆ—ฅๅˆๅพŒ6๏ผš00

Opt-in Protection

2022ๅนด3ๆœˆ30ๆ—ฅๅˆๅพŒ11:09

Global Protection

2022ๅนด4ๆœˆ1ๆ—ฅๅˆๅพŒ7:54

Name

Log4shell

CVE

CVE-2021-44228

Severity Score

10.0

Detect to Protect

17ๆ™‚้–“2ๅˆ†

Description

Apache Log4j2ใฎใƒใƒผใ‚ธใƒงใƒณ2.0-beta9ใ‹ใ‚‰2.15.0๏ผˆใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃใƒชใƒชใƒผใ‚น2.12.2ใ€2.12.3ใ€2.3.1ใ‚’้™คใ๏ผ‰ใซใŠใ„ใฆใ€ๆง‹ๆˆใ€ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใ€ใƒ‘ใƒฉใƒกใƒผใ‚ฟใƒผใงไฝฟ็”จใ•ใ‚Œใ‚‹JNDIๆฉŸ่ƒฝใฏใ€ๆ”ปๆ’ƒ่€…ใŒLDAPใ‚„ใใฎไป–ใฎJNDI้–ข้€ฃใฎใ‚จใƒณใƒ‰ใƒใ‚คใƒณใƒˆใฎๅˆถๅพกใ‚’ๅฅชใฃใŸๅ ดๅˆใซ้˜ฒๅพกใ™ใ‚‹ใ“ใจใŒใงใใพใ›ใ‚“ใ€‚ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใ‚„ใƒญใ‚ฐใƒกใƒƒใ‚ปใƒผใ‚ธใฎใƒ‘ใƒฉใƒกใƒผใ‚ฟใƒผใฎๅˆถๅพกใŒๅฏ่ƒฝใจใชใฃใŸๆ”ปๆ’ƒ่€…ใฏใ€ใƒกใƒƒใ‚ปใƒผใ‚ธใฎๆคœ็ดขใƒป็ฝฎๆ›ๆฉŸ่ƒฝใŒๆœ‰ๅŠนใซใชใฃใฆใ„ใ‚‹ๅ ดๅˆใซใ€LDAPใ‚ตใƒผใƒใƒผใ‹ใ‚‰่ชญใฟ่พผใพใ‚Œใ‚‹ไปปๆ„ใฎใ‚ณใƒผใƒ‰ใ‚’ๅฎŸ่กŒใงใใพใ™ใ€‚

