<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Firewall — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/firewall/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 11:09:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/firewall/feed.xml" rel="self" type="application/rss+xml"/><item><title>OPNsense Multiple Vulnerabilities Leading to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</link><pubDate>Mon, 04 May 2026 11:09:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-opnsense-rce/</guid><description>A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities in OPNsense allow a remote, anonymous attacker to bypass security restrictions and achieve arbitrary code execution. The vulnerabilities stem from inadequate input validation and insufficient privilege checks within the OPNsense firewall software. While the specific vulnerable components are not detailed in the advisory, successful exploitation would grant an attacker complete control over the affected OPNsense instance. This can lead to a complete breach of the network perimeter, allowing the attacker to pivot to internal systems, intercept network traffic, or disrupt network services. Given the critical role of OPNsense as a network gateway, organizations using this software should prioritize detection and mitigation efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OPNsense instance accessible over the network.</li>
<li>The attacker crafts a malicious request targeting a specific, undisclosed vulnerable endpoint. This request exploits a flaw in input validation or authentication.</li>
<li>The vulnerable OPNsense component processes the malicious request without proper sanitization or authorization checks.</li>
<li>The injected payload bypasses security restrictions, potentially exploiting a command injection or similar vulnerability.</li>
<li>The injected payload executes arbitrary code on the OPNsense system, gaining initial access.</li>
<li>The attacker leverages the initial foothold to escalate privileges within the OPNsense system.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots or security updates.</li>
<li>The attacker pivots to other systems within the network, using the compromised OPNsense instance as a launchpad for further attacks, or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows a remote attacker to execute arbitrary code on the OPNsense firewall. This gives the attacker full control of the firewall, allowing them to intercept network traffic, modify firewall rules, and potentially pivot to internal networks. The impact is a complete compromise of the network perimeter, potentially affecting all systems and data behind the firewall. The number of affected organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor OPNsense webserver logs for suspicious POST requests to unusual or sensitive endpoints, using a webserver category Sigma rule (see example below).</li>
<li>Implement network intrusion detection systems (NIDS) rules to detect exploitation attempts against OPNsense services.</li>
<li>While specific CVEs are unavailable, stay informed about OPNsense security updates and apply them immediately upon release.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>firewall</category></item><item><title>Multiple Vulnerabilities in SonicWall Products Allow for DoS and Security Policy Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-sonicwall-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sonicwall-vulns/</guid><description>Multiple vulnerabilities in SonicWall firewalls could allow an attacker to cause a remote denial of service and security policy bypass, potentially disrupting network services and compromising security controls.</description><content:encoded><![CDATA[<p>On April 30, 2026, CERT-FR published an advisory regarding multiple vulnerabilities affecting various SonicWall firewall products. These vulnerabilities, detailed in SonicWall security bulletin SNWLID-2026-0004, could allow an unauthenticated remote attacker to trigger a denial-of-service condition or bypass security policies. The affected products include a wide range of SonicWall firewalls across multiple generations (Gen 6, Gen 7, and Gen 8), as well as NSv virtual firewalls deployed in ESX, KVM, Hyper-V, AWS, and Azure environments. Successful exploitation of these vulnerabilities could lead to significant disruption of network services and a compromise of security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable SonicWall firewall exposed to the internet.</li>
<li>The attacker sends a specially crafted network packet to the firewall. This packet exploits one of the vulnerabilities (CVE-2026-0204, CVE-2026-0205, or CVE-2026-0206).</li>
<li>If the attacker exploits a DoS vulnerability, the firewall&rsquo;s CPU and memory resources are consumed, leading to a denial-of-service condition.</li>
<li>Legitimate network traffic is disrupted due to the firewall&rsquo;s degraded performance or complete failure.</li>
<li>If the attacker exploits a security policy bypass vulnerability, they can potentially gain unauthorized access to internal network resources.</li>
<li>The attacker may then attempt to move laterally within the network, exploiting additional vulnerabilities in other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to a complete denial of service, disrupting network connectivity for affected organizations. A security policy bypass could also allow unauthorized access to sensitive internal resources. The number of potential victims is significant, given the widespread use of SonicWall firewalls across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches outlined in SonicWall security bulletin SNWLID-2026-0004 to all affected SonicWall firewalls immediately.</li>
