416 lines
No EOL
48 KiB
JSON
416 lines
No EOL
48 KiB
JSON
{
|
|
"type": "bundle",
|
|
"id": "bundle--92214b3e-76c6-48b1-bf92-061c7f55e302",
|
|
"objects": [
|
|
{
|
|
"type": "identity",
|
|
"spec_version": "2.1",
|
|
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T12:01:50.000Z",
|
|
"modified": "2024-04-26T12:01:50.000Z",
|
|
"name": "CIRCL",
|
|
"identity_class": "organization"
|
|
},
|
|
{
|
|
"type": "report",
|
|
"spec_version": "2.1",
|
|
"id": "report--92214b3e-76c6-48b1-bf92-061c7f55e302",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T12:01:50.000Z",
|
|
"modified": "2024-04-26T12:01:50.000Z",
|
|
"name": "OSINT - ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices",
|
|
"published": "2024-04-26T12:02:28Z",
|
|
"object_refs": [
|
|
"vulnerability--d2308b7f-920b-45e4-b902-30855f64ec91",
|
|
"vulnerability--b5c337b6-ac51-4a95-b7d8-0663d6847978",
|
|
"vulnerability--30140c43-9b0e-4731-8254-283d98dd016f",
|
|
"x-misp-object--3e1516ac-fe11-478f-aac8-c0083c42e4c9",
|
|
"vulnerability--0d6f8c29-a5d7-4e0b-8d68-1c390e94134d",
|
|
"indicator--85e3eade-a4dc-4c19-b119-d4258bbfd957",
|
|
"indicator--7deae7be-9a3d-459b-915c-1294d1e1f6a2",
|
|
"x-misp-object--0208b8b4-acd8-4828-b6a2-8b7a5606ee93",
|
|
"x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"note--e03f267e-103c-4c40-a9b8-83a09502db13",
|
|
"relationship--d22cbb75-c345-41cd-8b30-678a244689a5",
|
|
"relationship--abac6509-634d-489e-9f20-6bc9b4d3a426",
|
|
"relationship--6e8d646f-330c-4f3e-b39f-ac9e672d01c5",
|
|
"relationship--9c9cc33c-050c-4891-9dc5-32cbe90c0e99",
|
|
"relationship--264f99f1-579e-4f0b-95f4-f1994025bc28",
|
|
"relationship--e732520b-fb19-4eb9-9408-6d5e195a6088",
|
|
"relationship--7d2d1bd4-570e-45d6-acd9-0c0f59ade867",
|
|
"relationship--9bfcc691-f8b6-423c-8c7e-3f8c16cb3a8c"
|
|
],
|
|
"labels": [
|
|
"Threat-Report",
|
|
"misp:tool=\"MISP-STIX-Converter\"",
|
|
"type:OSINT",
|
|
"osint:lifetime=\"perpetual\"",
|
|
"tlp:clear",
|
|
"misp-galaxy:mitre-attack-pattern=\"External Remote Services - T1133\"",
|
|
"misp-galaxy:threat-actor=\"ArcaneDoor\"",
|
|
"misp-galaxy:producer=\"Cisco Talos Intelligence Group\""
|
|
],
|
|
"object_marking_refs": [
|
|
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--d2308b7f-920b-45e4-b902-30855f64ec91",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:22:35.000Z",
|
|
"modified": "2024-04-25T11:22:35.000Z",
|
|
"name": "CVE-2024-20353",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"External analysis\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2024-20353"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--b5c337b6-ac51-4a95-b7d8-0663d6847978",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:25:45.000Z",
|
|
"modified": "2024-04-25T11:25:45.000Z",
|
|
"name": "CVE-2024-20359",
|
|
"labels": [
|
|
"misp:type=\"vulnerability\"",
|
|
"misp:category=\"External analysis\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2024-20359"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--30140c43-9b0e-4731-8254-283d98dd016f",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:22:45.000Z",
|
|
"modified": "2024-04-25T11:22:45.000Z",
|
|
"name": "CVE-2024-20353",
|
|
"description": "A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\n\n This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads.",
|
|
"labels": [
|
|
"misp:name=\"vulnerability\"",
|
|
"misp:meta-category=\"vulnerability\"",
|
|
"misp:to_ids=\"False\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2024-20353"
|
|
},
|
|
{
|
|
"source_name": "url",
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2"
|
|
}
|
|
],
|
|
"x_misp_modified": "2024-04-24T19:58:00+00:00",
|
|
"x_misp_published": "2024-04-24T19:15:00+00:00",
|
|
"x_misp_state": "Published"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--3e1516ac-fe11-478f-aac8-c0083c42e4c9",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:24:58.000Z",
|
|
"modified": "2024-04-25T11:24:58.000Z",
|
|
"labels": [
|
|
"misp:name=\"script\"",
|
|
"misp:meta-category=\"misc\"",
|
|
"cycat:scope=\"detection\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "text",
|
|
"object_relation": "script",
|
|
"value": "show memory region | include lina",
|
|
"category": "Other",
|
|
"uuid": "15323ff3-4308-4b2b-9023-d2577560415e"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "comment",
|
|
"value": "Additionally, organizations can issue the command show memory region | include lina to identify another indicator of compromise. If the output indicates more than one executable memory region (memory regions having r-xp permissions, see output examples), especially if one of these memory sections is exactly 0x1000 bytes, then this is a sign of potential tampering.",
|
|
"category": "Other",
|
|
"uuid": "cfcadedb-7c72-475e-adf0-4d2d1e99878e"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "state",
|
|
"value": "Trusted",
|
|
"category": "Other",
|
|
