misp-circl-feed/feeds/circl/stix-2.1/87c159e3-5105-491e-87ba-94a7f0a52e09.json

1730 lines
134 KiB
JSON
Raw Normal View History

2024-12-27 11:52:46 +01:00
{
"type": "bundle",
"id": "bundle--87c159e3-5105-491e-87ba-94a7f0a52e09",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T14:58:06.000Z",
"modified": "2024-12-18T14:58:06.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--87c159e3-5105-491e-87ba-94a7f0a52e09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T14:58:06.000Z",
"modified": "2024-12-18T14:58:06.000Z",
"name": "OSINT - The Qualcomm DSP Driver - How Serbian authorities have deployed surveillance technology and digital repression tactics",
"published": "2024-12-18T15:09:09Z",
"object_refs": [
"indicator--78598451-70a5-4ba6-8274-222a53419c9f",
"indicator--0b91b3e9-0dc8-4592-bee5-fa5f6f279dcc",
"indicator--d574ff43-3c2c-4bb6-ad9a-21105a77e998",
"indicator--a5c95b54-eec2-401c-9aa3-b3bf982e452a",
"indicator--f580ee0d-00e1-4598-ab83-61ed02461879",
"indicator--23bed7e5-3459-4a06-b2f0-4d17f2a2504a",
"indicator--eb55d33a-8b9e-47a5-9451-9f30f6275e51",
"vulnerability--93523368-cdeb-4e40-93c7-95282f081050",
"vulnerability--e35ae258-39d0-4aea-adaf-ff1deed1cf22",
"vulnerability--cadabb59-cee7-4a98-b702-6053da7b1466",
"vulnerability--83d3a96c-ae50-41fa-be30-a08ff8d9d051",
"vulnerability--f4eaf7c0-138d-4452-92f1-ec4aa19eb6cb",
"indicator--b6200069-d94c-4334-9a4d-570b1ff0d61f",
"indicator--dc28bcce-a6ff-4401-8c76-ae56b28f5d08",
"indicator--b11af347-65a7-4ac3-adb7-f157c1ed08ad",
"indicator--aa13f20e-b889-4a72-b7f7-b21d1ad1d2ae",
"indicator--c74ecc1d-eaff-4c38-8a9b-51d92f75546b",
"indicator--995df746-de50-4b0d-9fcd-2aa555ce8717",
"indicator--79588571-f59b-4641-96a5-14324f568544",
"indicator--7a732cff-c64c-4635-83da-f3cff5e96962",
"indicator--dbc175c4-62ec-4e31-a267-84e30e5f696a",
"indicator--e1fbeab1-f37e-48ae-920d-eeaf41baf5dd",
"indicator--3c9eb0c4-c348-4155-9d3b-4e10b483cdd0",
"x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"x-misp-object--2238d951-9371-4559-b15e-dbd78c5f5b7e",
"indicator--b9403f54-a64d-4da7-9064-d3b4a74c45ef",
"vulnerability--3f3871c5-eca1-471b-bf55-3d2fa1f569be",
"vulnerability--f65d3080-5ae0-43b8-9656-85be5c92d817",
"vulnerability--2a6da60c-9a70-40bc-b83c-8942608209e7",
"vulnerability--e1150640-0637-4929-af0c-0a797140ee63",
"vulnerability--a92ae7c7-279f-414a-96a4-f62f037bc31a",
"indicator--9fdc1c86-13db-400b-b177-8a2f89adea92",
"location--6d59a404-203d-4c65-8ef6-2728b330de95",
"location--2c4355f8-8d24-4cb6-a011-63f3d69bcc6c",
"observed-data--ee4bdc0d-7335-4e44-b9a9-7da176d8d8d3",
"autonomous-system--ee4bdc0d-7335-4e44-b9a9-7da176d8d8d3",
"indicator--ac0901de-ab25-4f8a-8401-b14245569572",
"indicator--7371a4ca-2fdb-474e-a85c-f515f8322c10",
"note--ec33b5c4-620e-4e97-b532-b7a5471ad0bf",
"relationship--2c5ae27d-e662-40d9-a911-00e2d57669b3",
"relationship--1a5be3a8-db06-4fb3-ae94-c3a8daaf7c56",
"relationship--8e45ba90-6c24-4fe7-a616-b7df9939bac0",
"relationship--5ddf107d-33ce-471f-882b-6350c66b10c9",
"relationship--a7daa8e0-d6b4-45e5-a7d6-55ed646cd2b1",
"relationship--66410b95-265b-4c8e-bf92-a768b53cf92e",
"relationship--850c179e-6a09-48fd-826e-e2a2993e1370",
"relationship--ca7a8983-ec57-4b2a-bcec-e3f2d44f28de",
"relationship--9d5d5b96-f833-42af-8440-5161b95d6b1a",
"relationship--a4d2e60d-0c35-424e-9ac3-dadb46af551b",
"relationship--0e0b4581-a32f-43b2-8268-d9d1758966be",
"relationship--4ee6dfe9-e6b4-4b71-b02f-5f201881110d",
"relationship--a3d5d64d-48e8-4941-818a-62a878ec1adc",
"relationship--0282c79e-2ba2-4144-9ee4-18683c5e74eb",
"relationship--3fc68c72-62bc-45dd-98bd-c8e09f0e3b21",
"relationship--6164a673-5e12-4f31-867a-2f017886be2d",
"relationship--2fb7842b-6010-44a1-bbe4-0126511ab443",
"relationship--9cd50a8a-faca-442c-a10f-bc1809e36320",
"relationship--a9064ec0-2e6f-4037-959c-3de343ba4bb1",
"relationship--63cf031e-851d-48bd-8971-d31f9c7fb5d4",
"relationship--3a919933-cff3-45f9-8648-8e0e24070121",
"relationship--fb48ea5e-f550-4952-a074-11d9051354fc",
"relationship--95c02cb8-08ae-4426-9372-4faf1d335292"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"type:OSINT",
"osint:lifetime=\"perpetual\"",
"tlp:clear",
"misp-galaxy:country=\"serbia\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78598451-70a5-4ba6-8274-222a53419c9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '176.223.111.131']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b91b3e9-0dc8-4592-bee5-fa5f6f279dcc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '195.178.51.251']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d574ff43-3c2c-4bb6-ad9a-21105a77e998",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '94.140.125.174']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5c95b54-eec2-401c-9aa3-b3bf982e452a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '178.220.122.57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f580ee0d-00e1-4598-ab83-61ed02461879",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '185.86.148.174']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--23bed7e5-3459-4a06-b2f0-4d17f2a2504a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '188.93.127.34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb55d33a-8b9e-47a5-9451-9f30f6275e51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"description": "Merged from event 270542",