Detection

2021ๅนด12ๆœˆ10ๆ—ฅๅˆๅพŒ8:45

Opt-in Protection

2021ๅนด12ๆœˆ11ๆ—ฅๅˆๅ‰3:16

Global Protection

2021ๅนด12ๆœˆ11ๆ—ฅๅˆๅพŒ1:47

Name

Apache HTTP Server Path Traversal

CVE

CVE-2021-41773

Severity Score

7.5

Detect to Protect

1ๆ—ฅ๏ผ‹16ๆ™‚้–“46ๅˆ†

Description

Apache HTTP Server 2.4.49ใฎใƒ‘ใ‚นๆญฃ่ฆๅŒ–ๅ‡ฆ็†ใซๅŠ ใˆใ‚‰ใ‚ŒใŸๅค‰ๆ›ดใซๆฌ ้™ฅใŒ่ฆ‹ใคใ‹ใ‚Šใพใ—ใŸใ€‚ๆ”ปๆ’ƒ่€…ใฏใƒ‘ใ‚นใƒˆใƒฉใƒใƒผใ‚ตใƒซๆ”ปๆ’ƒใ‚’ไฝฟใฃใฆใ€URLใ‚’Alias๏ผˆใพใŸใฏ้กžไผผใฎ๏ผ‰ใƒ‡ใ‚ฃใƒฌใ‚ฏใƒ†ใ‚ฃใƒ–ใ‚ˆใฃใฆๆง‹ๆˆใ•ใ‚ŒใŸใƒ‡ใ‚ฃใƒฌใ‚ฏใƒˆใƒชไปฅๅค–ใฎใƒ•ใ‚กใ‚คใƒซใซใƒžใƒƒใƒ”ใƒณใ‚ฐใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใ“ใ‚Œใ‚‰ใฎใƒ‡ใ‚ฃใƒฌใ‚ฏใƒˆใƒชใฎๅค–ใซใ‚ใ‚‹ใƒ•ใ‚กใ‚คใƒซใŒใ€้€šๅธธใฎใƒ‡ใƒ•ใ‚ฉใƒซใƒˆใฎๆง‹ๆˆใงใ‚ใ‚‹ใ€Œrequire all deniedใ€ใซใ‚ˆใฃใฆไฟ่ญทใ•ใ‚Œใฆใ„ใชใ„ๅ ดๅˆใ€ใƒชใ‚ฏใ‚จใ‚นใƒˆใŒๆˆๅŠŸใ™ใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚ใ‚จใ‚คใƒชใ‚ขใ‚นใŒ่จญๅฎšใ•ใ‚ŒใŸใƒ‘ใ‚นใซๅฏพใ—ใฆCGIใ‚นใ‚ฏใƒชใƒ—ใƒˆใ‚‚ๆœ‰ๅŠนใซใชใฃใฆใ„ใ‚‹ๅ ดๅˆใฏใ€ใƒชใƒขใƒผใƒˆใ‚ณใƒผใƒ‰ใฎๅฎŸ่กŒใŒ่จฑๅฏใ•ใ‚Œใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2021ๅนด10ๆœˆ6ๆ—ฅๅˆๅ‰7:19

Opt-in Protection

2021ๅนด10ๆœˆ7ๆ—ฅๅˆๅพŒ2:01

Global Protection

2021ๅนด10ๆœˆ8ๆ—ฅๅˆๅ‰0:05

Name

Exchange Autodiscover Password

CVE

Severity Score

Detect to Protect

5ๆ—ฅ๏ผ‹5ๆ™‚้–“30ๅˆ†

Description

Detection

2021ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ2:33

Opt-in Protection

2021ๅนด9ๆœˆ30ๆ—ฅๅˆๅพŒ5:40

Global Protection

2021ๅนด10ๆœˆ5ๆ—ฅๅˆๅพŒ8:03

Name

VMware vCenter RCE (II)

CVE

CVE-2021-22005

Severity Score

9.8

Detect to Protect

3ๆ—ฅ๏ผ‹10ๆ™‚้–“1ๅˆ†

Description

vCenter Serverใซใฏใ€Analyticsใ‚ตใƒผใƒ“ใ‚นใซไปปๆ„ใฎใƒ•ใ‚กใ‚คใƒซใ‚’ใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใงใใ‚‹่„†ๅผฑๆ€งใŒๅญ˜ๅœจใ—ใพใ™ใ€‚vCenter Serverใฎ443็•ชใƒใƒผใƒˆใซใƒใƒƒใƒˆใƒฏใƒผใ‚ฏใ‹ใ‚‰ใ‚ขใ‚ฏใ‚ปใ‚นใงใใ‚‹ๆ‚ชๆ„ใฎใ‚ใ‚‹่กŒ็‚บ่€…ใŒใ€ใ“ใฎๅ•้กŒใ‚’ๆ‚ช็”จใ—ใฆใ€็‰นๅˆฅใซ็ดฐๅทฅใ•ใ‚ŒใŸใƒ•ใ‚กใ‚คใƒซใ‚’ใ‚ขใƒƒใƒ—ใƒญใƒผใƒ‰ใ™ใ‚‹ใ“ใจใงใ€vCenter ServerไธŠใงใ‚ณใƒผใƒ‰ใ‚’ๅฎŸ่กŒใงใใ‚‹ๅฏ่ƒฝๆ€งใŒใ‚ใ‚Šใพใ™ใ€‚