"uuid": "d36b5e3d-799b-468e-bd54-fc80c19ab3e8"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "script"
|
|
},
|
|
{
|
|
"type": "vulnerability",
|
|
"spec_version": "2.1",
|
|
"id": "vulnerability--0d6f8c29-a5d7-4e0b-8d68-1c390e94134d",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:25:55.000Z",
|
|
"modified": "2024-04-25T11:25:55.000Z",
|
|
"name": "CVE-2024-20359",
|
|
"description": "A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\n\n This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.",
|
|
"labels": [
|
|
"misp:name=\"vulnerability\"",
|
|
"misp:meta-category=\"vulnerability\"",
|
|
"misp:to_ids=\"False\""
|
|
],
|
|
"external_references": [
|
|
{
|
|
"source_name": "cve",
|
|
"external_id": "CVE-2024-20359"
|
|
},
|
|
{
|
|
"source_name": "url",
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h"
|
|
}
|
|
],
|
|
"x_misp_modified": "2024-04-24T19:58:00+00:00",
|
|
"x_misp_published": "2024-04-24T19:15:00+00:00",
|
|
"x_misp_state": "Published"
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--85e3eade-a4dc-4c19-b119-d4258bbfd957",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T09:53:19.000Z",
|
|
"modified": "2024-04-26T09:53:19.000Z",
|
|
"description": "Adversary controlled as mentioned in the blog post",
|
|
"pattern": "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '192.36.57.181') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.167.60.85') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.227.111.17') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.31.18.153') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '172.105.90.154') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.244.210.120') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.86.163.224') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '172.105.94.93') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.156.138.77') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.44.198.189') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.77.52.253') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.114.200.230') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.193.2.48') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '51.15.145.37') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.44.198.196') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '131.196.252.148') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.156.138.78') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '121.227.168.69') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.156.138.68') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.4.49.6') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.244.210.65') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.75.155')]",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2024-04-26T09:53:19Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "network"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:name=\"ip-port\"",
|
|
"misp:meta-category=\"network\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "indicator",
|
|
"spec_version": "2.1",
|
|
"id": "indicator--7deae7be-9a3d-459b-915c-1294d1e1f6a2",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T09:56:53.000Z",
|
|
"modified": "2024-04-26T09:56:53.000Z",
|
|
"description": "Multi-tenant infrastructure",
|
|
"pattern": "[(network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.183.95.95') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.63.119.131') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.76.118.87') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.77.54.14') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.86.163.244') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.128.134.189') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.44.198.16') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.44.159.46') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.20.222.218') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.27.132.69') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.51.140.101') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.119.3.230') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.125.218.198') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '104.156.232.22') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '107.148.19.88') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '107.172.16.208') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '107.173.140.111') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '121.37.174.139') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '139.162.135.12') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '149.28.166.244') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '152.70.83.47') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '154.22.235.13') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '154.22.235.17') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '154.39.142.47') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '172.233.245.241') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.123.101.250') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '192.210.137.35') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.32.78.183') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '205.234.232.196') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '207.148.74.250') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.155.157.136') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.66.251') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.71.49') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.72.201') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.74.95') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.81.149') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.85.220') AND (network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '216.238.86.24')]",
|
|
"pattern_type": "stix",
|
|
"pattern_version": "2.1",
|
|
"valid_from": "2024-04-26T09:56:53Z",
|
|
"kill_chain_phases": [
|
|
{
|
|
"kill_chain_name": "misp-category",
|
|
"phase_name": "network"
|
|
}
|
|
],
|
|
"labels": [
|
|
"misp:name=\"ip-port\"",
|
|
"misp:meta-category=\"network\"",
|
|
"misp:to_ids=\"True\""
|
|
]
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--0208b8b4-acd8-4828-b6a2-8b7a5606ee93",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T10:02:26.000Z",
|
|
"modified": "2024-04-26T10:02:26.000Z",
|
|
"labels": [
|
|
"misp:name=\"report\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "link",
|
|
"object_relation": "link",
|
|
"value": "https://www.circl.lu/pub/tr-85/",
|
|
"category": "External analysis",
|
|
"uuid": "4adedfd7-ebec-49d0-918d-3f6d72b0ad7f"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "title",
|
|
"value": "TR-85 - Three vulnerabilities in Cisco ASA software/applicance and FTD software being exploited",
|
|
"category": "Other",
|
|
"uuid": "876a0562-e07d-4941-b07c-59d6b7828d78"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "type",
|
|
"value": "Report",
|
|
"category": "Other",
|
|
"uuid": "59600f8c-3f2a-4170-a608-1bd6bc011f41"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "report"
|
|
},
|
|
{
|
|
"type": "x-misp-object",
|
|
"spec_version": "2.1",
|
|
"id": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-26T10:03:03.000Z",
|
|
"modified": "2024-04-26T10:03:03.000Z",
|
|
"labels": [
|
|
"misp:name=\"report\"",
|
|
"misp:meta-category=\"misc\""
|
|
],
|
|
"x_misp_attributes": [
|
|
{
|
|
"type": "link",
|
|
"object_relation": "link",
|
|
"value": "https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/",
|
|
"category": "External analysis",
|
|
"uuid": "89c350a4-bfa3-4bd7-bb55-7797fd8aec30"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "title",
|
|
"value": "ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices",
|
|
"category": "Other",
|
|
"uuid": "7b4c9d6b-d223-4233-a32b-fee0a6b28a1b"
|
|
},
|
|
{
|
|
"type": "text",
|
|
"object_relation": "type",
|
|
"value": "Blog",
|
|
"category": "Other",
|
|
"uuid": "84d26378-d46c-4687-9700-055579df03dc"
|
|
}
|
|
],
|
|
"x_misp_meta_category": "misc",
|
|
"x_misp_name": "report"
|
|
},
|
|
{
|
|
"type": "note",
|
|
"spec_version": "2.1",
|
|
"id": "note--e03f267e-103c-4c40-a9b8-83a09502db13",
|
|
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
|
|
"created": "2024-04-25T11:27:12.000Z",
|
|
"modified": "2024-04-25T11:27:12.000Z",
|
|
"abstract": "Report from - https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/ (1714044381)",
|
|
"content": "# ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices\r\n\r\nBy Cisco Talos \r\n\r\nWednesday, April 24, 2024 11:54 Threat Advisory Threats APT ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Coveted by these actors, perimeter network devices are the perfect intrusion point for espionage-focused campaigns. As a critical path for data into and out of the network, these devices need to be routinely and promptly patched; using up-to-date hardware and software versions and configurations; and be closely monitored from a security perspective. Gaining a foothold on these devices allows an actor to directly pivot into an organization, reroute or modify traffic and monitor network communications. In the past two years, we have seen a dramatic and sustained increase in the targeting of these devices in areas such as telecommunications providers and energy sector organizations \u2014 critical infrastructure entities that are likely strategic targets of interest for many foreign governments. \r\n\r\nCisco\u2019s position as a leading global network infrastructure vendor gives Talos\u2019 Intelligence and Interdiction team immense visibility into the general state of network hygiene. This also gives us uniquely positioned investigative capability into attacks of this