Tag
critical
advisory
Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)
2 rules 2 TTPs 1 IOCAn unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.
cve
cli
privilege_escalation
linux
2r
2t
1i
high
advisory
Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting
3 rules 2 TTPsThis rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.
gcloud +6
credential-access
cloud
cli
token-harvesting
3r
2t