Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/CVE-2022-40684.yaml

20 lines
588 B
YAML

type: trigger
name: crowdsecurity/fortinet-cve-2022-40684
description: "Detect cve-2022-40684 exploitation attempts"
filter: |
evt.Meta.log_type in ["http_access-log", "http_error-log"] and
Upper(evt.Meta.http_path) startsWith Upper('/api/v2/cmdb/system/admin/') and Lower(evt.Parsed.http_user_agent) == 'report runner'
groupby: "evt.Meta.source_ip"
blackhole: 2m
labels:
type: exploit
remediation: true
classification:
- attack.T1548
- cve.CVE-2022-40684
spoofable: 0
confidence: 3
behavior: "http:exploit"
label: "Fortinet CVE-2022-40684"
service: fortinet