<li>Monitor network traffic for suspicious activity targeting SonicWall firewalls.</li>
<li>Deploy the Sigma rules below to your SIEM to detect potential exploitation attempts in your environment.</li>
<li>Review and enforce strict network segmentation policies to limit the impact of a potential security policy bypass.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>sonicwall</category><category>firewall</category><category>dos</category><category>security_bypass</category></item><item><title>Interlock Ransomware Campaign Targeting Enterprise Firewalls</title><link>https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</link><pubDate>Thu, 19 Mar 2026 05:33:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</guid><description>The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.</description><content:encoded><![CDATA[<p>The Interlock ransomware campaign specifically targets enterprise firewalls. The campaign&rsquo;s objective is to encrypt sensitive data residing on or accessible through these firewalls, rendering systems inoperable and creating significant business disruption. While specific details about the initial discovery and scope of the campaign remain limited, its focus on firewalls suggests a targeted approach aimed at organizations heavily reliant on these devices for network security and perimeter defense. The lack of specific details about delivery mechanisms and exploited vulnerabilities underscores the need for proactive threat hunting and vulnerability management to detect and mitigate potential Interlock ransomware infections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the targeted network, potentially through exploiting vulnerabilities in the firewall&rsquo;s management interface or VPN services.</li>
<li><strong>Firewall Compromise:</strong> The attacker exploits the initial access to compromise the firewall device. This may involve exploiting known vulnerabilities or using stolen credentials.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised firewall as a pivot point to move laterally within the internal network. Tools like <code>ssh</code> or <code>PsExec</code> may be used.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify valuable data stores accessible through the firewall. This may involve scanning network shares or querying databases.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges to gain administrative access to critical systems. This could involve exploiting vulnerabilities or using credential harvesting techniques.</li>
<li><strong>Data Encryption:</strong> The attacker deploys the Interlock ransomware payload to encrypt sensitive data on systems accessible via the firewall.</li>
<li><strong>Ransom Demand:</strong> After encryption, the attacker delivers a ransom note demanding payment for decryption keys.</li>
<li><strong>Exfiltration (Possible):</strong> Depending on the attacker&rsquo;s goals, data exfiltration may occur prior to encryption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Interlock ransomware attack can lead to significant data loss, business disruption, and financial damage. Organizations can suffer reputational damage and legal repercussions due to data breaches. The targeted nature of the attack suggests a focus on organizations where firewall compromise would have a widespread impact, potentially affecting hundreds or thousands of users or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable enhanced logging on all enterprise firewalls to capture detailed activity, including login attempts, configuration changes, and network traffic. This enhances the effectiveness of the detection rules below.</li>
<li>Implement multi-factor authentication (MFA) for all firewall administrative access to mitigate the risk of credential theft.</li>
<li>Regularly patch and update firewall firmware to address known vulnerabilities.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>firewall</category><category>network</category></item><item><title>Azure Firewall Rule Collection Modification or Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-rule-collection-modification/</guid><description>An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.</description><content:encoded><![CDATA[<p>The modification or deletion of Azure Firewall rule collections (Application, NAT, and Network) can indicate malicious activity within an Azure environment. Threat actors may target these rules to bypass security controls, allowing unauthorized network traffic, enabling data exfiltration, or facilitating lateral movement. Monitoring these changes is crucial for maintaining the integrity of network security policies and detecting potential breaches. This activity directly impacts an organization&rsquo;s ability to enforce its security posture, potentially exposing sensitive resources to unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, potentially through compromised credentials or a vulnerability in an application.</li>
<li>The attacker enumerates existing Azure Firewall resources to identify rule collections (Application, NAT, and Network) that can be modified or deleted.</li>
<li>The attacker uses valid Azure credentials or exploits a misconfiguration to authenticate to the Azure Resource Manager API.</li>
<li>The attacker crafts a malicious request to modify the target rule collection, potentially altering allowed ports, IP addresses, or protocols.</li>