nature. Early in 2024, a vigilant customer reached out to both Cisco\u2019s Product Security Incident Response Team (PSIRT) and Cisco Talos to discuss security concerns with their Cisco Adaptive Security Appliances (ASA). PSIRT and Talos came together to launch an investigation to assist the customer. During that investigation, which eventually included several external intelligence partners and spanned several months, we identified a previously unknown actor now tracked as UAT4356 by Talos and STORM-1849 by the Microsoft Threat Intelligence Center. This actor utilized bespoke tooling that demonstrated a clear focus on espionage and an in-depth knowledge of the devices that they targeted, hallmarks of a sophisticated state-sponsored actor. \r\n\r\nUAT4356 deployed two backdoors as components of this campaign, \u201cLine Runner\u201d and \u201cLine Dancer,\u201d which were used collectively to conduct malicious actions on-target, which included configuration modification, reconnaissance, network traffic capture/exfiltration and potentially lateral movement. \r\n\r\n## **Critical Fixes Available**\r\n\r\nWorking with victims and intelligence partners, Cisco uncovered a sophisticated attack chain that was used to implant custom malware and execute commands across a small set of customers. While we have been unable to identify the initial attack vector, we have identified two vulnerabilities (CVE-2024-20353 and CVE-2024-20359), which we detail below. Customers are strongly advised to follow the guidance published in the security advisories discussed below. \r\n\r\nFurther, network telemetry and information from intelligence partners indicate the actor is interested in \u2014 and potentially attacking \u2014 network devices from Microsoft and other vendors. Regardless of your network equipment provider, now is the time to ensure that the devices are properly patched, logging to a central, secure location, and configured to have strong, multi-factor authentication (MFA). Additional recommendations specific to Cisco are available here. \r\n\r\n## **Timeline**\r\n\r\nCisco was initially alerted to suspicious activity on an ASA device in early 2024. The investigation that followed identified additional victims, all of which involved government networks globally. During the investigation, we identified actor-controlled infrastructure dating back to early November 2023, with most activity taking place between December 2023 and early January 2024. Further, we have identified evidence that suggests this capability was being tested and developed as early as July 2023. \r\n\r\nCisco has identified two vulnerabilities that were abused in this campaign (CVE-2024-20353 and CVE-2024-20359). Patches for these vulnerabilities are detailed in the Cisco Security Advisories released today.\r\n\r\n### **Initial Access**\r\n\r\nWe have not determined the initial access vector used in this campaign. We have not identified evidence of pre-authentication exploitation to date. Our investigation is ongoing, and we will provide updates, if necessary, in the security advisories or on this blog.\r\n\r\n## **Line Dancer: In-Memory Implant Technical Details**\r\n\r\nThe malware implant has a couple of key components. The first is a memory-only implant, called \u201cLine Dancer.\u201d This implant is a memory-resident shellcode interpreter that enables adversaries to upload and execute arbitrary shellcode payloads. \r\n\r\nOn a compromised ASA, the attackers submit shellcode via the host-scan-reply field, which is then parsed by the Line Dancer implant. Note that the use of this field does not indicate the exploitation of CVE-2018-0101 which was NOT used as a component of this campaign. The host-scan-reply field, typically used in later parts of the SSL VPN session establishment process, is processed by ASA devices configured for SSL VPN, IPsec IKEv2 VPN with \u201cclient-services\" or HTTPS management access. The actor overrides the pointer to the default host-scan-reply code to instead point to the Line Dancer shellcode interpreter. This allows the actor to use POST requests to interact with the device without having to authenticate and interact directly through any traditional management interfaces. \r\n\r\nLine Dancer is used to execute commands on the compromised device. During our investigation, Talos was able to observe the threat actors using the Line Dancer malware implant to: \r\n\r\n\r\n* Disable syslog. \r\n* Run and exfiltrate the command show configuration. \r\n* Create and exfiltrate packet captures. \r\n* Execute CLI commands present in shellcode; this includes configuration mode commands and the ability to save them to memory (write mem). \r\n* Hook the crash dump process, which forces the device to skip the crash dump generation and jump directly to a device reboot. This is designed to evade forensic analysis, as the crash dump would contain