Tag
SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)
2 rules 2 TTPs 1 CVESysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.
Unauthenticated CLI Escape Vulnerability (CVE-2026-3587)
2 rules 2 TTPs 1 IOCAn unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface of a device, leading to full compromise and root access on the underlying Linux-based OS, as described in CVE-2026-3587.
Entra ID Federated Identity Credential Issuer Modified
2 rules 2 TTPsModification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.
System Shells Launched via Windows Services
2 rules 4 TTPsAttackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.
Detect Suspicious Windows Service Installation
2 rules 1 TTPThis detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.
Unusual Service Host Child Process - Childless Service
2 rules 2 TTPsThis detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.
Excessive Global Administrator Accounts in Azure PIM
2 rules 3 TTPsDetection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.
User Added to Privileged Group in Active Directory
2 rules 1 TTPAdversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.
Suspicious Svchost.exe Child Process: cmd.exe
2 rules 2 TTPsDetection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.