<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 03:16:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network/feed.xml" rel="self" type="application/rss+xml"/><item><title>Totolink NR1800X Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</link><pubDate>Fri, 01 May 2026 03:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-totolink-command-injection/</guid><description>A command injection vulnerability exists in Totolink NR1800X version 9.1.0u.6279_B20210910, affecting the function sub_41A68C of the file /cgi-bin/cstecgi.cgi; by manipulating the argument setUssd, a remote attacker can inject commands, and an exploit is publicly available.</description><content:encoded><![CDATA[<p>A command injection vulnerability, identified as CVE-2026-7548, affects Totolink NR1800X router version 9.1.0u.6279_B20210910. The vulnerability resides within the <code>sub_41A68C</code> function of the <code>/cgi-bin/cstecgi.cgi</code> file. By manipulating the <code>setUssd</code> argument, a remote attacker can inject arbitrary commands into the system. Publicly available exploit code makes exploitation easier. This vulnerability poses a significant risk as it allows unauthenticated remote attackers to execute arbitrary commands on the affected device, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Totolink NR1800X device running firmware version 9.1.0u.6279_B20210910.</li>
<li>The attacker sends a crafted HTTP request to the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The HTTP request includes the <code>setUssd</code> argument with a malicious payload designed to inject a command.</li>
<li>The <code>sub_41A68C</code> function processes the <code>setUssd</code> argument without proper sanitization.</li>
<li>The injected command is executed by the system with the privileges of the web server process.</li>
<li>The attacker gains initial access and can execute arbitrary commands on the device.</li>
<li>The attacker may then use the command execution to escalate privileges, install malware, or pivot to other devices on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected Totolink NR1800X router. This could lead to complete compromise of the device, allowing the attacker to control network traffic, modify router settings, or use the router as a pivot point to attack other devices on the network. Given the wide usage of Totolink routers, a large number of devices could be vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/cgi-bin/cstecgi.cgi</code> containing suspicious characters or command injection attempts in the <code>setUssd</code> parameter, using the Sigma rule provided below.</li>
<li>Implement rate limiting on the <code>/cgi-bin/cstecgi.cgi</code> endpoint to mitigate brute-force exploitation attempts.</li>
<li>Apply available patches provided by Totolink to address the CVE-2026-7548 vulnerability.</li>
<li>Deploy the Sigma rule to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>router</category><category>network</category></item><item><title>Synway SMG Gateway Management Software Unauthenticated OS Command Injection</title><link>https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</link><pubDate>Thu, 30 Apr 2026 17:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-synway-smg-rce/</guid><description>Synway SMG Gateway Management Management Software is vulnerable to unauthenticated OS command injection via crafted POST requests to the RADIUS configuration endpoint, leading to remote code execution.</description><content:encoded><![CDATA[<p>Synway SMG Gateway Management Software is susceptible to an OS command injection vulnerability (CVE-2025-71284) within the RADIUS configuration endpoint. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted POST request to <code>/en/9-2radius.php</code>. The vulnerability lies in the improper sanitization of the <code>radius_address</code> POST parameter, which is directly incorporated into a <code>sed</code> command. The Shadowserver Foundation observed the first exploitation evidence on 2025-07-11 (UTC). Successful exploitation allows the attacker to execute arbitrary shell commands on the affected system, potentially compromising the entire gateway. This vulnerability poses a significant risk to organizations using the Synway SMG Gateway, as it enables unauthenticated remote code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Synway SMG Gateway Management Software instance exposed to the network.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/en/9-2radius.php</code> endpoint.</li>
<li>The POST request includes parameters such as <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, or <code>retry</code> along with <code>save=1</code> and <code>enable_radius=1</code>.</li>
<li>The <code>radius_address</code> parameter contains an OS command injection payload.</li>
<li>The application improperly sanitizes the <code>radius_address</code> parameter and incorporates it into a <code>sed</code> command.</li>
<li>The injected command is executed by the operating system, granting the attacker arbitrary code execution privileges.</li>
<li>The attacker establishes a reverse shell to maintain persistence and expand their foothold.</li>
<li>The attacker pivots within the network, gaining access to sensitive data or systems, and potentially establishing a long-term presence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the Synway SMG Gateway. This could lead to complete system compromise, data theft, disruption of services, and further propagation of attacks within the network. Given the high CVSS score (9.8), this vulnerability represents a critical threat. The number of affected systems and organizations is currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; to your SIEM to detect exploitation attempts based on suspicious POST requests to the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>radius_address</code>, <code>radius_address2</code>, <code>shared_secret2</code>, <code>source_ip</code>, <code>timeout</code>, and <code>retry</code> parameters in the RADIUS configuration endpoint.</li>
<li>Monitor web server logs for POST requests to <code>/en/9-2radius.php</code> containing suspicious characters or command sequences indicative of command injection attacks to activate the &ldquo;Synway SMG Gateway Radius Command Injection Attempt&rdquo; rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>network</category></item><item><title>Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</link><pubDate>Sun, 26 Apr 2026 12:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-tenda-path-traversal/</guid><description>CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7036, exists in Tenda i9 version 1.0.0.5(2204). Specifically, the vulnerability resides in the R7WebsSecurityHandlerfunction of the HTTP Handler component. This flaw allows a remote, unauthenticated attacker to potentially access sensitive files and directories on the affected device. The vulnerability was reported on 2026-04-26, and a public exploit is reportedly available, increasing the risk of exploitation. This poses a significant threat to organizations using the affected Tenda i9 router, as it could lead to unauthorized access to sensitive information or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Tenda i9 router running firmware version 1.0.0.5(2204) accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the vulnerable R7WebsSecurityHandlerfunction.</li>
<li>The crafted request includes a path traversal sequence (e.g., &ldquo;../&rdquo;) within the URL or request parameters.</li>
<li>The Tenda i9 router processes the malicious request without proper sanitization of the path.</li>
<li>The R7WebsSecurityHandlerfunction incorrectly interprets the path traversal sequence, allowing access to files or directories outside the intended web root.</li>
<li>The attacker gains unauthorized access to sensitive files, such as configuration files or system logs.</li>
<li>The attacker may use the exposed information to further compromise the device or the network it is connected to.</li>