"pattern": "[domain-name:value = '79.101.110.108']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--93523368-cdeb-4e40-93c7-95282f081050",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:27.000Z",
"modified": "2024-12-18T13:15:27.000Z",
"name": "CVE-2024-38402",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"External analysis\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38402"
}
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e35ae258-39d0-4aea-adaf-ff1deed1cf22",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:27.000Z",
"modified": "2024-12-18T13:15:27.000Z",
"name": "CVE-2024-49848",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"External analysis\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49848"
}
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--cadabb59-cee7-4a98-b702-6053da7b1466",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:27.000Z",
"modified": "2024-12-18T13:15:27.000Z",
"name": "CVE-2024-21455",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"External analysis\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21455"
}
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--83d3a96c-ae50-41fa-be30-a08ff8d9d051",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:27.000Z",
"modified": "2024-12-18T13:15:27.000Z",
"name": "CVE-2024-43047",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"External analysis\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43047"
}
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f4eaf7c0-138d-4452-92f1-ec4aa19eb6cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:27.000Z",
"modified": "2024-12-18T13:15:27.000Z",
"name": "CVE-2024-33060",
"labels": [
"misp:type=\"vulnerability\"",
"misp:category=\"External analysis\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-33060"
}
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6200069-d94c-4334-9a4d-570b1ff0d61f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:id='com.gu.activity']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc28bcce-a6ff-4401-8c76-ae56b28f5d08",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:id='com.serv.services']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b11af347-65a7-4ac3-adb7-f157c1ed08ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:id='com.li.activity']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aa13f20e-b889-4a72-b7f7-b21d1ad1d2ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:id='com.accesibilityservice']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c74ecc1d-eaff-4c38-8a9b-51d92f75546b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:cert.sha256='3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--995df746-de50-4b0d-9fcd-2aa555ce8717",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:cert.sha256='35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79588571-f59b-4641-96a5-14324f568544",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[app:cert.sha256='38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a732cff-c64c-4635-83da-f3cff5e96962",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[file:hashes.sha256='d55e492d5fce87898e065572a5553d1ac1389cd12bf3d28cabc1218cb29780af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dbc175c4-62ec-4e31-a267-84e30e5f696a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[file:hashes.sha256='54ee2c4f3e2396b6f92def135d68abd35d63ca7f9c304633a36f705ba4728cb7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e1fbeab1-f37e-48ae-920d-eeaf41baf5dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[file:hashes.sha256='99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c9eb0c4-c348-4155-9d3b-4e10b483cdd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"pattern": "[file:hashes.sha256='087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T07:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"stix2-pattern\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"labels": [
"misp:name=\"malware\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "text",
"object_relation": "description",
"value": "IOCs for Serbian NoviSpy Android spyware",
"category": "Other",
"uuid": "45e88973-e964-4cb2-82c5-736c687814e5"
},
{
"type": "boolean",
"object_relation": "is_family",
"value": "0",
"category": "Other",
"uuid": "e14954d9-1027-4a2d-8101-73511929626d"
},
{
"type": "text",
"object_relation": "name",
"value": "NoviSpy",
"category": "Other",
"uuid": "1b4fa685-920b-4403-be41-b6b947e2a9a4"
}
],
