-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
research and create detectors for items from the Known Exploited Vulnerabilities Catalog #251
Comments
@IdahoManny our DHS lead suggested looking at "this zyxel vuln" as a good option for KEV detection |
This might be a resource worth looking at: https://networkforensic.dk/SNORT/ |
Hello Seth, |
We're going to track these individually going forward. As new detectors/rules are developed, create individual rules for the KEV/CVE. |
…-2.3.2 Bump flask from 2.0.2 to 2.3.2 in /api
Hello Seth, from email, I've attached Suricata Snort rules for CVE-2023-6448. |
Links
Summary
It would be valuable for the Malcolm development team to identify ICS-focused vulnerabilities specified in the CISA KEV catalog and create detectors for them. Most likely these would be in the form of Zeek notices, although we also have Suricata, YARA, the anomaly detection plugin, potentially Sigma (see #162), or anything else at our disposal to do so.
As we identify items from the KEV catalog, we should create individual bugs for each of them that reference back to this issue.
The text was updated successfully, but these errors were encountered: