Common Information
Type | Value |
---|---|
Value |
Exploit Public-Facing Application |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may attempt to exploit public-facing applications to leverage weaknesses on Internet-facing computer systems, programs, or assets in order to cause unintended or unexpected behavior. These public-facing applications may include user interfaces, software, data, or commands. In particular, a public-facing application in the IT environment may provide adversaries an interface into the OT environment. ICS-CERT analysis has identified the probable initial infection vector for systems running GE’s Cimplicity HMI with a direct connection to the Internet. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-02-11 | 12 | Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution | ||
Details | Website | 2025-02-06 | 2 | A Vulnerability in Trimble Cityworks Could Allow for Remote Code Execution | ||
Details | Website | 2025-02-03 | 77 | XE Group: From Credit Card Skimming to Exploiting Zero-Days | ||
Details | Website | 2025-02-03 | 3 | Cyber Kill Chain : A Step By Step Guide To Complete The Tasks of The Room In 2025 (Tryhackme). | ||
Details | Website | 2025-02-02 | 5 | Cyber Kill Chain | TryHackMe — Walkthrough | ||
Details | Website | 2025-01-30 | 4 | Multiple Vulnerabilities in SimpleHelp RMM Could Allow for Arbitrary Code Execution | ||
Details | Website | 2025-01-29 | 4 | Critical Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances | ||
Details | Website | 2025-01-26 | 2 | A Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances Could Allow for Remote Code Execution | ||
Details | Website | 2025-01-24 | 12 | Practical Application of the MITRE ATT&CK Framework for SOC/Cybersecurity Analysts: Mapping… | ||
Details | Website | 2025-01-23 | 164 | The Feed 2025–01–23 | ||
Details | Website | 2025-01-23 | 33 | Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor | ||
Details | Website | 2025-01-22 | 1 | Demystifying Cyber Attacks with MITRE ATT&CK Framework | ||
Details | Website | 2025-01-22 | 111 | PlushDaemon compromises supply chain of Korean VPN service | ||
Details | Website | 2025-01-20 | 10 | How I Turned a $10 RFI Bug into a $300 RCE Bounty (Step-by-Step Guide) | ||
Details | Website | 2025-01-20 | 42 | Zyxel vulnerability exploited by "Helldown" ransomware group | ||
Details | Website | 2025-01-16 | 345 | The Feed 2025–01–16 | ||
Details | Website | 2025-01-15 | 7 | Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution | ||
Details | Website | 2025-01-14 | 4 | Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Authentication Bypass | ||
Details | Website | 2025-01-14 | 4 | Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution | ||
Details | Website | 2025-01-10 | 30 | Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls ? Arctic Wolf | ||
Details | Website | 2025-01-10 | 30 | Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls - Arctic Wolf | ||
Details | Website | 2025-01-09 | 3 | Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution | ||
Details | Website | 2025-01-09 | 6 | Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication. | ||
Details | Website | 2025-01-06 | 26 | Strengthen your enterprise security posture with MITRE ATT&CK mapping to Cloud Browser Isolation controls | ||
Details | Website | 2024-12-29 | 8 | Securing AI Systems with MITRE ATLAS |