"x_misp_comment": "Merged from event 270542",
"x_misp_meta_category": "misc",
"x_misp_name": "malware"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2238d951-9371-4559-b15e-dbd78c5f5b7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"labels": [
"misp:name=\"original-imported-file\"",
"misp:meta-category=\"file\""
],
"x_misp_attributes": [
{
"type": "attachment",
"object_relation": "imported-sample",
"value": "novispy.stix2",
"category": "External analysis",
"uuid": "977ab1fb-2f7b-4d4f-9b3e-f993b5856527",
"data": "ewogICAgInR5cGUiOiAiYnVuZGxlIiwKICAgICJpZCI6ICJidW5kbGUtLTg0MmJmMWUyLTA1YzgtNGM5YS05YTU2LTg2OTM0OWFhYTZiYSIsCiAgICAib2JqZWN0cyI6IFsKICAgICAgICB7CiAgICAgICAgICAgICJ0eXBlIjogIm1hbHdhcmUiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJtYWx3YXJlLS1mYzVmMjM3MC05ZDViLTQ2NjAtOThkMi1mNzY2OGIyMzU4MzEiLAogICAgICAgICAgICAiY3JlYXRlZCI6ICIyMDI0LTEyLTEzVDIxOjE1OjQ5LjE1MjkyNVoiLAogICAgICAgICAgICAibW9kaWZpZWQiOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTI5MjVaIiwKICAgICAgICAgICAgIm5hbWUiOiAiTm92aVNweSIsCiAgICAgICAgICAgICJkZXNjcmlwdGlvbiI6ICJJT0NzIGZvciBTZXJiaWFuIE5vdmlTcHkgQW5kcm9pZCBzcHl3YXJlIiwKICAgICAgICAgICAgImlzX2ZhbWlseSI6IGZhbHNlCiAgICAgICAgfSwKICAgICAgICB7CiAgICAgICAgICAgICJ0eXBlIjogImluZGljYXRvciIsCiAgICAgICAgICAgICJzcGVjX3ZlcnNpb24iOiAiMi4xIiwKICAgICAgICAgICAgImlkIjogImluZGljYXRvci0tZjI3ODRhMzItN2U0Ny00YWFiLWEyMjItMDhkMDdkNzA4ZGI5IiwKICAgICAgICAgICAgImNyZWF0ZWQiOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTMxMjlaIiwKICAgICAgICAgICAgIm1vZGlmaWVkIjogIjIwMjQtMTItMTNUMjE6MTU6NDkuMTUzMTI5WiIsCiAgICAgICAgICAgICJpbmRpY2F0b3JfdHlwZXMiOiBbCiAgICAgICAgICAgICAgICAibWFsaWNpb3VzLWFjdGl2aXR5IgogICAgICAgICAgICBdLAogICAgICAgICAgICAicGF0dGVybiI6ICJbZG9tYWluLW5hbWU6dmFsdWU9JzE3Ni4yMjMuMTExLjEzMSddIiwKICAgICAgICAgICAgInBhdHRlcm5fdHlwZSI6ICJzdGl4IiwKICAgICAgICAgICAgInBhdHRlcm5fdmVyc2lvbiI6ICIyLjEiLAogICAgICAgICAgICAidmFsaWRfZnJvbSI6ICIyMDI0LTEyLTEzVDIxOjE1OjQ5LjE1MzEyOVoiCiAgICAgICAgfSwKICAgICAgICB7CiAgICAgICAgICAgICJ0eXBlIjogInJlbGF0aW9uc2hpcCIsCiAgICAgICAgICAgICJzcGVjX3ZlcnNpb24iOiAiMi4xIiwKICAgICAgICAgICAgImlkIjogInJlbGF0aW9uc2hpcC0tNDk2OWVhZjgtMjgyNS00NTMzLTlkZjUtYjIxZDFmMGJmOGRlIiwKICAgICAgICAgICAgImNyZWF0ZWQiOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTcxMzdaIiwKICAgICAgICAgICAgIm1vZGlmaWVkIjogIjIwMjQtMTItMTNUMjE6MTU6NDkuMTU3MTM3WiIsCiAgICAgICAgICAgICJyZWxhdGlvbnNoaXBfdHlwZSI6ICJpbmRpY2F0ZXMiLAogICAgICAgICAgICAic291cmNlX3JlZiI6ICJpbmRpY2F0b3ItLWYyNzg0YTMyLTdlNDctNGFhYi1hMjIyLTA4ZDA3ZDcwOGRiOSIsCiAgICAgICAgICAgICJ0YXJnZXRfcmVmIjogIm1hbHdhcmUtLWZjNWYyMzcwLTlkNWItNDY2MC05OGQyLWY3NjY4YjIzNTgzMSIKICAgICAgICB9LAogICAgICAgIHsKICAgICAgICAgICAgInR5cGUiOiAiaW5kaWNhdG9yIiwKICAgICAgICAgICAgInNwZWNfdmVyc2lvbiI6ICIyLjEiLAogICAgICAgICAgICAiaWQiOiAiaW5kaWNhdG9yLS0yNTBkMDQ2OC04NWJlLTRmNjQtYjcxMy05ZjE2ZjM4ZTcwMWIiLAogICAgICAgICAgICAiY3JlYXRlZCI6ICIyMDI0LTEyLTEzVDIxOjE1OjQ5LjE1ODI4NFoiLAogICAgICAgICAgICAibW9kaWZpZWQiOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTgyODRaIiwKICAgICAgICAgICAgImluZGljYXRvcl90eXBlcyI6IFsKICAgICAgICAgICAgICAgICJtYWxpY2lvdXMtYWN0aXZpdHkiCiAgICAgICAgICAgIF0sCiAgICAgICAgICAgICJwYXR0ZXJuIjogIltkb21haW4tbmFtZTp2YWx1ZT0nMTk1LjE3OC41MS4yNTEnXSIsCiAgICAgICAgICAgICJwYXR0ZXJuX3R5cGUiOiAic3RpeCIsCiAgICAgICAgICAgICJwYXR0ZXJuX3ZlcnNpb24iOiAiMi4xIiwKICAgICAgICAgICAgInZhbGlkX2Zyb20iOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTgyODRaIgogICAgICAgIH0sCiAgICAgICAgewogICAgICAgICAgICAidHlwZSI6ICJyZWxhdGlvbnNoaXAiLAogICAgICAgICAgICAic3BlY192ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJpZCI6ICJyZWxhdGlvbnNoaXAtLWZhNDBkODg2LTIwZGUtNDgzOC04ZmQxLThjNDdmODI2NTM2MCIsCiAgICAgICAgICAgICJjcmVhdGVkIjogIjIwMjQtMTItMTNUMjE6MTU6NDkuMTU4NzgzWiIsCiAgICAgICAgICAgICJtb2RpZmllZCI6ICIyMDI0LTEyLTEzVDIxOjE1OjQ5LjE1ODc4M1oiLAogICAgICAgICAgICAicmVsYXRpb25zaGlwX3R5cGUiOiAiaW5kaWNhdGVzIiwKICAgICAgICAgICAgInNvdXJjZV9yZWYiOiAiaW5kaWNhdG9yLS0yNTBkMDQ2OC04NWJlLTRmNjQtYjcxMy05ZjE2ZjM4ZTcwMWIiLAogICAgICAgICAgICAidGFyZ2V0X3JlZiI6ICJtYWx3YXJlLS1mYzVmMjM3MC05ZDViLTQ2NjAtOThkMi1mNzY2OGIyMzU4MzEiCiAgICAgICAgfSwKICAgICAgICB7CiAgICAgICAgICAgICJ0eXBlIjogImluZGljYXRvciIsCiAgICAgICAgICAgICJzcGVjX3ZlcnNpb24iOiAiMi4xIiwKICAgICAgICAgICAgImlkIjogImluZGljYXRvci0tYzE3Mjc2NDktNzk5OC00YzVjLThjNDItYzg3ZmY4OTExOTkxIiwKICAgICAgICAgICAgImNyZWF0ZWQiOiAiMjAyNC0xMi0xM1QyMToxNTo0OS4xNTg4OTZaIiwKICAgICAgICAgICAgIm1vZGlmaWVkIjogIjIwMjQtMTItMTNUMjE6MTU6NDkuMTU4ODk2WiIsCiAgICAgICAgICAgICJpbmRpY2F0b3JfdHlwZXMiOiBbCiAgICAgICAgICAgICAgICAibWFsaWNpb3VzLWFjdGl2aXR5IgogICAgICAgICAgICBdLAogICAgICAgICAgICAicGF0dGVybiI6ICJbZG9tYWluLW5hbWU6dmFsdWU9Jzk0LjE0MC4xMjUuMTc0J10iLAogICAgICAgICAgICAicGF0dGVybl90eXBlIjogInN0aXgiLAogICAgICAgICAgICAicGF0dGVybl92ZXJzaW9uIjogIjIuMSIsCiAgICAgICAgICAgICJ2YWxpZF9mcm9tIjogIjIwMjQtMTItMTNUMjE6MTU6ND
},
{
"type": "text",
"object_relation": "format",
"value": "2.1",
"category": "Other",
"uuid": "d8ff4d9c-7691-4872-a407-0971332a2e70"
}
],
"x_misp_comment": "Merged from event 270542",
"x_misp_meta_category": "file",