evidence of compromise and provide additional forensic details to investigators. \r\n* Hook the AAA (Authentication, Authorization and Accounting) function to allow for a magic number authentication capability. When the attacker attempts to connect to the device using this magic number, they are able to establish a remote access VPN tunnel bypassing the configured AAA mechanisms. As an alternate form of access, a P12 blob is generated along with an associated certificate and exfiltrated to the actor along with a certificate-based tunnel configuration. \r\n\r\n## **Host-Scan-Reply hook overview**\r\n\r\nIn the Line Dancer implant\u2019s process memory, we found a function (detailed below) that checks if a 32-byte token matches a pattern. If so, it base64-decodes the payload, copies it into the attacker's writable and executable memory region, and then calls the newly decoded function. Either way, it ends by calling processHostScanReply(). \r\n \r\nThe function processHostScanReply() is normally accessed through a function pointer in the elementArray table, associated with the string host-scan-reply. In the captured memory, the entry that should point to processHostScanReply()now instead points to the attacker's function that decodes and runs its payload. Since this change is in the data section of memory, it doesn't show up in hashes/dumps of text. \r\n \r\nThe attacker function that decodes and runs its payload has the following decompilation: \r\n\r\n## **Line Runner: Persistence Mechanism**\r\n\r\nThe threat actor maintains persistence utilizing a second, but persistent, backdoor called \u201cLine Runner\u201d on the compromised ASA device using functionality related to a legacy capability that allowed for the pre-loading of VPN clients and plugins on the device. At boot, the ASA is designed to look for the presence of a file on disk0: matching the Lua regular expression:\r\n\r\n ^client\\_bundle[%w\\_-]*%.zip$ If the file exists, it will unzip it and execute the script csco\\_config.lua. Once processed, the ZIP file is deleted. This is assigned CVE-2024-20359 and more details are available in this Cisco Security Advisory. \r\n\r\nIn at least one case, there is another vulnerability, CVE-2024-20353, that was abused by the actor to facilitate this process. The attackers were able to leverage this vulnerability to cause the target ASA device to reboot, triggering the unzipping and installing the second component of the threat actor\u2019s malware implant, Line Runner. \r\n\r\nThe threat actor\u2019s ZIP file has the following files: \r\n\r\nThe scripts in the zip file allow the threat actor to maintain a persistent HTTP-based Lua backdoor to the ASA, which survives across reboots and upgrades. Line Runner was observed being used by UAT4356 to retrieve information that was staged through the use of Line Dancer. \r\n\r\n### csco\\_config.lua\r\n\r\nThe csco\\_config.lua file is run at boot and makes the following modifications to the system: \r\n \r\n\u2022 Create disk0:/csco\\_config/97/webcontent/ if it doesn't already exist \r\n\u2022 Create disk0:/csco\\_config/97/webcontent/1515480F4B538B669648B17C02337098 from hash.txt \r\n\u2022 Append index.txt to disk0:/csco\\_config/97/webcontent/index\\_bp.ini and put the result in disk0:/csco\\_config/97/webcontent/index.ini \r\n\u2022 Move the original client\\_bundle.zip file to /run/lock/subsys/krbkdc6 \r\n\u2022 Prepend umtfc.txt to /etc/init.d/umountfs \r\n\u2022 Copy stgvdr.txt to /asa/scripts/lina\\_cs \r\n\u2022 Backup /asa/scripts/lina\\_exe\\_cs.sh to /asa/scripts/lina\\_exe\\_cs\\_bp.sh \r\n\u2022 Replace /asa/scripts/lina\\_exe\\_cs.sh with laecsnw.txt \r\n\u2022 Copy csco\\_config2.lua over csco\\_config.lua \r\n\u2022 Disable the importPlugin function for the next call only \r\n\r\n### csco\\_config2.lua\r\n\r\nThe csco\\_config2.lua file cleans up the modifications made by csco\\_config.lua (above) and removes itself. \r\n\r\n### hash.txt\r\n\r\nUsed as content for disk0:/csco\\_config/97/webcontent/1515480F4B538B669648B17C02337098. \r\n\r\nIntercepts HTTP requests to the ASA. The threat actor\u2019s code looks for an HTTP request with a set of 32-character parameters that are victim-dependent. If they match, then the payload contained within one of these parameters is written to a Lua script and executed. This is the backdoor\u2019s command and control mechanism. \r\n\r\n### index.txt\r\n\r\nAdds webContent information so hash.txt is processed. \r\n\r\n### laecsnw.txt\r\n\r\nTemporarily replaces /asa/scripts/lina\\_exe\\_cs.sh. \r\n\r\nExecutes /asa/scripts/lina\\_cs as a background process (see below). Removes itself. Then restore the backup /asa/scripts/lina\\_exe\\_cs\\_bp.sh. \r\n\r\n### stgvdr.txt\r\n\r\nRuns as /asa/scripts/lina\\_cs. \r\n\r\nAfter sleeping for 30 seconds, sets expected owner and times on /etc/init.d/umountfs. Removes the hash API endpoint, the index.ini, and either restores the backup index.ini or removes the webcontent directory entirely. Finally, removes itself. \r\n\r\n### umtfc.txt\r\n\r\nPrepended to /etc/init.d/unmountfs. \r\n\r\nThe unmountfs script is called at shutdown to unmount the filesystems. The threat actor\u2019s modifications perform the following functionality: \r\n\r\n\u2022 If disk0:/csco\\_config/97/webcontent/1515480F4B538B669648B17C02337098 exists, it removes it and index.ini. \r\n\u2022 Copy /run/lock/subsys/krbkdc6 to disk0:client\\_bundle\\_install.zip\r\n\r\nThis sets up the zipfile to be executed at the next boot, maintaining persistence. \r\n\r\n## **Forensic Recovery and Identification of Line Runner**\r\n\r\nTo identify the presence of Line Runner on an ASA, the following methods can be used. Note also that the device should be upgraded to a fixed version as identified in the first method. \r\n\r\n### **Method 1:**\r\n\r\nAfter updating the device to a software release that contains the fix for CVE-2024-20359, a review of the contents of disk0: should be conducted. If a new file (e.g., \u201cclient\\_bundle\\_install.zip\u201d or any other unusual .zip file) appears on disk0: following the update, this suggests that Line Runner was present on the device in question. Note that because the updated software is not vulnerable to CVE-2024-20359, Line Runner will no longer be active on the device. \r\n\r\n### **Method 2:**\r\n\r\nTo detect (and remove) Line Runner, the following series of commands will create an innocuous file with a .zip extension. Note that it will not create a valid zip file, but the file will still be read by the ASA at reboot. Upon execution of the following commands, if a new .zip file appears on disk0: following the reload, this suggests that Line Runner was present on the device in question. Deletion of the \u201cclient\\_bundle\\_install.zip\u201d file will remove Line Runner. Note that the malicious ZIP containing the Line Runner functionality could have other names that fit the naming pattern outlined previously. \r\n\r\nIf you discover a newly created .zip file, copy that file off the device using the **copy** command and contact psirt@cisco.com referencing CVE-2024-20359. Include the outputs of the **dir disk0:** and **show version** commands from the device and the **.zip** file extracted from the device. \r\n\r\n## **Anti-Forensics/Anti-Analysis Capabilities**\r\n\r\nUAT4356 took clear and deliberate steps to attempt to prevent forensic capture of malicious artifacts. This tradecraft suggests a thorough understanding of the ASA itself and of the forensic actions commonly performed by Cisco for network device integrity validation. Additional steps were taken on a case-by-case basis to hide actions being taken on the device. These steps included hooking the AAA (Authentication, Authorization and Accounting) function of the device to allow the actor to bypass normal AAA operations. We also identified some instances where UAT4356 disabled logging to perform operations on or from the ASA and not have those operations or actions logged. \r\n\r\nLine Dancer appears to have been intentionally placed into a difficult-to-reach region of memory. In addition, it hooks into functions such as the core dump function, which is commonly used to collect information for debugging and forensic purposes, which were made in memory such that this function simply jumped to a reboot. This means that on reboot, Line Dancer itself would no longer be present and none of the collections present in the core dump function would have been executed, all resulting in a complete loss of debug information and memory-based forensic artifacts. \r\n\r\n## **Attribution**\r\n\r\nAs a part of our ongoing investigation, we have also conducted analysis on possible attribution of this activity. Our attribution assessment is based on the victimology, the significant level of tradecraft employed in terms of capability development and anti-forensic measures, and the identification and subsequent chaining together of 0-day vulnerabilities. For these reasons, we assess with high confidence that these actions were performed by a state-sponsored actor.\r\n\r\n## **Recommendations**\r\n\r\nThere are some known indicators of compromise that customers can look for if they suspect they may have been targeted in this campaign. First, organizations should look for any flows to/from ASA devices to any of the IP addresses present in the IOC list provided at the bottom of this blog. This is one indication that further investigation is necessary. \r\n\r\nAdditionally, organizations can issue the command show memory region | include lina to identify another indicator of compromise. If the output indicates more than one executable memory region (memory regions having r-xp permissions, see output examples), especially if one of these memory sections is exactly 0x1000 bytes, then this is a sign of potential tampering. \r\n\r\nOutput of the \u2018show memory region\u2019 command for a compromised device (top) vs. a clean device (bottom).Note that the earlier provided steps to identify the presence of Line Runner can still be followed even in the absence of more than one executable memory region as we have seen cases where Line Runner was present without Line Dancer being present. We still recommend following the steps to upgrade to a patched version even if customers believe that their device has not been compromised. \r\n\r\nNext, follow the steps detailed in the Cisco ASA Forensic Investigation Procedures for First Responders. **When following these procedures first responders should NOT attempt to collect a core dump (Step 5) or reboot the device if they believe that the device has been compromised, based on the lina memory region output.** The previous steps up to and including a collection of the memory text section should be followed. In addition, we have released some Snort signatures to detect the activity on the wire including access attempts. Signatures 63139, 62949, and 45575 have been released to detect the implants or associated behaviors. Please note that the device must be set up to decrypt TLS for these signatures to be effective. \r\n\r\n\r\n* CVE-2024-20353 (ASA DOS/Reboot) - 3:63139 \r\n* \u2018Line Runner\u2019 \u2013 Persistence Mechanism Interaction \u2013 3:62949 \r\n* \u2018Line Dancer\u2019 \u2013 In-Memory Only Shellcode Interpreter Interaction \u2013 3:45575 \r\n* Note that this signature was originally built to detect an unrelated CVE but it also detects Line Dancer interaction \r\n\r\nIf your organization does find connections to the provided actor IPs and the crash dump functionality has been altered, please open a case with Cisco TAC. \r\n\r\n## **UAT4356 Infrastructure**\r\n\r\nKey components of the actor-controlled infrastructure used for this operation had an interesting overlap of SSL certificates which match the below pattern while also appearing as an ASA, during the same period, to external scanning engines such as Shodan and Censys as reported by the CPE data on the same port as the noted SSL certificate. The SSL certificate information suggests that the infrastructure is making use of an OpenConnect VPN Server (https://ocserv.openconnect-vpn.net) through which the actor appeared to be conducting actions on target. \r\n\r\nCertificate Pattern: \r\n :issuer = O=ocserv,CN=ocserv VPN \r\n :selfsigned = true \r\n :serial = 0000000000000000000000000000000000000002 \r\n :subject = O=ocserv,CN=ocserv VPN \r\n :version = v3 \r\n\r\nCPE identifiers: \r\n cpe:2.3:a:cisco:http:*:*:*:*:*:*:*:* \r\n cpe:2.3:h:cisco:adaptive\\_security\\_appliance:*:*:*:*:*:*:*:* \r\n cpe:2.3:o:cisco:adaptive\\_security\\_appliance\\_software:*:*:*:*:*:*:*:* \r\n\r\n## **MITRE TTPs**\r\n\r\nThis threat demonstrates several techniques of the MITRE ATT&CK framework, most notably: \r\n\r\n\r\n* Line Runner persistence mechanism (T1037), \r\n* The reboot action via CVE-2024-20353 (T1653), \r\n* Base64 obfuscation (T1140), \r\n* Hooking of the processHostScanReply() function (T0874), \r\n* Disabling syslog and tampering with AAA (T1562-001), \r\n* Injection of code into AAA and Crash Dump processes (T1055) \r\n* Execution of CLI commands (T1059), \r\n* Bypassing of the AAA mechanism (T1556), \r\n* Removal of files after execution (T1070-004), \r\n* HTTP interception for C2 communications (T1557), \r\n* HTTP C2 (T1071-001), \r\n* HTTP C2 one-way backdoor (T1102-003), \r\n* Data exfiltration over C2 (T1041), \r\n* Network sniffing (T1040) \r\n\r\n## **Coverage**\r\n\r\nCisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat. \r\n\r\nUmbrella, Cisco's secure internet gateway (SIG) blocks devices from connecting to malicious IPs. Sign up for a free trial of Umbrella here. \r\n\r\nAdditional protections with context to your specific environment and threat data are available from the Firewall Management Center. \r\n\r\nOpen-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org. Snort SIDs for this threat are 45575, 62949 and 63139. \r\n\r\n## **Indicators of Compromise (****IOCs****)**\r\n\r\nThere are several known indicators of compromise that defenders can look for when assessing whether their ASA device has been compromised as a result of this attack, as outlined earlier in this post. For example, if any gaps in logging or any recent unexpected reboots are observed, this should be treated as suspicious activity that warrants further investigation. Also, below is a list of IP addresses we identified as having been used by UAT4356. Please note that some of these IPs are part of publicly known anonymization infrastructure and not directly controlled by the attackers themselves. If your organization does find connections to the provided actor IPs and the crash dump