<li>The attacker could potentially modify system files or execute commands, leading to full device compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7036 can lead to unauthorized access to sensitive files on the Tenda i9 router. This includes configuration files containing credentials, system logs, or other confidential data. An attacker could leverage this access to gain further control of the device, potentially leading to a complete system compromise. While the number of affected devices is currently unknown, given the widespread use of Tenda routers, the potential impact could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect HTTP requests containing path traversal sequences targeting web servers to detect exploitation attempts (Sigma rule: &ldquo;Detect Tenda i9 Path Traversal Attempt&rdquo;).</li>
<li>Since the source mentions a public exploit exists, prioritize patching or replacing vulnerable Tenda i9 routers to remediate CVE-2026-7036 immediately, if a patch becomes available.</li>
<li>Monitor web server logs for unusual file access patterns or requests containing suspicious path traversal sequences.</li>
<li>Implement web application firewall (WAF) rules to block requests containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-7036</category><category>path-traversal</category><category>tenda</category><category>network</category></item><item><title>OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ovn-dhcpv6-oob-read/</link><pubDate>Fri, 24 Apr 2026 13:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ovn-dhcpv6-oob-read/</guid><description>A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-5367 describes a critical vulnerability affecting Open Virtual Network (OVN). A remote attacker can exploit this flaw by sending specially crafted DHCPv6 SOLICIT packets to the OVN controller. These packets contain an inflated Client ID length, which causes the <code>ovn-controller</code> process to read beyond the allocated memory buffer. This out-of-bounds read allows the attacker to potentially access sensitive information stored in the heap memory, which can then be disclosed back to the attacker&rsquo;s virtual machine port. Successful exploitation grants unauthorized access to potentially sensitive data within the OVN environment, impacting confidentiality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable OVN deployment.</li>
<li>Attacker crafts a malicious DHCPv6 SOLICIT packet. The packet includes an inflated Client ID length field.</li>
<li>The attacker sends the crafted DHCPv6 SOLICIT packet to the OVN controller.</li>
<li>The <code>ovn-controller</code> receives the packet and attempts to process the DHCPv6 Client ID option.</li>
<li>Due to the inflated Client ID length, the <code>ovn-controller</code> reads beyond the bounds of the allocated memory buffer.</li>
<li>This out-of-bounds read accesses sensitive information residing in the heap memory.</li>
<li>The compromised data is included in the DHCPv6 response sent back to the attacker&rsquo;s virtual machine port.</li>
<li>Attacker receives the DHCPv6 response containing the disclosed sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5367 leads to the disclosure of sensitive information stored in the heap memory of the <code>ovn-controller</code>. The attacker can potentially gain access to configuration data, cryptographic keys, or other sensitive data, allowing them to further compromise the OVN environment or gain unauthorized access to other resources within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious DHCPv6 SOLICIT packets with unusually long Client ID lengths targeting the OVN controller, utilizing the network_connection rule provided below.</li>
<li>Analyze DHCPv6 server logs for errors related to invalid Client ID lengths or out-of-bounds memory access, leveraging the linux process_creation rule provided below if auditd captures such events.</li>
<li>Apply any available patches or updates provided by the OVN project to address CVE-2026-5367.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>vulnerability</category><category>network</category></item><item><title>UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices</title><link>https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</link><pubDate>Thu, 23 Apr 2026 15:11:53 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-uat-4356-firestarter/</guid><description>UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.</description><content:encoded><![CDATA[<p>Cisco Talos reported that UAT-4356 continues to actively target Cisco Firepower devices running the Firepower eXtensible Operating System (FXOS). In early 2024, Cisco Talos attributed the ArcaneDoor campaign to UAT-4356, a state-sponsored actor focused on gaining access to network perimeter devices for espionage. The actor exploits n-day vulnerabilities CVE-2025-20333 and CVE-2025-20362 to gain unauthorized access to vulnerable devices. Upon successful exploitation, UAT-4356 deploys a custom-built backdoor called &ldquo;FIRESTARTER,&rdquo; which shares technical capabilities with RayInitiator&rsquo;s Stage 3 shellcode. FIRESTARTER enables remote access and the execution of arbitrary code within the LINA process, a core component of Cisco&rsquo;s ASA and FTD appliances. This allows the attackers to maintain persistent access to compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>UAT-4356 exploits CVE-2025-20333 and/or CVE-2025-20362 on Cisco Firepower devices running FXOS to gain initial access.</li>
<li>The attacker manipulates the CSP_MOUNT_LIST to establish persistence for the FIRESTARTER backdoor.</li>
<li>The FIRESTARTER backdoor is written to <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> and the CSP_MOUNT_LIST is updated to copy itself to <code>/usr/bin/lina_cs</code>.</li>
<li>After a graceful reboot, FIRESTARTER is executed from <code>/usr/bin/lina_cs</code>.</li>
<li>FIRESTARTER restores the original CSP_MOUNT_LIST from <code>/tmp/CSP_MOUNTLIST.tmp</code> and removes the temporary copy and the trojanized <code>/usr/bin/lina_cs</code> file from disk.</li>
<li>FIRESTARTER reads the LINA process’ memory, searching for specific byte sequences to verify memory layout.</li>
<li>FIRESTARTER copies the next stage shellcode to the last 0x200 bytes of the &ldquo;libstdc++.so&rdquo; memory region.</li>
<li>The attacker overwrites an internal data structure in the LINA process to replace a pointer to a legitimate WebVPN XML handler function with the address of the malicious shellcode. This allows execution of arbitrary shellcode received via WebVPN requests.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Cisco Firepower devices allow UAT-4356 to gain a foothold on network perimeters for espionage. Successful exploitation and deployment of the FIRESTARTER backdoor enable attackers to execute arbitrary shellcode, potentially leading to data exfiltration, further network compromise, or disruption of services. The number of victims is currently unknown, but this campaign targets network perimeter devices, which could impact organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the file integrity monitoring rule to detect the creation or modification of <code>/usr/bin/lina_cs</code> and <code>/opt/cisco/platform/logs/var/log/svc_samcore.log</code> (see &ldquo;File Creation in Suspicious Directory&rdquo;).</li>
<li>Apply software upgrade recommendations outlined in Cisco&rsquo;s Security Advisory to mitigate CVE-2025-20333 and CVE-2025-20362.</li>