"x_misp_name": "original-imported-file"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b9403f54-a64d-4da7-9064-d3b4a74c45ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T08:05:56.000Z",
"modified": "2024-12-18T08:05:56.000Z",
"pattern": "[software:x_misp_appid = 'com.serv.services' AND software:x_misp_appid = 'com.gu.activity' AND software:x_misp_appid = 'com.li.activity' AND software:x_misp_appid = 'com.accesibilityservice' AND software:x_misp_certificate_sha256 = '3ac97735164824657b683e805133b1274b2dedabf9fdd6aa9aca31089d501e64' AND software:x_misp_certificate_sha256 = '35926e966186c8f2deec66864389d73989c75c85cb6668da2f455db6fe67e91f' AND software:x_misp_certificate_sha256 = '38693e1ea0fbf39d28f66b1714fdeed4e23b3973276481097d2d66e87f3647eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T08:05:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"android-app\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3f3871c5-eca1-471b-bf55-3d2fa1f569be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:15:47.000Z",
"modified": "2024-12-18T13:15:47.000Z",
"name": "CVE-2024-33060",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-33060"
},
{
"source_name": "url",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html"
}
],
"x_misp_modified": "2024-09-05T03:56:12.175000+00:00",
"x_misp_published": "2024-09-02T10:22:46.127000+00:00",
"x_misp_state": "PUBLISHED",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:qualcomm:315_5g_iot_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_670_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_675_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_710_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_720g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_750g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_855_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x20_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x50_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_4g_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*"
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f65d3080-5ae0-43b8-9656-85be5c92d817",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:16:05.000Z",
"modified": "2024-12-18T13:16:05.000Z",
"name": "CVE-2024-43047",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-43047"
},
{
"source_name": "url",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html"
}
],
"x_misp_modified": "2024-10-09T12:57:09.326000+00:00",
"x_misp_published": "2024-10-07T12:59:01.656000+00:00",
"x_misp_state": "PUBLISHED",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_865\\\\+_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888\\\\+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6225-ad_firmware:-:*:*:*:*:*:*:*"
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2a6da60c-9a70-40bc-b83c-8942608209e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:16:22.000Z",
"modified": "2024-12-18T13:16:22.000Z",
"name": "CVE-2024-21455",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21455"
},
{
"source_name": "url",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html"
}
],
"x_misp_modified": "2024-10-07T13:19:44.091000+00:00",
"x_misp_published": "2024-10-07T12:58:42.341000+00:00",
"x_misp_state": "PUBLISHED",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*"
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--e1150640-0637-4929-af0c-0a797140ee63",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:17:12.000Z",
"modified": "2024-12-18T13:17:12.000Z",
"name": "CVE-2024-21455",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-21455"
},
{
"source_name": "url",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html"
}
],
"x_misp_modified": "2024-10-07T13:19:44.091000+00:00",
"x_misp_published": "2024-10-07T12:58:42.341000+00:00",
"x_misp_state": "PUBLISHED",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*"
]
},
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a92ae7c7-279f-414a-96a4-f62f037bc31a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:18:07.000Z",
"modified": "2024-12-18T13:18:07.000Z",
"name": "CVE-2024-38402",
"labels": [
"misp:name=\"vulnerability\"",
"misp:meta-category=\"vulnerability\"",
"misp:to_ids=\"False\""
],
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-38402"
},
{
"source_name": "url",
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html"
}
],
"x_misp_modified": "2024-09-06T16:19:57.498000+00:00",
"x_misp_published": "2024-09-02T10:22:48.204000+00:00",
"x_misp_state": "PUBLISHED",
"x_misp_vulnerable_configuration": [
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:talynplus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*"
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9fdc1c86-13db-400b-b177-8a2f89adea92",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:45:38.000Z",
"modified": "2024-12-18T13:45:38.000Z",
