CVE-2020-16171: Exploiting Acronis Cyber Backup for Fun and Emails – RCE Security
Tags
attack-pattern: | Data Python - T1059.006 Server - T1583.004 Server - T1584.004 Web Service - T1481 Web Services - T1583.006 Web Services - T1584.006 Connection Proxy - T1090 Web Service - T1102 |
Common Information
Type | Value |
---|---|
UUID | e0f758f5-ae41-4137-9d00-501bf23e1164 |
Fingerprint | a55a01003be5e2be |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 14, 2020, 3:33 p.m. |
Added to db | Jan. 18, 2023, 11:37 p.m. |
Last updated | Dec. 20, 2024, 7:05 a.m. |
Headline | CVE-2020-16171: Exploiting Acronis Cyber Backup for Fun and Emails |
Title | CVE-2020-16171: Exploiting Acronis Cyber Backup for Fun and Emails – RCE Security |
Detected Hints/Tags/Attributes | 33/1/14 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 1 | cve-2020-16171 |
|
Details | Domain | 1 | somerandomemail.com |
|
Details | Domain | 26 | logging.info |
|
Details | Domain | 1 | session.py |
|
Details | 1 | info@somerandomemail.com |
||
Details | File | 1 | temp_ams_proxy.py |
|
Details | File | 4 | config.config |
|
Details | File | 49 | request.url |
|
Details | File | 2 | self.json |
|
Details | File | 1 | critical-alert.png |
|
Details | File | 28 | test.html |
|
Details | File | 26 | logging.inf |
|
Details | File | 1 | session.py |
|
Details | IPv4 | 1 | 10.211.55.10 |