CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass
Showing posts sorted by relevance for query cve /cvss. Sort by date Show all posts
Showing posts sorted by relevance for query cve /cvss. Sort by date Show all posts

Friday, November 8, 2024

AndroxGh0st and Mozi: Expanding Botnet Operations Through Exploited Vulnerabilities

 Attack News for October 8th, 2024

The AndroxGh0st malware operators exploit various security vulnerabilities in various internet-facing applications and deploy the Mozi botnet malware.

According to a new report from CloudSEK, this botnet uses remote code execution and credential-stealing techniques to maintain persistent access, exploiting unpatched vulnerabilities to infiltrate critical infrastructures.

AndroxGh0st, a Python-based cloud attack tool, is known for targeting Laravel applications to access sensitive data from services like Amazon Web Services (AWS), SendGrid, and Twilio. Active since at least 2022, it has previously exploited vulnerabilities in the Apache web server (CVE-2021-41773), Laravel Framework (CVE-2018-15133), and PHPUnit (CVE-2017-9841) to gain initial access, escalate privileges, and establish control over compromised systems.

CloudSEK’s latest analysis shows that the malware is now exploiting a broader array of vulnerabilities for initial access, including:

CVE-2023-1389 (CVSS score: 8.8) - TP-Link Archer AX21 firmware command injection vulnerability

CVE-2024-4577 (CVSS score: 9.8) - PHP CGI argument injection vulnerability

CVE-2024-36401 (CVSS score: 9.8) - GeoServer remote code execution vulnerability

“The botnet cycles through common administrative usernames and uses a consistent password pattern,” CloudSEK noted. “The target URL redirects to /wp-admin/, the backend administration dashboard for WordPress sites. If authentication is successful, it gains access to critical website controls and settings.”

The attacks also exploit unauthenticated command execution flaws in Netgear DGN devices and Dasan GPON home routers to drop a payload named “Mozi.m” from various external servers (“200.124.241[.]140” and “117.215.206[.]216”).

Mozi, another well-known botnet, has a history of targeting IoT devices to incorporate them into a malicious network for conducting distributed denial-of-service (DDoS) attacks. Although the malware authors were arrested by Chinese law enforcement in September 2021, a significant decline in Mozi activity wasn’t observed until August 2023, when unidentified parties issued a kill switch command to terminate the malware. It’s suspected that the botnet creators or Chinese authorities distributed an update to dismantle it.

AndroxGh0st’s integration of Mozi suggests a possible operational alliance, allowing it to spread to more devices than ever before.

“AndroxGh0st is not just collaborating with Mozi but embedding Mozi’s specific functionalities (e.g., IoT infection and propagation mechanisms) into its standard operations,” CloudSEK stated.

“AndroxGh0st has expanded to leverage Mozi’s propagation power to infect more IoT devices, using Mozi’s payloads to achieve goals that would otherwise require separate infection routines.”

 “If both botnets use the same command infrastructure, it points to a high level of operational integration, possibly implying that the same cybercriminal group controls both AndroxGh0st and Mozi. This shared infrastructure would streamline control over a broader range of devices, enhancing both the effectiveness and efficiency of their combined botnet operations.”

Thursday, April 11, 2024

CVE & CVSS the differences

 CVE and CVSS

CVE (Common Vulnerabilities and Exposures)
CVE deals with the platform, which is known to have a vulnerability.
Operating System
Applications
Hardware such as a switch, router, firewall, etc.
IoT (Internet of Things)

CVSS (Common Vulnerability Scoring System)
This lets us know the criticality of the vulnerability.
This is a calculated value based on several elements.

Monday, October 20, 2025

How EPSS Helps Security Professionals Prioritize Vulnerabilities

 EPSS (Exploit Prediction Scoring System)

The Exploit Prediction Scoring System (EPSS) is a data-driven framework designed to estimate the likelihood that a software vulnerability will be exploited in the wild. It helps security professionals prioritize which vulnerabilities to address first based on real-world risk, rather than just severity.

What EPSS Measures
EPSS provides a probability score (0 to 1) indicating how likely it is that a vulnerability will be exploited within a short time frame (typically the next 30 days). For example:
  • EPSS Score of 0.6 means there's a 60% chance of exploitation.
  • EPSS Score of 0.01 means there's only a 1% chance.
How EPSS Works
EPSS uses machine learning models trained on:
  • CVE metadata (e.g., CVSS scores, affected software)
  • Exploit availability (e.g., public exploit code)
  • Threat intelligence feeds
  • Historical exploitation data
This allows EPSS to dynamically assess risk based on current trends and attacker behavior.

Why EPSS Is Useful
  • Prioritization: Helps focus remediation efforts on vulnerabilities most likely to be exploited.
  • Complement to CVSS: CVSS measures severity, but not exploit likelihood. EPSS fills that gap.
  • Real-world relevance: Based on actual exploitation data, not theoretical risk.
EPSS vs CVSS


Use Cases
  • Vulnerability management: Prioritize patching based on EPSS scores.
  • Risk assessment: Combine EPSS with asset value and exposure.
  • Threat modeling: Identify high-risk vulnerabilities in attack paths.