"pattern": "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.178.51.251') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.101.110.108') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.93.127.34') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.220.122.57') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.140.125.174') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.86.148.174') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.223.111.131')]",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2024-12-18T13:45:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "network"
}
],
"labels": [
"misp:name=\"ip-port\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "location",
"spec_version": "2.1",
"id": "location--6d59a404-203d-4c65-8ef6-2728b330de95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:46:19.000Z",
"modified": "2024-12-18T13:46:19.000Z",
"description": "db_source: GeoOpen-Country. build_db: 2023-11-20 12:50:37. Latitude and longitude are country average.",
"latitude": 44.0,
"longitude": 21.0,
"country": "RS",
"labels": [
"misp:name=\"geolocation\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"False\""
],
"x_misp_country": "Serbia"
},
{
"type": "location",
"spec_version": "2.1",
"id": "location--2c4355f8-8d24-4cb6-a011-63f3d69bcc6c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:46:19.000Z",
"modified": "2024-12-18T13:46:19.000Z",
"description": "db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14. Latitude and longitude are country average.",
"latitude": 44.0,
"longitude": 21.0,
"country": "RS",
"labels": [
"misp:name=\"geolocation\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"False\""
],
"x_misp_country": "Serbia"
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--ee4bdc0d-7335-4e44-b9a9-7da176d8d8d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:46:19.000Z",
"modified": "2024-12-18T13:46:19.000Z",
"first_observed": "2024-12-18T13:46:19Z",
"last_observed": "2024-12-18T13:46:19Z",
"number_observed": 1,
"object_refs": [
"autonomous-system--ee4bdc0d-7335-4e44-b9a9-7da176d8d8d3"
],
"labels": [
"misp:name=\"asn\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"False\""
]
},
{
"type": "autonomous-system",
"spec_version": "2.1",
"id": "autonomous-system--ee4bdc0d-7335-4e44-b9a9-7da176d8d8d3",
"number": 8400,
"name": "ASNOrganization: TELEKOM-AS. db_source: GeoOpen-Country-ASN. build_db: 2023-11-20 15:49:14."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac0901de-ab25-4f8a-8401-b14245569572",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T14:57:06.000Z",
"modified": "2024-12-18T14:57:06.000Z",
"name": "APT_serbia_novispy_android_accesibilityservice",
"pattern": "rule APT_serbia_novispy_android_accesibilityservice {\r\n meta:\r\n description = \\\\\"Rule for Serbian NoviSpy Android spyware APK, com.accesibilityservice version\\\\\"\r\n author = \\\\\"Donncha O Cearbhaill, Amnesty International\\\\\"\r\n sample = \\\\\"99673ce7f10e938ed73ed4a99930fbd6499983caa7a2c1b9e3f0e0bb0a5df602\\\\\"\r\n\r\n strings:\r\n $dex = { 64 65 78 0A 30 33 ?? 00 }\r\n\r\n // C2 communication\r\n $c2_1 = \\\\\"195.178.51.251\\\\\"\r\n $c2_2 = \\\\\"79.101.110.108\\\\\"\r\n $c2_3 = \\\\\"188.93.127.34\\\\\"\r\n\r\n // Unique Strings\r\n $u_1 = \\\\\"kataklinger vibercajzna\\\\\" ascii nocase\r\n $u_2 = \\\\\"select action_command.* from action_command where action_id = ? and trigger_type = ?\\\\\" ascii nocase\r\n $u_3 = \\\\\"6FDF20EAFA2D58AF609C72AE7092BB45\\\\\" ascii nocase\r\n $u_4 = \\\\\"{\\\\\\\\\"cellChangeMonitoring\\\\\\\\\":true,\\\\\\\\\"signalStrengthMonitoring\\\\\\\\\":true,\\\\\\\\\"temperatureDelta\\\\\\\\\":1,\\\\\" ascii nocase\r\n $u_5 = \\\\\"{\\\\\\\\\"fileUpload\\\\\\\\\":false,\\\\\\\\\"audioRecording\\\\\\\\\":false,\\\\\\\\\"cellChangeMonitoring\\\\\\\\\":true,\\\\\"ascii nocase\r\n $u_6 = \\\\\"\\\\\\\\\"serverIp\\\\\\\\\":\\\\\\\\\"188.93.127.34\\\\\\\\\"\\\\\" ascii nocase\r\n $u_7 = \\\\\"ucitavanjepodataka\\\\\" ascii nocase\r\n\r\n // Other strings\r\n $s_1 = \\\\\"test.dat\\\\\" ascii\r\n $s_2 = \\\\\"/active.config\\\\\" ascii\r\n $s_3 = \\\\\"message_map.ser\\\\\" ascii\r\n $s_4 = \\\\\"event type =\\\\\" ascii\r\n $s_5 = \\\\\"change type subtree\\\\\" ascii\r\n $s_6 = \\\\\"change type content description\\\\\" ascii\r\n $s_7 = \\\\\"change type pane title\\\\\" ascii\r\n $s_8 = \\\\\"content change type pane_appeared\\\\\" ascii\r\n $s_9 = \\\\\"window state changed\\\\\" ascii\r\n $s_10 = \\\\\"notification state changed\\\\\" ascii\r\n $s_11 = \\\\\"window content changed\\\\\" ascii\r\n $s_12 = \\\\\"view scrolled\\\\\" ascii\r\n $s_13 = \\\\\"type selection changed\\\\\" ascii\r\n $s_14 = \\\\\"type announcement\\\\\" ascii\r\n $s_15 = \\\\\"scroll position =\\\\\" ascii\r\n $s_16 = \\\\\"imei=\\\\%s;imsi=\\\\%s;phone=\\\\%s;sim_serial=\\\\%s;os=\\\\%s\\\\\"\r\n $s_17 = \\\\\"imei=\\\\%s;imsi=\\\\%s;phone=\\\\%s;sim_serial=\\\\%s;roaming=\\\\%s;os=\\\\%s\\\\\"\r\n $s_18 = \\\\\"last message = \\\\%s, level = \\\\%d, hash = \\\\%s, node count = \\\\%d\\\\\"\r\n $s_19 = \\\\\"MyAccessibilityService\\\\\"\r\n\r\n condition:\r\n $dex at 0 and (\r\n any of ($u*) or\r\n any of ($c2*) or\r\n 7 of ($s*)\r\n )\r\n }",