<li>Monitor network traffic for WebVPN requests containing unexpected XML payloads that might be used to trigger the FIRESTARTER backdoor.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>uat-4356</category><category>firestarter</category><category>cisco</category><category>backdoor</category><category>network</category><category>espionage</category></item><item><title>Across DR-810 Unauthenticated File Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-across-dr810-file-disclosure/</guid><description>Across DR-810 routers are vulnerable to unauthenticated file disclosure, allowing remote attackers to download the rom-0 backup file containing sensitive information, such as router passwords and configuration data, via a simple GET request to the rom-0 endpoint.</description><content:encoded><![CDATA[<p>The Across DR-810 router contains an unauthenticated file disclosure vulnerability (CVE-2019-25706) that allows remote attackers to retrieve sensitive information. By sending a simple GET request to the <code>/rom-0</code> endpoint, an attacker can download a backup file containing router passwords, configuration details, and potentially other sensitive data. This vulnerability exists because the <code>/rom-0</code> endpoint does not require authentication, allowing anyone with network access to the router to retrieve the backup file. Successful exploitation leads to complete compromise of the device&rsquo;s configuration and potential lateral movement within the network if credentials are reused. This vulnerability was published on 2026-04-12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Across DR-810 router exposed on the network.</li>
<li>Attacker crafts an HTTP GET request targeting the <code>/rom-0</code> endpoint.</li>
<li>The router responds with the <code>rom-0</code> backup file without requiring authentication.</li>
<li>Attacker downloads the <code>rom-0</code> backup file.</li>
<li>Attacker decompresses the downloaded <code>rom-0</code> file, which is likely compressed to reduce size.</li>
<li>The attacker parses the decompressed file to extract sensitive information such as router passwords.</li>
<li>Attacker uses the extracted router passwords to gain administrative access to the router&rsquo;s web interface.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to retrieve sensitive information, including router passwords and configuration data. This can lead to complete compromise of the affected router. An attacker can then modify router settings, intercept network traffic, or potentially use the compromised router as a pivot point to access other systems on the network. If the router passwords are reused across multiple systems, the impact could extend beyond the compromised router, affecting other devices and services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to the <code>/rom-0</code> endpoint on Across DR-810 routers to detect potential exploitation attempts using the provided Sigma rule.</li>
<li>Inspect network traffic for unusual downloads from Across DR-810 routers, focusing on responses from the <code>/rom-0</code> endpoint.</li>
<li>Block access to the <code>/rom-0</code> endpoint on Across DR-810 routers via firewall rules to prevent unauthorized access.</li>
<li>Review the provided reference URLs for additional context and potential mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25706</category><category>file-disclosure</category><category>router</category><category>network</category></item><item><title>Juniper Junos OS and Junos OS Evolved BGP Session Reset Denial of Service (CVE-2026-33797)</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</link><pubDate>Thu, 09 Apr 2026 22:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-juniper-bgp-dos/</guid><description>CVE-2026-33797 is an improper input validation vulnerability in Juniper Networks Junos OS and Junos OS Evolved that allows an unauthenticated adjacent attacker to reset established BGP sessions via a specific BGP packet, leading to a denial of service condition.</description><content:encoded><![CDATA[<p>CVE-2026-33797 is a vulnerability affecting Juniper Networks Junos OS and Junos OS Evolved versions 25.2 before 25.2R2 and 25.2-EVO before 25.2R2-EVO, respectively. It stems from improper input validation within the Border Gateway Protocol (BGP) handling. An unauthenticated, adjacent attacker can exploit this flaw by sending a crafted BGP packet to an already established BGP session. This malicious packet causes the targeted BGP session to reset, leading to a Denial of Service (DoS). Repeated transmission of the crafted packet can sustain the DoS condition. Both external BGP (eBGP) and internal BGP (iBGP) sessions are susceptible, and the vulnerability impacts both IPv4 and IPv6 network configurations. This vulnerability poses a risk to network stability and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Juniper device running Junos OS or Junos OS Evolved versions 25.2 prior to 25.2R2 or 25.2-EVO prior to 25.2R2-EVO.</li>
<li>The attacker establishes network adjacency to the targeted device, allowing for direct BGP communication.</li>
<li>The attacker crafts a specific, but genuine, BGP packet designed to exploit the improper input validation vulnerability.</li>
<li>The attacker sends the crafted BGP packet to an already established BGP session on the target device.</li>
<li>Upon receiving the malicious packet, the vulnerable Junos OS or Junos OS Evolved instance improperly processes it.</li>
<li>Due to the input validation failure, the targeted BGP session is forcibly reset.</li>
<li>The attacker repeats the process of sending the crafted BGP packet to continuously reset the BGP session.</li>
<li>The repeated session resets cause a sustained Denial of Service (DoS), disrupting network routing and connectivity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33797 leads to a denial-of-service condition affecting BGP routing. By repeatedly sending crafted BGP packets, an attacker can disrupt network connectivity and stability. The impact is a loss of routing functionality for networks relying on the targeted BGP sessions. The number of potential victims is broad, including any organization using vulnerable versions of Junos OS or Junos OS Evolved. This can result in service outages, impaired communication, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Junos OS to version 25.2R2 or later to remediate CVE-2026-33797 (see references).</li>
<li>Upgrade Junos OS Evolved to version 25.2R2-EVO or later to remediate CVE-2026-33797 (see references).</li>
<li>Deploy the Sigma rule provided to detect unusual BGP reset activity in network traffic (see rules).</li>
<li>Monitor network traffic for unexpected BGP session resets originating from adjacent networks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-33797</category><category>denial-of-service</category><category>juniper</category><category>bgp</category><category>network</category></item><item><title>Juniper Junos OS MX Series Missing Authorization Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-junos-mx-privesc/</link><pubDate>Thu, 09 Apr 2026 22:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-junos-mx-privesc/</guid><description>CVE-2026-33785 allows a low-privileged, local, authenticated user to execute 'request csds' commands on Juniper Junos OS MX Series devices, leading to complete device compromise.</description><content:encoded><![CDATA[<p>Juniper Networks Junos OS on MX Series is vulnerable to a missing authorization issue (CVE-2026-33785). This vulnerability allows a local, authenticated user with low privileges to execute specific CLI operational commands, specifically &lsquo;request csds&rsquo;, that should only be available to high-privileged users or those designated for Juniper Device Manager (JDM) / Connected Security Distributed Services (CSDS) operations. Successful exploitation leads to a complete compromise of managed devices. This issue affects Junos OS on MX Series versions 24.4 prior to 24.4R2-S3 and 25.2 prior to 25.2R2. Releases prior to 24.4 are not affected. The vulnerability was published on 2026-04-09.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local, low-privilege access to a Junos OS MX Series device.</li>
<li>Attacker authenticates to the Junos OS CLI using their credentials.</li>
<li>Attacker executes the &lsquo;request csds&rsquo; operational command.</li>
<li>The system fails to perform adequate authorization checks before executing the command.</li>
<li>The &lsquo;request csds&rsquo; command executes with elevated privileges due to the missing authorization.</li>
<li>Attacker leverages the elevated privileges to modify system configurations.</li>
<li>Attacker installs malicious software or backdoors.</li>