Detection

2021ๅนด9ๆœˆ23ๆ—ฅๅˆๅ‰8:36

Opt-in Protection

2021ๅนด9ๆœˆ23ๆ—ฅๅˆๅพŒ6:23

Global Protection

2021ๅนด9ๆœˆ26ๆ—ฅๅˆๅพŒ6:37

Name

PrintNightmare Spooler RCE Vulnerability

CVE

CVE-2021-1675

Severity Score

8.8

Detect to Protect

6ๆ—ฅ๏ผ‹6ๆ™‚้–“28ๅˆ†

Description

Windows Printใ‚นใƒ—ใƒผใƒฉใƒผใฎ็‰นๆจฉๆ˜‡ๆ ผใฎ่„†ๅผฑๆ€ง

Detection

2021ๅนด7ๆœˆ5ๆ—ฅๅˆๅพŒ0:16

Opt-in Protection

2021ๅนด7ๆœˆ11ๆ—ฅๅˆๅ‰10:52

Global Protection

2021ๅนด7ๆœˆ11ๆ—ฅๅˆๅพŒ6:44

Name

Sphere Client (HTML5) Remote Code Execution

CVE

CVE-2021-21985

Severity Score

9.8

Detect to Protect

3 days, 11 hours, 29 minutes

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server

Detection

May 31, 2021 at 10:55 AM

Opt-in Protection

June 1, 2021 at 9:47 PM

Global Protection

June 3, 2021 at 10:24 PM

Name

F5 Vulnerability

CVE

CVE-2021-22986

Severity Score

9.8

Detect to Protect

2 days, 19 hours, 38 minutes

Description

On specific versions of BIG-IP and BIG-IQ , the iControl REST interface has an unauthenticated remote command execution vulnerability

Detection

Mar 20th, 2021 at 11:43ย PM

Opt-in Protection

Mar 23rd, 2021 at 12:12ย PM

Global Protection

March 23, 2021 at 7:21 PM

Name

MS Exchange SSRF

CVE

CVE-2021-26855

Severity Score

9.8

Detect to Protect

4 days, 2 hours, 23 minutes

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

Detection

March 3, 2021 at 11:03 AM

Opt-in Protection

March 4, 2021 at 10:48 PM

Global Protection

March 7, 2021 at 1:26 PM

Name

VMWare VCenter RCE

CVE

CVE-2021-21972

Severity Score

9.8

Detect to Protect

1 day, 1 hour, 57 minutes

Description

The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server.

Detection

February 25, 2021 at 10:06 AM

Opt-in Protection

February 25, 2021 at 7:16 PM

Global Protection

February 26, 2021 at 12:03 PM

ใชใœใ€CVEใฎๅฏพๅฟœใฏใใ‚Œใปใฉๅคงใใช่ชฒ้กŒใชใฎใ‹๏ผŸ

ๆ–ฐใŸใซ็™ปๅ ดใ™ใ‚‹CVEใ‹ใ‚‰ใƒใƒƒใƒˆใƒฏใƒผใ‚ฏใ‚’ๅฎˆใ‚‹ใŸใ‚ใซๅฟ…่ฆใชใƒ—ใƒญใ‚ปใ‚นใ€ใƒชใ‚ฝใƒผใ‚นใ€ๆ™‚้–“ใซๆ‚ฉใพใ•ใ‚Œใฆใ„ใ‚‹ใŠๅฎขๆง˜ใŒๅคšใใ„ใ‚‰ใฃใ—ใ‚ƒใ„ใพใ™ใ€‚ใใฎ็†็”ฑใŒใ“ใกใ‚‰ใงใ™ใ€‚

