Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    A Peek Into the Known Exploited Vulnerabilities of 2024 | Blog

    April 23, 2026

    SenseLive X3050 | CISA

    April 23, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 23, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Detecting Exploitation w/ VulnCheck Initial Access Intelligence – November 2024 | Blog
    News

    Detecting Exploitation w/ VulnCheck Initial Access Intelligence – November 2024 | Blog

    adminBy adminApril 22, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Initial Access Intelligence - November 2024

    VulnCheck Initial Access Intelligence equips organizations and security teams with detection artifacts including Suricata signatures, YARA rules, PCAPs, and private exploit PoCs to defend against initial access vulnerabilities that are either already being exploited or likely to be exploited soon.

    In November 2024, VulnCheck released Initial Access Intelligence (IAI) artifacts for 15 CVEs, covering 14 different vendors and products. 11 of the 14 have confirmed exploitation activity as of December 11th, 2024. The release of these detection artifacts include widely used edge devices from vendors including Palo Alto, Citrix, D-Link, Fortinet and Netgear.

    In November we discovered public-facing ProjectSend instances that appeared to have been exploited by attackers. As of November 25th, 99% of ProjectSend instances remained vulnerable and have not upgraded to the patched version released in August. Public exploits have pre-dated CVE assignment by months, including Nuclei templates and a weaponized Metasploit module. So we issued a CVE and released our research and initial artifacts for the vulnerability. Learn more about the research in our Project Send Blog Post

    To provide better visibility into these updates, we’ve broken down November’s Initial Access Intelligence Artifacts by CVE. For each CVE, we provide a range of detection tools including:

    • Exploits
    • Version scanners
    • PCAPs
    • Suricata rules
    • Snort rules
    • YARA rules
    • Greynoise/Censys/Shodan/FOFA/ZoomEye Queries
    • Target Docker Containers

    Artifact Name Date Added cve Exploit Version Scanner pcap Suricata Rule Snort Rule Yara
    Derby SQL based RCE 2024-11 CVE-2021-29442 ✅ ✅ ✅ ✅ ✅ ✅
    ProjectSend Incorrect Authorization Webshell Upload 2024-11 CVE-2024-11680 ✅ ✅ ✅ ✅ ✅ ✅
    Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability 2024-11 CVE-2024-0012 ✅ ✅ ✅ ✅ ✅
    Palo Alto Networks PAN-OS Management Interface Command Injection Vulnerability 2024-11 CVE-2024-9474 ✅ ✅ ✅ ✅ ✅
    Citrix Session Recording (Virtual Apps and Desktops) .NET Deserialization 2024-11 CVE-2024-8069 ✅ ✅ ✅ ✅
    D-Link ShareCenter Command Injection 2024-11 CVE-2024-10914 ✅ ✅ ✅ ✅ ✅
    Netgear WAX206 2024-11 CVE-2024-20017 ✅
    pgAdmin OAuth2 Information Disclosure 2024-11 CVE-2024-9014 ✅ ✅ ✅ ✅ ✅
    Fortinet FortiOS Out-of-Bound Write 2024-11 CVE-2024-21762 ✅ ✅ ✅
    Versa Director Favicon Upload (authenticated) 2024-11 CVE-2024-39717
    Apache Solr Authentication Bypass 2024-11 CVE-2024-45216 ✅ ✅ ✅ ✅ ✅
    Acronis Cyber Protect Unauthenticated RCE 2024-11 CVE-2022-3405 ✅ ✅ ✅ ✅
    CyberPanel OPTIONS Command Injection 2024-11 CVE-2024-51378 ✅ ✅ ✅ ✅
    Smart HMI WebIQ File Leak 2024-11 CVE-2024-8752 ✅ ✅ ✅ ✅ ✅
    Delta Electronics InfraSuite Device Master Deserialization 2024-11 CVE-2023-47207 ✅ ✅ ✅ ✅

    In October, we expanded the capabilities of go-exploit to include a new command and control feature called ShellTunnel which captures reverse shell traffic and routes it through an intermediary attacker-controlled server before reaching the main C2 server. https://vulncheck.com/blog/go-exploit-shelltunnel

    For those new to go-exploit, VulnCheck’s exploit proof of concept (PoC) and version scanner code is written in the Go programming language. They are provided with a Dockerfile for ease of use. The exploits leverage an Open Source Software (OSS) shared library, which VulnCheck has authored and maintains, called go-exploit.

    Learn more about how you can leverage Initial Access Intelligence detection artifacts to detect & respond to remote code execution (RCE) vulnerabilities here: https://docs.vulncheck.com/products/initial-access-intelligence/introduction



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCVE-2026-41179 | THREATINT
    Next Article Oracle security advisory – April 2026 quarterly rollup (AV26-380)
    admin
    • Website

    Related Posts

    News

    A Peek Into the Known Exploited Vulnerabilities of 2024 | Blog

    April 23, 2026
    News

    Protected: Canadian Security Intelligence Service Lifecycle of Warranted Information: Report – HTML

    April 23, 2026
    News

    Startups Brag They Spend More Money on AI Than Human Employees

    April 22, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202632 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202632 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    A Peek Into the Known Exploited Vulnerabilities of 2024 | Blog

    April 23, 2026

    SenseLive X3050 | CISA

    April 23, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 23, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.