Files
zira-etc/crowdsec/hub/scenarios/crowdsecurity/CVE-2022-41082.yaml

23 lines
551 B
YAML

type: trigger
#debug: true
name: crowdsecurity/CVE-2022-41082
description: "Detect CVE-2022-41082 exploits"
filter: |
Upper(evt.Meta.http_path) contains Upper('/autodiscover/autodiscover.json') &&
Upper(evt.Parsed.http_args) contains Upper('powershell')
blackhole: 1m
groupby: "evt.Meta.source_ip"
labels:
type: exploit
remediation: true
classification:
- attack.T1595
- attack.T1190
- cve.CVE-2022-41082
spoofable: 0
confidence: 3
behavior: "http:exploit"
service: exchange
label: "Microsoft Exchange CVE-2022-41082"