<li>Attacker achieves complete compromise of the Junos OS MX Series device, potentially impacting all devices managed by it.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33785 allows an attacker to completely compromise a Juniper Junos OS MX Series device. This can lead to unauthorized access to sensitive data, disruption of network services, and the potential compromise of other devices managed by the affected MX Series device. The vulnerability affects Junos OS on MX Series versions 24.4 before 24.4R2-S3 and 25.2 before 25.2R2. While the exact number of vulnerable devices is unknown, the impact is critical due to the potential for widespread network compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Junos OS on MX Series devices to versions 24.4R2-S3 or later, or 25.2R2 or later, to patch CVE-2026-33785.</li>
<li>Implement the provided Sigma rule to detect unauthorized execution of the <code>request csds</code> command.</li>
<li>Monitor Junos OS CLI command logs for suspicious activity, specifically focusing on the <code>request csds</code> command and user privilege levels.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>network</category><category>juniper</category></item><item><title>Hirschmann HiLCOS OpenBAT/BAT450 IPv6 IPsec Firewall Bypass (CVE-2021-4477)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hirschmann-firewall-bypass/</link><pubDate>Fri, 03 Apr 2026 23:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hirschmann-firewall-bypass/</guid><description>CVE-2021-4477 describes a firewall bypass vulnerability in Hirschmann HiLCOS OpenBAT and BAT450 products that can be exploited by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while using an IPv6 Internet connection, allowing attackers to bypass configured firewall rules.</description><content:encoded><![CDATA[<p>Hirschmann HiLCOS OpenBAT and BAT450 products are vulnerable to a firewall bypass (CVE-2021-4477) in IPv6 IPsec deployments. The vulnerability allows attackers to circumvent configured firewall rules by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while simultaneously maintaining an IPv6 Internet connection. This bypass can allow unauthorized access to internal network resources. The vulnerability was published in April 2026. Exploitation of this vulnerability can lead to significant security breaches, allowing attackers to move laterally within a network and potentially compromise sensitive data. Defenders should prioritize patching and implementing detection measures to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Hirschmann HiLCOS OpenBAT or BAT450 device with IPv6 and IPsec enabled.</li>
<li>Attacker establishes an IPv6 IPsec VPN connection (IKEv1 or IKEv2) to the target device.</li>
<li>Simultaneously, the attacker maintains an active IPv6 Internet connection.</li>
<li>The attacker crafts network packets designed to bypass the configured firewall rules.</li>
<li>The target device incorrectly routes traffic from the VPN connection, bypassing the firewall.</li>
<li>The attacker gains unauthorized access to internal network resources.</li>
<li>The attacker moves laterally within the network, exploiting additional vulnerabilities.</li>
<li>The attacker exfiltrates sensitive data or performs other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-4477 allows attackers to bypass firewall restrictions, potentially compromising the entire network. This can lead to unauthorized access to sensitive data, lateral movement within the network, and deployment of malware. The severity of the impact depends on the network configuration and the sensitivity of the data being protected by the affected devices. Due to the nature of industrial control systems (ICS), successful exploitation could have significant operational and safety consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches provided by Belden for Hirschmann HiLCOS OpenBAT and BAT450 products to address CVE-2021-4477, as referenced in the Belden Security Bulletin.</li>
<li>Monitor network traffic for anomalous IPv6 IPsec connections originating from or directed towards Hirschmann devices to detect potential exploitation attempts, using network connection logs.</li>
<li>Implement the provided Sigma rule <code>Detect_Hirschmann_IPsec_Bypass</code> to identify suspicious network activity indicative of the firewall bypass vulnerability.</li>
<li>Review and harden firewall configurations on affected devices, ensuring that IPv6 traffic is properly inspected and filtered, based on product documentation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2021-4477</category><category>firewall-bypass</category><category>network</category></item><item><title>Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hios-dos/</link><pubDate>Fri, 03 Apr 2026 21:17:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hios-dos/</guid><description>A denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.</description><content:encoded><![CDATA[<p>Hirschmann HiOS is vulnerable to a denial-of-service (DoS) condition due to improper handling of packet length fields within the EtherNet/IP stack. This vulnerability, identified as CVE-2020-37216, affects HiOS devices with versions prior to 08.1.00 and 07.1.01. A remote attacker can exploit this flaw by sending specially crafted UDP EtherNet/IP packets where the specified length value exceeds the actual packet size. Successful exploitation leads to a device crash or hang, rendering it inoperable and disrupting network communications. This vulnerability was reported and published in April 2026. Defenders should prioritize patching or mitigating this vulnerability to maintain network availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies vulnerable Hirschmann HiOS device on the network.</li>
<li>Attacker crafts a malicious UDP EtherNet/IP packet.</li>
<li>The crafted packet includes a length field with a value exceeding the actual packet size.</li>
<li>The attacker sends the crafted UDP EtherNet/IP packet to the targeted HiOS device.</li>
<li>The HiOS device attempts to process the malformed packet.</li>
<li>Due to the improper handling of the invalid length field, the EtherNet/IP stack within the HiOS device encounters an error.</li>
<li>The error causes the HiOS device to crash or hang.</li>
<li>The device becomes inoperable, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2020-37216 results in a denial-of-service condition on the affected Hirschmann HiOS device. This can disrupt critical network communications and potentially impact industrial control systems relying on the affected device. The number of affected devices and organizations depends on the prevalence of vulnerable HiOS versions within operational networks. A successful attack could lead to temporary or prolonged outages, impacting productivity and availability of industrial processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Hirschmann HiOS devices to versions 08.1.00 or 07.1.01 or later to patch CVE-2020-37216.</li>
<li>Monitor network traffic for suspicious UDP EtherNet/IP packets with abnormally large length fields destined for Hirschmann HiOS devices, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the potential impact of a successful denial-of-service attack.</li>
<li>Review and harden the configuration of Hirschmann HiOS devices according to vendor best practices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dos</category><category>cve-2020-37216</category><category>network</category></item><item><title>Suricata DoS Vulnerability (CVE-2026-31933)</title><link>https://feed.craftedsignal.io/briefs/2026-04-suricata-dos/</link><pubDate>Thu, 02 Apr 2026 14:16:28 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-suricata-dos/</guid><description>Specially crafted network traffic can cause Suricata to slow down, leading to a denial-of-service condition in versions prior to 7.0.15 and 8.0.4, as identified by CVE-2026-31933.</description><content:encoded><![CDATA[<p>Suricata, a network IDS, IPS, and NSM engine, is susceptible to a denial-of-service vulnerability (CVE-2026-31933) affecting versions prior to 7.0.15 and 8.0.4. This flaw arises from inefficient algorithmic complexity (CWE-407), where specially crafted network traffic can induce a significant slowdown in Suricata&rsquo;s processing, particularly impacting its performance in IDS mode. An attacker can exploit this vulnerability by sending malicious network packets, potentially causing the Suricata instance to become unresponsive or consume excessive resources. The vulnerability was reported and patched by the Open Information Security Foundation (OISF). Organizations using affected Suricata versions are vulnerable to service disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a series of malicious network packets specifically designed to exploit the algorithmic inefficiency in Suricata&rsquo;s packet processing.</li>