<li>Alternatively, the attacker crafts a request to delete an entire rule collection, effectively disabling its associated security controls.</li>
<li>The attacker sends the request to the Azure Resource Manager API, executing the change to the firewall configuration.</li>
<li>The modified or deleted rule collection now allows unauthorized traffic to bypass the firewall, potentially enabling lateral movement or data exfiltration.</li>
<li>The attacker exploits the newly opened network paths to achieve their final objective, such as deploying ransomware or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure Firewall rule collections can have significant consequences. Unauthorized traffic could bypass security controls, enabling data exfiltration, lateral movement, or the deployment of malware. This could lead to data breaches, service disruptions, and financial losses. The impact depends on the scope of the modified or deleted rule collection and the resources it protects.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Azure Firewall Rule Collection Modified or Deleted&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to firewall configurations.</li>
<li>Review Azure Activity Logs for any events matching the <code>operationName</code> values specified in the Sigma rule to identify suspicious activity.</li>
<li>Implement multi-factor authentication (MFA) for all Azure accounts, especially those with permissions to manage firewall resources, to reduce the risk of credential compromise.</li>
<li>Regularly audit Azure role-based access control (RBAC) assignments to ensure the principle of least privilege is followed and that only authorized users have permissions to modify firewall configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-impairment</category></item><item><title>Azure Firewall Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</guid><description>An Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.</description><content:encoded><![CDATA[<p>This alert identifies potentially malicious modifications or deletions of Azure firewalls. Azure firewalls are critical components for network security, controlling inbound and outbound traffic based on defined rules. An attacker who gains sufficient privileges within an Azure environment may attempt to disable or modify these firewalls to facilitate lateral movement, data exfiltration, or other malicious activities. This activity is particularly concerning as it represents a direct attempt to weaken the victim&rsquo;s security posture. The activity is detected via Azure Activity Logs. While legitimate administrative actions can trigger this alert, any unexpected or unauthorized changes to firewall configurations should be investigated promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to an Azure environment, possibly through compromised credentials or exploiting a vulnerability in an application.</li>
<li>Attacker escalates privileges within the Azure subscription to gain permissions to manage network resources, including firewalls.</li>
<li>Attacker identifies the Azure firewalls in the target environment using Azure Resource Manager APIs or the Azure portal.</li>
<li>Attacker modifies firewall rules to allow unauthorized traffic, such as opening ports for command and control communication or disabling security rules. This is achieved via the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/WRITE</code> operation.</li>
<li>Alternatively, the attacker deletes the Azure firewall using the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/DELETE</code> operation, effectively removing network protections.</li>
<li>Attacker validates that their changes have been successfully applied by testing network connectivity or by reviewing the firewall configuration.</li>
<li>Attacker performs malicious activities such as lateral movement, data exfiltration, or deploying additional resources without firewall restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure firewalls can have severe consequences. An attacker can bypass network security controls, leading to data breaches, unauthorized access to sensitive resources, and the potential for widespread disruption. This can result in financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized firewall modifications or deletions in Azure Activity Logs.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on unfamiliar user identities and user agents.</li>
<li>Review Azure RBAC roles and permissions to ensure the principle of least privilege is enforced, limiting the ability of users and service principals to modify or delete firewalls.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource deployments or changes to security settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-evasion</category></item><item><title>Windows Firewall Disabled via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-windows-firewall-rules/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-windows-firewall-rules/</guid><description>Detection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.</description><content:encoded><![CDATA[<p>Attackers commonly use the <code>netsh.exe</code> utility, a command-line scripting tool, to manage network configurations. Abusers leverage <code>netsh.exe</code> to disable or modify Windows Firewall rules, a built-in host-based firewall. This manipulation weakens the system&rsquo;s defenses, allowing unauthorized network traffic and enabling lateral movement within the compromised environment. The activity allows for command and control communications and unhindered exploitation of internal resources. Defenders must monitor <code>netsh.exe</code> executions for unexpected firewall modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges to a level sufficient to modify firewall settings.</li>