"pattern_type": "yara",
"pattern_version": "2.1",
"valid_from": "2024-12-18T14:57:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"yara\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
],
"x_misp_context": "all"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7371a4ca-2fdb-474e-a85c-f515f8322c10",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T14:58:06.000Z",
"modified": "2024-12-18T14:58:06.000Z",
"name": "APT_serbia_novispy_android_serv_services",
"pattern": "rule APT_serbia_novispy_android_serv_services {\r\n meta:\r\n description = \\\\\"Rule for Serbian NoviSpy Android spyware APK, com.serv.services version\\\\\"\r\n author = \\\\\"Donncha O Cearbhaill, Amnesty International\\\\\"\r\n sample = \\\\\"087fc1217c897033425fe7f1f12b913cd48918c875e99c25bdb9e1ffcf80f57e\\\\\"\r\n\r\n strings:\r\n $dex = { 64 65 78 0A 30 33 ?? 00 }\r\n\r\n // C2 communication\r\n $c2_comm_1 = \\\\\"178.220.122.57\\\\\"\r\n\r\n // Unique Strings\r\n\r\n\r\n // C2 commands received via SMS\r\n $sms_c2_cmd_1 = \\\\\"C_ARF\\\\\" ascii\r\n $sms_c2_cmd_2 = \\\\\"C_ARN\\\\\" ascii\r\n $sms_c2_cmd_3 = \\\\\"C_AWF\\\\\" ascii\r\n $sms_c2_cmd_4 = \\\\\"C_AWI\\\\\" ascii\r\n $sms_c2_cmd_5 = \\\\\"C_AWN\\\\\" ascii\r\n $sms_c2_cmd_6 = \\\\\"C_CRF\\\\\" ascii\r\n $sms_c2_cmd_7 = \\\\\"C_CRN\\\\\" ascii\r\n $sms_c2_cmd_8 = \\\\\"C_LCW\\\\\" ascii\r\n $sms_c2_cmd_9 = \\\\\"C_MNS\\\\\" ascii\r\n $sms_c2_cmd_10 = \\\\\"C_MXS\\\\\" ascii\r\n $sms_c2_cmd_11 = \\\\\"C_R_F\\\\\" ascii\r\n $sms_c2_cmd_12 = \\\\\"C_R_N\\\\\" ascii\r\n $sms_c2_cmd_13 = \\\\\"C_SMF\\\\\" ascii\r\n $sms_c2_cmd_14 = \\\\\"C_SMN\\\\\" ascii\r\n $sms_c2_cmd_15 = \\\\\"C_SWF\\\\\" ascii\r\n $sms_c2_cmd_16 = \\\\\"C_SWN\\\\\" ascii\r\n $sms_c2_cmd_17 = \\\\\"C_UIR\\\\\" ascii\r\n $sms_c2_cmd_18 = \\\\\"C_UMF\\\\\" ascii\r\n $sms_c2_cmd_19 = \\\\\"C_UMN\\\\\" ascii\r\n $sms_c2_cmd_20 = \\\\\"C_UWF\\\\\" ascii\r\n $sms_c2_cmd_21 = \\\\\"C_UWN\\\\\" ascii\r\n $sms_c2_cmd_22 = \\\\\"C_WLF\\\\\" ascii\r\n $sms_c2_cmd_23 = \\\\\"C_WLN\\\\\" ascii\r\n\r\n // C2 commands received via FTP.\r\n // This is not a comprehensive list of commands, generic command names are excluded to prevent false positives.\r\n $ftp_c2_cmd_1 = \\\\\"CALL_REC_OFF\\\\\" ascii\r\n $ftp_c2_cmd_2 = \\\\\"CALL_REC_ON\\\\\" ascii\r\n $ftp_c2_cmd_3 = \\\\\"CHARGING_REC_OFF\\\\\" ascii\r\n $ftp_c2_cmd_4 = \\\\\"CHARGING_REC_ON\\\\\" ascii\r\n $ftp_c2_cmd_5 = \\\\\"SECURE_REC_OFF\\\\\" ascii\r\n $ftp_c2_cmd_6 = \\\\\"SECURE_REC_ON\\\\\" ascii\r\n $ftp_c2_cmd_7 = \\\\\"SSD_MOBILE_OFF\\\\\" ascii\r\n $ftp_c2_cmd_8 = \\\\\"SSD_MOBILE_ON\\\\\" ascii\r\n $ftp_c2_cmd_9 = \\\\\"SSD_WIFI_OFF\\\\\" ascii\r\n $ftp_c2_cmd_10 = \\\\\"SSD_WIFI_ON\\\\\" ascii\r\n $ftp_c2_cmd_11 = \\\\\"UPLOAD_INTERVAL\\\\\" ascii\r\n $ftp_c2_cmd_12 = \\\\\"UPLOAD_MOBILE_OFF\\\\\" ascii\r\n $ftp_c2_cmd_13 = \\\\\"UPLOAD_MOBILE_ON\\\\\" ascii\r\n $ftp_c2_cmd_14 = \\\\\"UPLOAD_WIFI_OFF\\\\\" ascii\r\n $ftp_c2_cmd_15 = \\\\\"UPLOAD_WIFI_ON\\\\\" ascii\r\n $ftp_c2_cmd_16 = \\\\\"AUTO_WIFI_INTERVAL\\\\\" ascii\r\n $ftp_c2_cmd_17 = \\\\\"WIFI_LOCK_ON\\\\\" ascii\r\n $ftp_c2_cmd_18 = \\\\\"WIFI_LOCK_OFF\\\\\" ascii\r\n $ftp_c2_cmd_19 = \\\\\"AUTO_WIFI_ON\\\\\" ascii\r\n $ftp_c2_cmd_20 = \\\\\"AUTO_WIFI_OFF\\\\\" ascii\r\n $ftp_c2_cmd_21 = \\\\\"START_AUDIO\\\\\" ascii\r\n\r\n // App local settings configured based on C2 commands.\r\n $setting_1 = \\\\\"UIR\\\\\" ascii\r\n $setting_2 = \\\\\"ULW\\\\\" ascii\r\n $setting_3 = \\\\\"ULM\\\\\" ascii\r\n $setting_4 = \\\\\"SSW\\\\\" ascii\r\n $setting_5 = \\\\\"SSM\\\\\" ascii\r\n $setting_6 = \\\\\"CRN\\\\\" ascii\r\n $setting_7 = \\\\\"SRN\\\\\" ascii\r\n $setting_8 = \\\\\"CRC\\\\\" ascii\r\n $setting_9 = \\\\\"MXS\\\\\" ascii\r\n $setting_10 = \\\\\"MNS\\\\\" ascii\r\n $setting_11 = \\\\\"AWF\\\\\" ascii\r\n $setting_12 = \\\\\"AWI\\\\\" ascii\r\n $setting_13 = \\\\\"CHR\\\\\" ascii\r\n $setting_14 = \\\\\"WLS\\\\\" ascii\r\n $setting_15 = \\\\\"A_R_N\\\\\" ascii\r\n $setting_16 = \\\\\"A_R_F\\\\\" ascii\r\n $setting_17 = \\\\\"U_I\\\\\" ascii\r\n
"pattern_type": "yara",
"pattern_version": "2.1",
"valid_from": "2024-12-18T14:58:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "misc"
}
],
"labels": [
"misp:name=\"yara\"",
"misp:meta-category=\"misc\"",
"misp:to_ids=\"True\""
],
"x_misp_context": "all"
},
{
"type": "note",
"spec_version": "2.1",
"id": "note--ec33b5c4-620e-4e97-b532-b7a5471ad0bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2024-12-18T13:38:05.000Z",
"modified": "2024-12-18T13:38:05.000Z",