<li>The attacker sends the crafted packets to the Suricata instance. This can be achieved through various network protocols and ports monitored by Suricata.</li>
<li>Suricata receives the packets and begins processing them. Due to the inefficient algorithm, processing these packets consumes significantly more resources than legitimate traffic.</li>
<li>As the number of malicious packets increases, Suricata&rsquo;s CPU and memory usage rises dramatically, leading to a performance slowdown.</li>
<li>The slowdown affects Suricata&rsquo;s ability to inspect other network traffic in a timely manner, potentially allowing malicious activity to go undetected.</li>
<li>Eventually, Suricata&rsquo;s performance degrades to the point where it becomes unresponsive, effectively causing a denial-of-service condition.</li>
<li>Legitimate network traffic may be dropped or delayed due to Suricata&rsquo;s inability to process it efficiently.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31933 results in a denial-of-service condition, causing Suricata to become unresponsive and hindering its ability to perform network intrusion detection and prevention. The impact includes the potential for undetected malicious activity, delayed or dropped legitimate network traffic, and increased operational overhead for security teams to investigate and remediate the issue. The severity is rated as HIGH with a CVSS v3.1 score of 7.5.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Suricata to version 7.0.15 or 8.0.4 or later to patch CVE-2026-31933.</li>
<li>Deploy the Sigma rule <code>DetectHighPacketRate</code> to identify unusual traffic patterns indicative of a DoS attempt.</li>
<li>Monitor Suricata&rsquo;s CPU and memory utilization for unexpected spikes, which could indicate exploitation of this vulnerability.</li>
<li>Implement rate limiting or traffic shaping rules on network devices to mitigate the impact of malicious traffic.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>suricata</category><category>cve-2026-31933</category><category>network</category></item><item><title>Interlock Ransomware Campaign Targeting Enterprise Firewalls</title><link>https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</link><pubDate>Thu, 19 Mar 2026 05:33:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-interlock-firewall-ransomware/</guid><description>The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.</description><content:encoded><![CDATA[<p>The Interlock ransomware campaign specifically targets enterprise firewalls. The campaign&rsquo;s objective is to encrypt sensitive data residing on or accessible through these firewalls, rendering systems inoperable and creating significant business disruption. While specific details about the initial discovery and scope of the campaign remain limited, its focus on firewalls suggests a targeted approach aimed at organizations heavily reliant on these devices for network security and perimeter defense. The lack of specific details about delivery mechanisms and exploited vulnerabilities underscores the need for proactive threat hunting and vulnerability management to detect and mitigate potential Interlock ransomware infections.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the targeted network, potentially through exploiting vulnerabilities in the firewall&rsquo;s management interface or VPN services.</li>
<li><strong>Firewall Compromise:</strong> The attacker exploits the initial access to compromise the firewall device. This may involve exploiting known vulnerabilities or using stolen credentials.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the compromised firewall as a pivot point to move laterally within the internal network. Tools like <code>ssh</code> or <code>PsExec</code> may be used.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify valuable data stores accessible through the firewall. This may involve scanning network shares or querying databases.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges to gain administrative access to critical systems. This could involve exploiting vulnerabilities or using credential harvesting techniques.</li>
<li><strong>Data Encryption:</strong> The attacker deploys the Interlock ransomware payload to encrypt sensitive data on systems accessible via the firewall.</li>
<li><strong>Ransom Demand:</strong> After encryption, the attacker delivers a ransom note demanding payment for decryption keys.</li>
<li><strong>Exfiltration (Possible):</strong> Depending on the attacker&rsquo;s goals, data exfiltration may occur prior to encryption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Interlock ransomware attack can lead to significant data loss, business disruption, and financial damage. Organizations can suffer reputational damage and legal repercussions due to data breaches. The targeted nature of the attack suggests a focus on organizations where firewall compromise would have a widespread impact, potentially affecting hundreds or thousands of users or customers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable enhanced logging on all enterprise firewalls to capture detailed activity, including login attempts, configuration changes, and network traffic. This enhances the effectiveness of the detection rules below.</li>
<li>Implement multi-factor authentication (MFA) for all firewall administrative access to mitigate the risk of credential theft.</li>
<li>Regularly patch and update firewall firmware to address known vulnerabilities.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>firewall</category><category>network</category></item><item><title>Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent</title><link>https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</link><pubDate>Thu, 26 Feb 2026 07:27:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-fortigate-cve-2023-27997/</guid><description>Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.</description><content:encoded>&lt;p>On February 26, 2026, network intrusion detection systems (IDS) triggered alerts related to potential exploitation attempts targeting Fortigate VPN servers. The alerts highlight suspicious network activity originating from multiple IP addresses, specifically repeated GET requests to the &lt;code>/remote/logincheck&lt;/code> endpoint, a known vulnerability associated with CVE-2023-27997. This vulnerability could allow unauthorized access to the VPN. Additionally, an IPv4 address was observed using a suspicious…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fortigate</category><category>vpn</category><category>cve-2023-27997</category><category>exploit</category><category>network</category></item><item><title>Ongoing Exploitation of Cisco SD-WAN Systems</title><link>https://feed.craftedsignal.io/briefs/2026-02-cisco-sdwan-vulns/</link><pubDate>Wed, 25 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-cisco-sdwan-vulns/</guid><description>Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.</description><content:encoded>&lt;p>CISA and its partners have observed malicious cyber actors targeting and compromising Cisco SD-WAN systems across various organizations globally. The attackers are leveraging CVE-2026-20127, an authentication bypass vulnerability, for initial access. Following successful exploitation of CVE-2026-20127, the attackers escalate privileges and establish long-term persistence within the compromised SD-WAN systems using CVE-2022-20775. In response to this active exploitation, CISA issued Emergency…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cisco-sdwan</category><category>vulnerability</category><category>exploitation</category><category>network</category></item><item><title>Detecting External RPC Traffic for Initial Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-rpc-from-internet/</link><pubDate>Tue, 09 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-rpc-from-internet/</guid><description>This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.</description><content:encoded><![CDATA[<p>This detection rule identifies RPC traffic originating from the internet, which can indicate malicious activity. RPC is used for remote system administration and resource sharing but should rarely be exposed to the internet. Threat actors frequently target RPC for initial access or as a backdoor. This rule analyzes network traffic, specifically looking for TCP connections to port 135 (a common RPC port) originating from outside the internal network. The rule aims to detect unauthorized attempts to access or control systems via RPC from external sources, enhancing network security and preventing potential breaches. The rule was last updated on 2026-04-24.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker scans the internet for systems with exposed RPC services on TCP port 135.</li>
