Rule Category
POLICY-OTHER --
Alert Message
POLICY-OTHER Necta WiFi Mouse openfile attempt
Rule Explanation
This rule looks for open file commands over Necta's WiFi Mouse protocol.
What To Look For
This rule fires on attempts to open files over Necta's WiFi Mouse application.
Known Usage
Public information/Proof of Concept available
False Positives
Known false positives, with the described conditions
This will false positive on legitimate open file commands over Necta's WiFi Mouse protocol.
Contributors
Cisco Talos Intelligence Group
Rule Groups
Rule Categories::Server::Other
Rules for detecting attacks against miscellaneous servers
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.
T1190
Additional Links
Rule Vulnerability
Command Injection
Command Injection attacks target applications that allow unsafe user-supplied input. Attackers transmit this input via forms, cookies, HTTP headers, etc. and exploit the applications permissions to execute system commands without injecting code.
CVE Additional Information
This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2022-3218
|
Loading description
|
|
Severity | |
Base Score | |
Impact Score | |
Exploit Score | |
Confidentiality Impact | |
Integrity Impact | |
Availability Impact | |
Authentication | |
Ease of Access | |
|