"abstract": "Serbia: Authorities using spyware and Cellebrite forensic extraction tools to hack journalists and activists - Amnesty International Security Lab",
"content": "# Serbia: Authorities using spyware and Cellebrite forensic extraction tools to hack journalists and activists - Amnesty International Security Lab\r\nThis press release is al_so available in Serbian \u201c**S[rbija: Vlasti koriste \u0161pijunske softvere i forenzi\u010dke alate kompanije Cellebrite za hakovanje novinara i aktivista](https://securitylab.amnesty.org/latest/2024/12/srbija-vlasti-koriste-spijunske-softvere-i-forenzicke-alate-kompanije-cellebrite-za-hakovanje-novinara-i-aktivista/)**\u201c._\r\n\r\nWe have published the report\u2019s [Executive Summary as a webpage](https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/). The full report is available in [PDF format from Amnesty.org](https://www.amnesty.org/en/documents/eur70/8813/2024/en/).\r\n\r\n* * *\r\n\r\nSerbian police and intelligence authorities are using advanced phone spyware alongside mobile phone forensic products to unlawfully target journalists, environmental activists and other individuals in a covert surveillance campaign, a new Amnesty International report has revealed.\u00a0\r\n\r\nThe report, **_[\u201cA Digital Prison\u201d: Surveillance and the Suppression of Civil Society in Serbia](https://www.amnesty.org/en/documents/eur70/8813/2024/en/),_** documents how mobile forensic products made by Israeli company Cellebrite are being used to extract data from mobile devices belonging to journalists and activists. It also reveals how the Serbian police and the Security Information Agency (Bezbedonosno-informativna Agencija \u2013 BIA) have used a bespoke Android spyware system, NoviSpy, to covertly infect individuals\u2019 devices during periods of detention or police interviews.\u00a0\r\n\r\n\u201cOur investigation reveals how Serbian authorities have deployed surveillance technology and digital repression tactics as instruments of wider state control and repression directed against civil society,\u201d said Dinushika Dissanayake, Amnesty International\u2019s Deputy Regional Director for Europe.\u00a0\r\n\r\n\u201cIt also highlights how Cellebrite mobile forensic products \u2013 used widely by police and intelligence services worldwide \u2013 can pose an enormous risk to those advocating for human rights, the environment and freedom of speech, when used outside of strict legal control and oversight.\u201d\u00a0\r\n\r\n**How Cellebrite and NoviSpy is used to target devices**\u00a0\r\n---------------------------------------------------------\r\n\r\nCellebrite, a firm founded and headquartered in Israel but with offices globally, develops the Cellebrite UFED suite of products for law enforcement agencies and government entities. It enables the extraction of data from a wide range of mobile devices including some of the most recent Android devices and iPhone models, even without access to the device passcode. \u00a0\r\n\r\nWhile less technically advanced than highly-invasive commercial spyware like Pegasus, NoviSpy \u2013 a previously unknown Android spyware \u2013 still provides Serbian authorities with extensive surveillance capabilities once installed on a target\u2019s device.\u00a0\r\n\r\nNoviSpy can capture sensitive personal data from a target phone and provide capabilities to turn on a phone\u2019s microphone or camera remotely, while Cellebrite forensic tools are used to both unlock the phone prior to spyware infection and also allow the extraction of the data on a device.\u00a0\r\n\r\nCritically, Amnesty International uncovered forensic evidence showing how Serbian authorities used Cellebrite products to enable NoviSpy spyware infections of activists\u2019 phones. In at least two cases, Cellebrite UFED exploits (software that takes advantage of a bug or vulnerability) were used to bypass Android device security mechanisms, allowing the authorities to covertly install the NoviSpy spyware during police interviews.\u00a0\r\n\r\nAmnesty International also identified how Serbian authorities used Cellebrite to exploit a zero-day vulnerability (a softw
"object_refs": [
"report--87c159e3-5105-491e-87ba-94a7f0a52e09"
]
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2c5ae27d-e662-40d9-a911-00e2d57669b3",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--b6200069-d94c-4334-9a4d-570b1ff0d61f",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1a5be3a8-db06-4fb3-ae94-c3a8daaf7c56",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--dc28bcce-a6ff-4401-8c76-ae56b28f5d08",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8e45ba90-6c24-4fe7-a616-b7df9939bac0",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--b11af347-65a7-4ac3-adb7-f157c1ed08ad",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5ddf107d-33ce-471f-882b-6350c66b10c9",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--aa13f20e-b889-4a72-b7f7-b21d1ad1d2ae",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a7daa8e0-d6b4-45e5-a7d6-55ed646cd2b1",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--c74ecc1d-eaff-4c38-8a9b-51d92f75546b",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--66410b95-265b-4c8e-bf92-a768b53cf92e",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--995df746-de50-4b0d-9fcd-2aa555ce8717",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--850c179e-6a09-48fd-826e-e2a2993e1370",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--79588571-f59b-4641-96a5-14324f568544",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ca7a8983-ec57-4b2a-bcec-e3f2d44f28de",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--7a732cff-c64c-4635-83da-f3cff5e96962",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9d5d5b96-f833-42af-8440-5161b95d6b1a",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--dbc175c4-62ec-4e31-a267-84e30e5f696a",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a4d2e60d-0c35-424e-9ac3-dadb46af551b",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--e1fbeab1-f37e-48ae-920d-eeaf41baf5dd",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0e0b4581-a32f-43b2-8268-d9d1758966be",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicates",
"source_ref": "indicator--3c9eb0c4-c348-4155-9d3b-4e10b483cdd0",
"target_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4ee6dfe9-e6b4-4b71-b02f-5f201881110d",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--d574ff43-3c2c-4bb6-ad9a-21105a77e998"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a3d5d64d-48e8-4941-818a-62a878ec1adc",
"created": "2024-12-18T07:52:13.000Z",
"modified": "2024-12-18T07:52:13.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--23bed7e5-3459-4a06-b2f0-4d17f2a2504a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0282c79e-2ba2-4144-9ee4-18683c5e74eb",
"created": "2024-12-18T07:52:14.000Z",
"modified": "2024-12-18T07:52:14.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--0b91b3e9-0dc8-4592-bee5-fa5f6f279dcc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3fc68c72-62bc-45dd-98bd-c8e09f0e3b21",
"created": "2024-12-18T07:52:14.000Z",
"modified": "2024-12-18T07:52:14.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--f580ee0d-00e1-4598-ab83-61ed02461879"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6164a673-5e12-4f31-867a-2f017886be2d",
"created": "2024-12-18T07:52:14.000Z",
"modified": "2024-12-18T07:52:14.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--eb55d33a-8b9e-47a5-9451-9f30f6275e51"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2fb7842b-6010-44a1-bbe4-0126511ab443",
"created": "2024-12-18T07:52:14.000Z",
"modified": "2024-12-18T07:52:14.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--78598451-70a5-4ba6-8274-222a53419c9f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9cd50a8a-faca-442c-a10f-bc1809e36320",
"created": "2024-12-18T07:52:14.000Z",
"modified": "2024-12-18T07:52:14.000Z",
"relationship_type": "indicated-by",
"source_ref": "x-misp-object--6a8d4531-d891-4f7d-928f-080c50a7c218",
"target_ref": "indicator--a5c95b54-eec2-401c-9aa3-b3bf982e452a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a9064ec0-2e6f-4037-959c-3de343ba4bb1",
"created": "2024-12-18T13:15:50.000Z",
"modified": "2024-12-18T13:15:50.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--3f3871c5-eca1-471b-bf55-3d2fa1f569be",
"target_ref": "vulnerability--f4eaf7c0-138d-4452-92f1-ec4aa19eb6cb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--63cf031e-851d-48bd-8971-d31f9c7fb5d4",
"created": "2024-12-18T13:16:06.000Z",
"modified": "2024-12-18T13:16:06.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--f65d3080-5ae0-43b8-9656-85be5c92d817",
"target_ref": "vulnerability--83d3a96c-ae50-41fa-be30-a08ff8d9d051"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3a919933-cff3-45f9-8648-8e0e24070121",
"created": "2024-12-18T13:16:22.000Z",
"modified": "2024-12-18T13:16:22.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--2a6da60c-9a70-40bc-b83c-8942608209e7",
"target_ref": "vulnerability--cadabb59-cee7-4a98-b702-6053da7b1466"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fb48ea5e-f550-4952-a074-11d9051354fc",
"created": "2024-12-18T13:17:12.000Z",
"modified": "2024-12-18T13:17:12.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--e1150640-0637-4929-af0c-0a797140ee63",
"target_ref": "vulnerability--cadabb59-cee7-4a98-b702-6053da7b1466"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--95c02cb8-08ae-4426-9372-4faf1d335292",
"created": "2024-12-18T13:18:10.000Z",
"modified": "2024-12-18T13:18:10.000Z",
"relationship_type": "related-to",
"source_ref": "vulnerability--a92ae7c7-279f-414a-96a4-f62f037bc31a",
"target_ref": "vulnerability--93523368-cdeb-4e40-93c7-95282f081050"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}