functionality has been altered, please open a case with Cisco TAC. \r\n\r\n### **Likely Actor-Controlled Infrastructure:**\r\n\r\n192.36.57[.]181 \r\n185.167.60[.]85 \r\n185.227.111[.]17 \r\n176.31.18[.]153 \r\n172.105.90[.]154 \r\n185.244.210[.]120 \r\n45.86.163[.]224 \r\n172.105.94[.]93 \r\n213.156.138[.]77 \r\n89.44.198[.]189 \r\n45.77.52[.]253 \r\n103.114.200[.]230 \r\n212.193.2[.]48 \r\n51.15.145[.]37 \r\n89.44.198[.]196 \r\n131.196.252[.]148 \r\n213.156.138[.]78 \r\n121.227.168[.]69 \r\n213.156.138[.]68 \r\n194.4.49[.]6 \r\n185.244.210[.]65 \r\n216.238.75[.]155 \r\n\r\n### **Multi-Tenant Infrastructure:**\r\n\r\n5.183.95[.]95 \r\n45.63.119[.]131 \r\n45.76.118[.]87 \r\n45.77.54[.]14 \r\n45.86.163[.]244 \r\n45.128.134[.]189 \r\n89.44.198[.]16 \r\n96.44.159[.]46 \r\n103.20.222[.]218 \r\n103.27.132[.]69 \r\n103.51.140[.]101 \r\n103.119.3[.]230 \r\n103.125.218[.]198 \r\n104.156.232[.]22 \r\n107.148.19[.]88 \r\n107.172.16[.]208 \r\n107.173.140[.]111 \r\n121.37.174[.]139 \r\n139.162.135[.]12 \r\n149.28.166[.]244 \r\n152.70.83[.]47 \r\n154.22.235[.]13 \r\n154.22.235[.]17 \r\n154.39.142[.]47 \r\n172.233.245[.]241 \r\n185.123.101[.]250 \r\n192.210.137[.]35 \r\n194.32.78[.]183 \r\n205.234.232[.]196 \r\n207.148.74[.]250 \r\n216.155.157[.]136 \r\n216.238.66[.]251 \r\n216.238.71[.]49 \r\n216.238.72[.]201 \r\n216.238.74[.]95 \r\n216.238.81[.]149 \r\n216.238.85[.]220 \r\n216.238.86[.]24 \r\n\r\n## **Acknowledgments**\r\n\r\nCisco would like to thank the following organizations for supporting this investigation: \r\n\r\n\r\n* Australian Signals Directorate\u2019s Australian Cyber Security Centre \r\n* Black Lotus Labs at Lumen Technologies \r\n* Canadian Centre for Cyber Security, a part of the Communications Security Establishment \r\n* Microsoft Threat Intelligence Center \r\n* The UK's National Cyber Security Centre (NCSC) \r\n* U.S. Cybersecurity & Infrastructure Security Agency (CISA)",
|
|
"object_refs": [
|
|
"report--92214b3e-76c6-48b1-bf92-061c7f55e302"
|
|
]
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--d22cbb75-c345-41cd-8b30-678a244689a5",
|
|
"created": "2024-04-25T11:22:45.000Z",
|
|
"modified": "2024-04-25T11:22:45.000Z",
|
|
"relationship_type": "related-to",
|
|
"source_ref": "vulnerability--30140c43-9b0e-4731-8254-283d98dd016f",
|
|
"target_ref": "vulnerability--d2308b7f-920b-45e4-b902-30855f64ec91"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--abac6509-634d-489e-9f20-6bc9b4d3a426",
|
|
"created": "2024-04-25T11:25:55.000Z",
|
|
"modified": "2024-04-25T11:25:55.000Z",
|
|
"relationship_type": "related-to",
|
|
"source_ref": "vulnerability--0d6f8c29-a5d7-4e0b-8d68-1c390e94134d",
|
|
"target_ref": "vulnerability--b5c337b6-ac51-4a95-b7d8-0663d6847978"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--6e8d646f-330c-4f3e-b39f-ac9e672d01c5",
|
|
"created": "2024-04-26T10:01:21.000Z",
|
|
"modified": "2024-04-26T10:01:21.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--0208b8b4-acd8-4828-b6a2-8b7a5606ee93",
|
|
"target_ref": "x-misp-object--3e1516ac-fe11-478f-aac8-c0083c42e4c9"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--9c9cc33c-050c-4891-9dc5-32cbe90c0e99",
|
|
"created": "2024-04-26T10:02:26.000Z",
|
|
"modified": "2024-04-26T10:02:26.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--0208b8b4-acd8-4828-b6a2-8b7a5606ee93",
|
|
"target_ref": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--264f99f1-579e-4f0b-95f4-f1994025bc28",
|
|
"created": "2024-04-26T10:01:46.000Z",
|
|
"modified": "2024-04-26T10:01:46.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"target_ref": "indicator--7deae7be-9a3d-459b-915c-1294d1e1f6a2"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--e732520b-fb19-4eb9-9408-6d5e195a6088",
|
|
"created": "2024-04-26T10:02:08.000Z",
|
|
"modified": "2024-04-26T10:02:08.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"target_ref": "indicator--85e3eade-a4dc-4c19-b119-d4258bbfd957"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--7d2d1bd4-570e-45d6-acd9-0c0f59ade867",
|
|
"created": "2024-04-26T10:02:41.000Z",
|
|
"modified": "2024-04-26T10:02:41.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"target_ref": "vulnerability--30140c43-9b0e-4731-8254-283d98dd016f"
|
|
},
|
|
{
|
|
"type": "relationship",
|
|
"spec_version": "2.1",
|
|
"id": "relationship--9bfcc691-f8b6-423c-8c7e-3f8c16cb3a8c",
|
|
"created": "2024-04-26T10:03:03.000Z",
|
|
"modified": "2024-04-26T10:03:03.000Z",
|
|
"relationship_type": "references",
|
|
"source_ref": "x-misp-object--edce3b9b-3cc1-4621-a0e6-8bcda0de4318",
|
|
"target_ref": "vulnerability--0d6f8c29-a5d7-4e0b-8d68-1c390e94134d"
|
|
},
|
|
{
|
|
"type": "marking-definition",
|
|
"spec_version": "2.1",
|
|
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
|
|
"created": "2017-01-20T00:00:00.000Z",
|
|
"definition_type": "tlp",
|
|
"name": "TLP:WHITE",
|
|
"definition": {
|
|
"tlp": "white"
|
|
}
|
|
}
|
|
]
|
|
} |