<li>The attacker establishes a TCP connection to the target system&rsquo;s port 135.</li>
<li>The attacker attempts to negotiate an RPC connection, potentially exploiting vulnerabilities in the RPC service.</li>
<li>Successful exploitation allows the attacker to execute commands remotely on the target system.</li>
<li>The attacker uses the compromised system to perform reconnaissance, gathering information about the internal network.</li>
<li>The attacker attempts lateral movement to other systems within the network, using the initial foothold.</li>
<li>The attacker installs malware or creates a backdoor for persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of exposed RPC services can lead to complete system compromise, allowing attackers to execute arbitrary commands, install malware, and steal sensitive data. This can result in data breaches, financial loss, and reputational damage. The rule aims to prevent attackers from gaining initial access to internal systems, mitigating the risk of wider network compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect RPC from Internet&rdquo; to your SIEM to identify potentially malicious connections to port 135.</li>
<li>Review and harden systems that provide RPC services to ensure they are not directly exposed to the internet, as detected by the rule &ldquo;Detect RPC from Internet&rdquo;.</li>
<li>Enforce network segmentation to limit the exposure of critical systems and services, preventing RPC services from being accessible from the Internet (reference: note section in the rule).</li>
<li>Investigate any alerts generated by the Sigma rule by examining the source and destination IP addresses and related network traffic logs (reference: note section in the rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>initial-access</category><category>network</category><category>rpc</category></item><item><title>Tenda FH303/A300 DNS Hijacking Vulnerability (CVE-2018-25318)</title><link>https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-tenda-dns-hijacking/</guid><description>Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability (CVE-2018-25318) that allows unauthenticated attackers to modify DNS settings by exploiting insufficient cookie validation, potentially redirecting user traffic to malicious sites.</description><content:encoded><![CDATA[<p>CVE-2018-25318 affects Tenda FH303/A300 routers running firmware version V5.07.68_EN. This vulnerability stems from a session weakness related to insufficient cookie validation. An unauthenticated attacker can exploit this flaw to modify the DNS settings of the router. By sending a crafted GET request to the <code>/goform/AdvSetDns</code> endpoint, an attacker can inject a malicious admin cookie. This allows them to overwrite the configured DNS servers, potentially redirecting all network traffic from connected devices through attacker-controlled infrastructure. This can lead to phishing attacks, malware distribution, and other malicious activities. The vulnerability poses a significant risk to home and small office networks using the affected Tenda routers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Tenda FH303/A300 router running firmware V5.07.68_EN.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/goform/AdvSetDns</code> endpoint.</li>
<li>The crafted GET request includes a forged admin cookie, bypassing authentication checks due to the session weakness.</li>
<li>The attacker sends the crafted GET request to the router&rsquo;s management interface.</li>
<li>The router, due to insufficient cookie validation, accepts the forged cookie and processes the request.</li>
<li>The request modifies the DNS server settings on the router, replacing the legitimate DNS servers with attacker-controlled DNS servers.</li>
<li>Users connected to the router unknowingly use the attacker&rsquo;s DNS servers for name resolution.</li>
<li>DNS requests are redirected to malicious IPs controlled by the attacker, potentially leading to phishing sites or malware downloads.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25318 allows an attacker to perform DNS hijacking on affected Tenda routers. This can redirect users to malicious websites designed to steal credentials, distribute malware, or conduct other harmful activities. The vulnerability poses a critical risk to users of the affected routers, as it can compromise their online security and privacy. The CVSS v3.1 base score for this vulnerability is 9.8, highlighting its severity. The number of affected users is dependent on the number of deployed vulnerable devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for requests to <code>/goform/AdvSetDns</code> with unusual parameters (Sigma rule: &ldquo;Detect Tenda Router DNS Hijacking Attempt&rdquo;).</li>
<li>If possible, upgrade the router firmware to a version that patches CVE-2018-25318.</li>
<li>Implement network segmentation to limit the impact of compromised devices.</li>
<li>Consider using a reputable DNS service with built-in security features to mitigate the impact of DNS hijacking attacks.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2018-25318</category><category>tenda</category><category>dns-hijacking</category><category>network</category></item><item><title>Windows Remote Desktop Network Bruteforce Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</guid><description>This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.</description><content:encoded><![CDATA[<p>This analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. It detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity. This activity can lead to account compromise and potential ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker scans the network to identify systems with open RDP ports (TCP 3389).</li>
<li>The attacker initiates multiple RDP connection attempts to a target host, using a list of common usernames and passwords or compromised credentials.</li>
<li>The firewall logs each connection attempt, recording the source and destination IPs, ports, and timestamps.</li>
<li>Sysmon logs the network connections with Event ID 3.</li>
<li>The attacker continues to attempt connections, typically exceeding 10 attempts within an hour.</li>
<li>Upon successful authentication, the attacker gains unauthorized access to the target system.</li>
<li>The attacker may then install malware, move laterally, or exfiltrate sensitive data.</li>
<li>The attacker might deploy ransomware like SamSam or Ryuk, as referenced in external reports.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RDP brute force attacks can lead to unauthorized access to systems, data breaches, malware infections, and ransomware deployment. Compromised systems can be used as a staging point for further attacks within the network. The references indicate that ransomware attacks have been delivered using RDP brute-force techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure network traffic data is populating the Network_Traffic data model to enable the provided search query.</li>
