Skip to content
Threat Feed

Tag

Brute-Force

10 briefs RSS
high advisory

D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability

D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.

DWM-222W USB Wi-Fi Adapter brute-force credential-access network-device
2r 1c
high advisory

Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.

cve-2026-33710 chamilo api-key brute-force webserver
2r 1t 1c
low advisory

Spike in Successful Logon Events from a Source IP

A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.

credential-access defense-evasion brute-force password-spraying
2r 3t
critical advisory

OpenClaw Webhook Rate Limit Bypass Vulnerability (CVE-2026-34505)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets leading to forged webhook submission.

rate-limiting brute-force webhook cve-2026-34505
2r 1t 1c 1i
medium advisory

Bitbucket User Login Failure Detection

Detection of Bitbucket user login failures, potentially indicating credential access attempts, initial access attempts, or other malicious activity.

Bitbucket authentication brute-force credential-access initial-access
2r 3t
medium advisory

Multiple Logon Failure from the Same Source Address

Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.

Windows credential-access brute-force password-spraying
2r 2t
medium advisory

Multiple Logon Failure Followed by Logon Success

This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.

Windows Security Event Logs credential-access brute-force windows
2r 1t
high advisory

Signal K Server WebSocket Login Brute-Force Vulnerability

The Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.

signalk-server credential-access brute-force websocket
1r 1t
medium advisory

Azure AD Failed Authentication Increase

Detects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.

Azure Active Directory azuread brute-force credential-stuffing authentication
2r 1t
medium advisory

Windows Admin Account Brute Force Detection

This rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.

Windows Security Event Logs credential-access brute-force windows
2r 2t