ใƒ™ใƒณใƒ€ใƒผใŒCVEใ‚’่ชฟๆŸปใ—ใฆใ€ใ‚ทใ‚ฐใƒใƒใƒฃใ‚’้–‹็™บใ™ใ‚‹ๅฟ…่ฆใŒใ‚ใ‚‹

ใŠๅฎขๆง˜ใŒใƒกใƒณใƒ†ใƒŠใƒณใ‚นๆœŸ้–“ไธญใซใ‚ทใ‚ฐใƒใƒใƒฃใ‚’ใƒ†ใ‚นใƒˆใ™ใ‚‹ๅฟ…่ฆใŒใ‚ใ‚‹

ใƒ†ใ‚นใƒˆใ‚’ใ™ใ‚‹ใŠๅฎขๆง˜ใฏใ€ใ‚ทใ‚ฐใƒใƒใƒฃใŒใƒˆใƒฉใƒ•ใ‚ฃใƒƒใ‚ฏใซๆ‚ชๅฝฑ้Ÿฟใ—ใŸใ‚Šใ€ใƒ‘ใƒ•ใ‚ฉใƒผใƒžใƒณใ‚นใ‚„ใƒฆใƒผใ‚ถใƒผไฝ“้จ“ใซๅฝฑ้Ÿฟใ‚’ไธŽใˆใŸใ‚Šใ—ใฆใ„ใชใ„ใ“ใจใ‚’็ขบ่ชใ—ใชใ‘ใ‚Œใฐใชใ‚‰ใชใ„

ใƒ†ใ‚นใƒˆใŒๆˆๅŠŸใ—ใŸๅ ดๅˆใฎใฟใ€ใ‚ทใ‚ฐใƒใƒใƒฃใ‚’ๆœ‰ๅŠนๅŒ–ใ™ใ‚‹ใ“ใจใŒใงใใ‚‹

ใ“ใฎใƒ—ใƒญใ‚ปใ‚นใซใฏๅคšใใฎใƒชใ‚ฝใƒผใ‚นใŒๅฟ…่ฆใงใ€ๅคšใใฎใŠๅฎขๆง˜ใŒไธๆญฃไพตๅ…ฅ้˜ฒๆญขใ‚ทใ‚นใƒ†ใƒ ๏ผˆIPS๏ผ‰ใ‚’ๆคœ็Ÿฅใƒขใƒผใƒ‰ใซ็งป่กŒใ—ใŸใ‚Šใ€ๆœ€้ฉใชใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃไฝ“ๅˆถใ‚’็ถญๆŒใงใใชใใชใ‚‹ๅŽŸๅ› ใจใชใฃใฆใ„ใพใ™ใ€‚ใ“ใ†ใ—ใŸ็พๅฎŸใŒใ‚ใ‚‹ใŸใ‚ใ€ๆ”ปๆ’ƒ่€…ใŒใƒ‘ใƒƒใƒๆœช้ฉ็”จใฎCVE๏ผˆๅคใ„ใ‚‚ใฎใ‚’ๅซใ‚€๏ผ‰ใ‚’ๆ‚ช็”จใ—ใ‚ˆใ†ใจใ™ใ‚‹ไธญใงใ€ใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃไพตๅฎณใฎใƒชใ‚นใ‚ฏใŒ้ซ˜ใพใ‚Šใพใ™ใ€‚

Cato NetworksใŒใ€ๆ–ฐใ—ใ„CVEใธใฎไปฎๆƒณใƒ‘ใƒƒใƒ้ฉ็”จใ‚’ๅฎŒๅ…จใซ่‡ชๅ‹•ๅŒ–

Catoใฎไปฎๆƒณใƒ‘ใƒƒใƒ้ฉ็”จใƒ—ใƒญใ‚ปใ‚นใฏ4ใคใฎใ‚นใƒ†ใƒƒใƒ—ใงๆง‹ๆˆใ•ใ‚ŒใฆใŠใ‚Šใ€Cato ใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃใƒใƒผใƒ ใซใ‚ˆใฃใฆๅฎŸ่กŒใ•ใ‚Œใพใ™ใ€‚