<li>Discovery: The attacker uses reconnaissance techniques to identify existing firewall rules.</li>
<li>Defense Evasion: The attacker uses <code>netsh.exe</code> to disable specific firewall rules, using commands like <code>netsh advfirewall firewall set rule name=&quot;rule_name&quot; new enable=no</code>.</li>
<li>Defense Evasion: Alternatively, the attacker disables the entire firewall using <code>netsh advfirewall set allprofiles state off</code>.</li>
<li>Lateral Movement: With the firewall weakened, the attacker moves laterally to other systems on the network.</li>
<li>Command and Control: The attacker establishes command and control channels, which may now be unimpeded by firewall rules.</li>
<li>Impact: The attacker achieves their objectives, such as data exfiltration, ransomware deployment, or further compromise of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Firewall rules can lead to significant security breaches. Attackers can move laterally within the network, compromise additional systems, and exfiltrate sensitive data. The impact can range from data loss and financial damage to reputational harm and legal consequences. The defense evasion enables attackers to establish persistent command and control channels, maintain a long-term presence within the compromised environment and conduct further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to monitor <code>netsh.exe</code> executions and related command-line arguments to support detections.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect attempts to disable Windows Firewall rules via <code>netsh.exe</code>. Tune the rules for your specific environment.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the user account, process execution chain, and the specific firewall rules being modified.</li>
<li>Implement strict access controls to limit the number of users with the privileges necessary to modify firewall settings.</li>
<li>Regularly review and audit firewall configurations to ensure they are properly configured and have not been tampered with.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>firewall</category></item><item><title>Windows Netsh Tool Used for Firewall Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</guid><description>The analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where the <code>netsh.exe</code> utility is used to query firewall configurations on a Windows system. While <code>netsh.exe</code> is a legitimate tool for network configuration, adversaries can leverage it to gather information about firewall rules and settings. This information can then be used to plan further attacks, such as bypassing firewall restrictions or identifying vulnerable network services. This activity is typically seen during the reconnaissance phase of an attack. The scope of this detection covers any Windows environment where Endpoint Detection and Response (EDR) logs are available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>netsh.exe</code> with specific commands to enumerate firewall rules and configurations (e.g., <code>netsh firewall show state</code>, <code>netsh firewall show config</code>).</li>
<li>The <code>netsh.exe</code> process retrieves the requested firewall information from the Windows operating system.</li>
<li>The collected firewall information is parsed to identify potential weaknesses or misconfigurations.</li>
<li>The attacker uses the gathered information to modify existing firewall rules or create new rules to allow unauthorized access.</li>
<li>The attacker leverages the modified firewall configuration to establish a covert communication channel or to move laterally within the network.</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized network access, data exfiltration, or the deployment of ransomware. The enumeration of firewall configurations can provide attackers with valuable insights into the network&rsquo;s security posture, enabling them to bypass security controls and compromise critical assets. This can result in significant financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Netsh Firewall Discovery</code> to your SIEM and tune for your environment to detect netsh.exe executions with firewall discovery commands.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to capture the necessary command-line details.</li>
<li>Investigate any identified instances of <code>netsh.exe</code> being used to query firewall settings, especially when initiated from unusual processes or user accounts.</li>
<li>Monitor parent-child process relationships to identify suspicious process spawning, as highlighted by the <code>Processes.parent_process_name</code> field.</li>
<li>Review firewall configurations regularly to identify and remediate any misconfigurations or overly permissive rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>netsh</category><category>firewall</category></item><item><title>Windows Host Network Discovery Enabled via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</guid><description>Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.</description><content:encoded><![CDATA[<p>Attackers can leverage the <code>netsh.exe</code> utility to modify Windows Firewall settings, specifically enabling Network Discovery. This setting allows a host to broadcast its presence and services, making it easier for attackers to identify potential targets within the network for lateral movement. The behavior is often a post-exploitation technique to weaken host-based defenses after gaining initial access. The modification uses netsh.exe, a command-line scripting utility for managing network configurations. This activity can be easily scripted and automated, making it a common step in reconnaissance and lateral movement playbooks. Defenders should monitor for unauthorized use of <code>netsh.exe</code> to modify firewall settings.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Windows host.</li>