<li>Deploy the Sigma rule <code>RDP Bruteforce via Network Traffic</code> to detect brute force attempts based on network connection patterns.</li>
<li>Adjust the count and duration thresholds in the detection query to tune the sensitivity for your environment.</li>
<li>Investigate source IPs identified by the detection rule as potential attackers.</li>
<li>Monitor Sysmon EventID 3 for network connections to detect RDP brute-force attempts.</li>
<li>Review the referenced Zscaler and ReliaQuest articles for additional context and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rdp</category><category>bruteforce</category><category>credential-access</category><category>windows</category><category>network</category></item><item><title>Outbound SMB Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</guid><description>This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.</description><content:encoded><![CDATA[<p>This detection identifies outbound Server Message Block (SMB) traffic from internal hosts to external servers. The activity is identified by monitoring network traffic for SMB requests directed towards the Internet, an unusual occurrence in standard operations. This analytic is crucial for Security Operations Centers (SOCs) as it can signal an attacker&rsquo;s attempt to retrieve credential hashes via compromised internal systems, a critical step in lateral movement and privilege escalation. The source mentions specific relevance to &ldquo;Hidden Cobra Malware&rdquo;, &ldquo;DHS Report TA18-074A&rdquo;, and &ldquo;NOBELIUM Group&rdquo;, suggesting possible connections to these threat actors or campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised through an initial access vector (e.g., phishing, exploit).</li>
<li>The attacker attempts to enumerate network resources accessible from the compromised host.</li>
<li>The attacker leverages SMB to connect to external servers, typically on ports 139 or 445.</li>
<li>The SMB connection attempts to authenticate or negotiate with the external server.</li>
<li>The attacker may attempt to exploit vulnerabilities in the SMB protocol or server.</li>
<li>The attacker captures or relays credential hashes transmitted over the SMB connection.</li>
<li>The attacker uses the captured credentials to move laterally to other systems or escalate privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of outbound SMB traffic can lead to unauthorized access to sensitive data and full system compromise. Lateral movement and privilege escalation are key goals. Confirmed malicious SMB traffic could enable attackers to move through the network, potentially impacting numerous systems and leading to significant data breaches. While the number of victims isn&rsquo;t specified, the detection&rsquo;s relevance to known threat actors suggests potentially widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Outbound SMB Traffic Detected</code> to your SIEM and tune it for your environment, using the provided positive and negative test cases to ensure accurate detection.</li>
<li>Investigate and block any detected outbound SMB connections that are not explicitly authorized by legitimate business needs (reference <code>detect_outbound_smb_traffic_filter</code> macro in the original search).</li>
<li>Implement network segmentation to restrict internal hosts from directly accessing external SMB services.</li>
<li>Enforce strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
<li>Categorize internal CIDR blocks as <code>internal</code> in your asset management system to reduce false positives (reference &ldquo;known_false_positives&rdquo; section).</li>
<li>Consider blocking external communications of all SMB versions and related protocols at the network boundary.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network</category><category>smb</category><category>lateral-movement</category><category>privilege-escalation</category></item><item><title>GoBGP Remote Denial of Service via Malformed BGP UPDATE Message</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gobgp-dos/</guid><description>A remote Denial of Service (DoS) vulnerability exists in GoBGP version 4.2.0 and earlier, where a malformed BGP UPDATE message can trigger a runtime error (index out of range panic), crashing the GoBGP process. This occurs during the processing of 4-byte AS attributes when the message structure causes an internal slice index shift that is not properly handled. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon, leading to a complete loss of routing capabilities.</description><content:encoded><![CDATA[<p>A remote Denial of Service vulnerability exists in GoBGP that can be triggered by a malformed BGP UPDATE message, specifically when handling 4-byte AS attributes. The vulnerability, identified as CVE-2026-41643, affects GoBGP version 4.2.0 and earlier. The attack involves sending a crafted BGP UPDATE message that causes an index-out-of-range panic in the <code>UpdatePathAttrs4ByteAs</code> function within <code>internal/pkg/table/message.go</code>. This panic results in the GoBGP process crashing, leading to a loss of routing capabilities. A malicious peer or a malformed route propagated through a transit provider can exploit this vulnerability to consistently crash the BGP daemon. This can disrupt network operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a BGP peering session with a vulnerable GoBGP instance (version 4.2.0 or earlier).</li>
<li>The attacker crafts a malicious BGP UPDATE message. This message contains both an AS_PATH (Type 2) and an AS4_PATH (Type 17) attribute.</li>
<li>The crafted message orders the attributes such that the AS4_PATH appears before the AS_PATH.</li>
<li>The AS4_PATH attribute is intentionally malformed to trigger a validation error.</li>
<li>The GoBGP process attempts to remove the invalid AS4_PATH attribute from the <code>msg.PathAttributes</code> slice in the <code>UpdatePathAttrs4ByteAs</code> function.</li>
<li>Removing the AS4_PATH causes subsequent attributes in the slice to shift left, altering their indices.</li>
<li>The function attempts to access the AS_PATH attribute using a stale index (asAttrPos) calculated before the slice modification.</li>
<li>Due to the index shift, accessing <code>msg.PathAttributes[asAttrPos]</code> results in an out-of-bounds access, triggering a panic and crashing the GoBGP process, causing a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The vulnerability leads to a remote Denial of Service (DoS) condition. Any GoBGP deployment (v4.2.0 and earlier) that accepts BGP UPDATE messages from peers is vulnerable. A single malicious peer or a malformed route propagated through a transit provider can consistently crash the BGP daemon. This results in a complete loss of routing capabilities, disrupting network services, and causing potential outages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GoBGP to a patched version that addresses CVE-2026-41643.</li>
<li>Monitor BGP UPDATE messages for malformed AS4_PATH attributes (Type 17) appearing before AS_PATH attributes (Type 2) using a network intrusion detection system.</li>
<li>Implement rate limiting on BGP UPDATE messages from untrusted peers to mitigate the impact of a DoS attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial of service</category><category>bgp</category><category>network</category></item><item><title>GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-gnutls-dtls-overflow/</guid><description>A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.</description><content:encoded><![CDATA[<p>A heap buffer overflow vulnerability has been identified in the DTLS handshake fragment reassembly logic of GnuTLS. The vulnerability, tracked as CVE-2026-33846, resides within the <code>merge_handshake_packet()</code> function. This function is responsible for matching and merging incoming DTLS handshake fragments. The core issue is the lack of validation for the <code>message_length</code> field across different fragments belonging to the same logical message. An attacker can exploit this flaw by transmitting malicious DTLS fragments that contain inconsistent <code>message_length</code> values. This inconsistency leads the GnuTLS implementation to allocate a buffer based on a smaller, initial fragment but subsequently attempts to write data beyond the allocated buffer&rsquo;s boundaries using the larger, conflicting fragments. This out-of-bounds write on the heap can be triggered remotely without requiring any form of authentication, making it a critical vulnerability. Successful exploitation can lead to application crashes or, potentially, arbitrary memory corruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker initiates a DTLS handshake with a vulnerable GnuTLS server.</li>
