Windows Search RCE Exploitation

Last updated on:

About the rule

Rule Type

Advanced

Rule Description

Windows Search RCE Exploitation

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "ms_office_recent_folder_file_creation" AND (vulnerableTo(HOSTNAME, "CVE-2023-36884")) Action2: actionname = "File Share Access Detection" AND (vulnerableTo(HOSTNAME, "CVE-2023-36884")) sequence:Action1 followedby Action2 within 10m select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.FILENAME,Action1.PREVVAL,Action1.CHANGES,Action2.HOSTNAME,Action2.MESSAGE,Action2.DOMAIN,Action2.OBJECTNAME,Action2.REMOTEIP,Action2.SHAREPATH,Action2.USERNAME

Detection

Execution Mode

realtime

Log Sources

Windows