่ฉ•ไพก

CVEใฎๅฏพ่ฑก็ฏ„ๅ›ฒใ‚’่ฉ•ไพกใ—ใฆ ่„†ๅผฑๆ€งใ‚’่ชฟๆŸปใ€‚ ็‰นใซใ€ใ“ใฎCVEใ‚’ไฝฟใฃใŸๆ”ปๆ’ƒใŒๅฎŸ้š›ใซ ็™บ็”Ÿใ—ใฆใ„ใ‚‹ใ‹ใฉใ†ใ‹ใ‚’ ่ชฟๆŸปใ—ใพใ™ใ€‚

ใฉใฎใ‚ทใ‚นใƒ†ใƒ ใŒๅฝฑ้Ÿฟใ‚’ๅ—ใ‘ใ€ ่„…ๅจใ‚ขใ‚ฏใ‚ฟใƒผใŒใฉใฎใ‚ˆใ†ใซๆ”ปๆ’ƒใ‚’ ๅฎŸ่กŒใ™ใ‚‹ใ‹ใ‚’็†่งฃใ—ใพใ™ใ€‚

้–‹็™บ

่„†ๅผฑๆ€งใซไปฎๆƒณใƒ‘ใƒƒใƒใ‚’้ฉ็”จใ™ใ‚‹ใŸใ‚ใ€ ๆ–ฐใ—ใ„IPSใƒซใƒผใƒซใ‚’ไฝœๆˆใ—ใพใ™ใ€‚

ใƒˆใƒฉใƒ•ใ‚ฃใƒƒใ‚ฏใฎใƒกใ‚ฟใƒ‡ใƒผใ‚ฟใซ ๅฏพใ™ใ‚‹ใƒใƒƒใ‚ฏใƒ†ใ‚นใƒ†ใ‚ฃใƒณใ‚ฐใซๅŸบใฅใ ่ชคๆคœ็Ÿฅใ‚’ๆŽ’้™คใ—ใพใ™ใ€‚

ใ‚ชใƒ—ใƒˆใ‚คใƒณใซใ‚ˆใ‚‹ไฟ่ญท

ใ€Œใ‚ทใƒŸใƒฅใƒฌใƒผใƒˆใƒขใƒผใƒ‰ใ€ใง ไปฎๆƒณใƒ‘ใƒƒใƒใ‚’้ธๆŠž็š„ใซใƒ‡ใƒ—ใƒญใ‚คใ—ใพใ™ใ€‚

็‰นๅฎšใฎใŠๅฎขๆง˜ใ‚’ๅฏพ่ฑกใซ ใ‚ชใƒ—ใƒˆใ‚คใƒณใง้˜ฒๅพกใ‚’ๆœ‰ๅŠนใซใ—ใพใ™ใ€‚

ๅ…จ้ขไฟ่ญท

ไปฎๆƒณใƒ‘ใƒƒใƒใ‚’้˜ฒๅพกใƒขใƒผใƒ‰ใซ ็งป่กŒใ—ใพใ™ใ€‚

ใ™ในใฆใฎใŠๅฎขๆง˜ใจใƒˆใƒฉใƒ•ใ‚ฃใƒƒใ‚ฏใ‚’ๅฏพ่ฑกใซไปฎๆƒณใƒ‘ใƒƒใƒใ‚’้ฉ็”จใ—ใพใ™ใ€‚

ใ“ใฎใƒ—ใƒญใ‚ปใ‚นใฏใŠๅฎขๆง˜ใฎใƒชใ‚ฝใƒผใ‚นใ‚’ไธ€ๅˆ‡้–ขไธŽใ•ใ›ใ‚‹ใ“ใจใชใๅฎŸ่กŒใ•ใ‚Œใ€ใŠๅฎขๆง˜ใฎๆฅญๅ‹™ใ‚’ใƒชใ‚นใ‚ฏใซๆ™’ใ™ใ“ใจใ‚‚ใ‚ใ‚Šใพใ›ใ‚“ใ€‚

Request a Demo