<li>The attacker sends a first DTLS handshake fragment with a small <code>message_length</code> value.</li>
<li>The vulnerable <code>merge_handshake_packet()</code> function allocates a heap buffer based on the initial, smaller <code>message_length</code>.</li>
<li>Attacker sends a subsequent DTLS handshake fragment for the same handshake message with a larger, inconsistent <code>message_length</code> value.</li>
<li><code>merge_handshake_packet()</code> incorrectly merges the second fragment into the allocated buffer without proper bounds checking.</li>
<li>The write operation overflows the allocated heap buffer, corrupting adjacent memory.</li>
<li>The application crashes due to memory corruption, or the attacker potentially gains further control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33846 can lead to denial-of-service conditions due to application crashes. Memory corruption could allow for arbitrary code execution, but this is a less likely outcome. Given the widespread use of GnuTLS in various applications and systems, a large number of services could be impacted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for DTLS handshakes with inconsistent <code>message_length</code> values in fragmented handshake messages using the provided Sigma rule <code>Detect DTLS Handshake Fragment Length Mismatch</code>.</li>
<li>Apply available patches from GnuTLS to remediate CVE-2026-33846.</li>
<li>Implement rate limiting for DTLS handshake requests to mitigate potential denial-of-service attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33846</category><category>dtls</category><category>heap overflow</category><category>gnutls</category><category>network</category></item><item><title>Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cisco-aci-cloudsec/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cisco-aci-cloudsec/</guid><description>A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.</description><content:encoded><![CDATA[<p>A vulnerability exists within the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches when operating in ACI mode. This flaw enables an unauthenticated, remote adversary to potentially decipher and manipulate encrypted traffic traversing between sites. The vulnerability, identified as CVE-2023-20185, originates from an issue in the cipher implementation employed by the CloudSec encryption feature. Cisco has deprecated and removed the affected ACI Multi-Site CloudSec encryption feature.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker establishes a network position on-path between ACI sites.</li>
<li>The attacker intercepts intersite encrypted traffic.</li>
<li>The attacker analyzes the captured traffic.</li>
<li>The attacker exploits the weak cipher implementation.</li>
<li>The attacker decrypts the intercepted traffic.</li>
<li>The attacker reads sensitive data within the decrypted traffic.</li>
<li>The attacker modifies the decrypted traffic.</li>
<li>The attacker re-encrypts (or forwards unencrypted) the modified traffic toward the destination.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2023-20185 allows unauthorized reading and modification of data transmitted between ACI sites. The impact can range from data breaches and intellectual property theft to manipulated financial transactions and compromised control systems. The lack of a workaround necessitates immediate action to mitigate the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply configuration changes to remove usage of the CloudSec encryption feature.</li>
<li>Monitor network traffic for unusual patterns indicative of man-in-the-middle attacks targeting intersite communication.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts targeting intersite traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2023-20185</category><category>information-disclosure</category><category>network</category></item><item><title>SMB (Windows File Sharing) Activity to the Internet</title><link>https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</link><pubDate>Tue, 02 Jan 2024 14:12:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-smb-to-internet/</guid><description>This rule detects network events indicating the use of Windows file sharing (SMB or CIFS) traffic to the Internet, which is commonly exploited for initial access, backdoor deployment, or data exfiltration.</description><content:encoded><![CDATA[<p>The provided Elastic rule identifies instances of Server Message Block (SMB), also known as Windows File Sharing, being transmitted to external IP addresses. SMB is intended for internal network communication for file, printer, and resource sharing. Exposing SMB to the internet presents a significant security risk. Threat actors frequently target and exploit SMB for initial access, deploying backdoors, or exfiltrating sensitive data. This activity warrants immediate investigation as it violates best practices and poses a direct threat to network security. The rule focuses on traffic on TCP ports 139 and 445, originating from internal IP ranges and destined for external IPs, excluding known safe IP ranges, as defined by IANA. The rule was last updated April 24, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised, often through phishing or other social engineering techniques.</li>
<li>The compromised host attempts to establish an SMB connection to an external IP address on TCP ports 139 or 445.</li>
<li>The attacker leverages the SMB protocol to attempt authentication, potentially exploiting vulnerabilities like credential stuffing or known SMB exploits.</li>
<li>Upon successful authentication or exploitation, the attacker gains unauthorized access to shared resources or system services on the external system.</li>
<li>The attacker may upload malicious payloads, such as malware or backdoors, via the SMB connection to the external host.</li>
<li>The attacker uses the SMB protocol to exfiltrate sensitive data from the internal network to the external system.</li>
<li>The attacker maintains persistence on the compromised internal host, using SMB for command and control or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising SMB services can lead to significant data breaches, system compromise, and potential ransomware deployment. Exposed SMB services allow attackers to gain unauthorized access to sensitive files, critical infrastructure, and internal network resources. Successful exploitation can result in complete system takeover, data exfiltration, and disruption of business operations. While the exact number of victims is unknown, the prevalence of SMB vulnerabilities and misconfigurations suggests a widespread risk across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect SMB traffic to the internet and tune for your environment.</li>
<li>Review firewall and network configurations to ensure SMB traffic is not allowed to the Internet, and block any unauthorized outbound SMB traffic on ports 139 and 445, as identified by the rule description.</li>
<li>Investigate the source IP addresses triggering the rule, identifying internal systems initiating SMB traffic and determining if they belong to known devices or users within the organization, as described in the provided investigation guide.</li>
<li>Regularly audit network configurations and update the rule exceptions to include any legitimate device IPs to prevent false positives, as mentioned in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>exfiltration</category><category>network</category></item></channel></rss>