<li>Attacker executes <code>netsh.exe</code> with elevated privileges.</li>
<li><code>netsh.exe</code> is used to modify the Windows Firewall configuration.</li>
<li>The specific command executed enables Network Discovery using the <code>netsh advfirewall firewall set rule group=&quot;Network Discovery&quot; new enable=Yes</code> syntax.</li>
<li>The firewall rule group &ldquo;Network Discovery&rdquo; is modified to allow inbound and outbound traffic.</li>
<li>The compromised host begins sending out broadcast messages, advertising its presence and services on the network.</li>
<li>The attacker uses the information gathered to identify other vulnerable systems on the network.</li>
<li>The attacker moves laterally to other systems based on the discovery information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to easily enumerate and identify other vulnerable systems within the network. This can lead to rapid lateral movement, further compromising the environment. The risk is heightened when the compromised host has access to sensitive data or critical systems. There is no specific victim count or sector targeted mentioned in the provided source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Enable Host Network Discovery via Netsh&rdquo; to your SIEM to detect the use of <code>netsh.exe</code> to enable network discovery (see rule below).</li>
<li>Enable Windows Firewall logging and monitor for changes to firewall rules, specifically those related to Network Discovery.</li>
<li>Review and restrict the use of <code>netsh.exe</code> to authorized personnel and systems only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>firewall</category></item><item><title>Windows Firewall Disabled via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</guid><description>Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.</description><content:encoded><![CDATA[<p>Attackers often attempt to disable or modify system firewalls to evade network restrictions and facilitate lateral movement within a compromised environment. The Windows Firewall, a built-in component, provides host-based traffic filtering. Disabling it allows unrestricted communication, aiding command and control activities and hindering detection efforts. This activity is commonly achieved through PowerShell, leveraging cmdlets like <code>Set-NetFirewallProfile</code>. The rule focuses on detecting the use of this specific cmdlet to disable the Windows Firewall, alerting defenders to potential defense evasion attempts. This technique is valuable to attackers across various attack vectors, especially after initial access has been established.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access through methods such as phishing or exploiting a vulnerability in a network-facing application.</li>
<li>Privilege Escalation (if necessary): The attacker escalates privileges to gain the necessary permissions to modify firewall settings.</li>
<li>PowerShell Execution: The attacker executes PowerShell, either through an interactive session or a script.</li>
<li>Disable Firewall Profile: The attacker uses the <code>Set-NetFirewallProfile</code> cmdlet with parameters such as <code>-Enabled False</code> to disable the firewall for all, public, domain, or private profiles.</li>
<li>Network Reconnaissance: With the firewall disabled, the attacker performs network reconnaissance to identify valuable assets and potential lateral movement paths.</li>
<li>Lateral Movement: The attacker moves laterally to other systems on the network, exploiting trust relationships or vulnerabilities.</li>
<li>Command and Control: The attacker establishes command and control channels to communicate with compromised systems and exfiltrate sensitive data.</li>
<li>Data Exfiltration or Further Exploitation: The attacker exfiltrates sensitive data or continues to exploit the environment based on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of the Windows Firewall can lead to unrestricted lateral movement within a network, allowing attackers to compromise additional systems and exfiltrate sensitive data. This can result in data breaches, financial losses, and reputational damage. While the source does not specify the number of affected organizations, any environment relying on Windows Firewall for network segmentation is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the use of <code>Set-NetFirewallProfile</code> with the <code>-Enabled False</code> parameter (see Sigma rule below).</li>
<li>Enable process creation logging on Windows endpoints to capture PowerShell executions (reference the logsource in the Sigma rule).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the firewall modification activity.</li>
<li>Review and enforce the principle of least privilege to limit the number of users with permissions to modify firewall settings.</li>
<li>Consider implementing additional network segmentation and monitoring controls to detect and prevent lateral movement even if the Windows Firewall is disabled.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>firewall</category><category>windows</category></item></channel></rss>