Windows Search RCE Exploitation
Last updated on:
In this page
About the rule
Rule Type
Advanced
Rule Description
Windows Search RCE Exploitation
Severity
Critical
Rule Requirement
Criteria
Action1:
actionname = "MS Office Recent Folder File Creation" AND (IsVulnerable(HOSTNAME, "CVE-2023-36884"))
Action2:
actionname = "File Share Access Detection" AND (IsVulnerable(HOSTNAME, "CVE-2023-36884"))
sequence:Action1 followedby Action2 within 10m
select Action1.HOSTNAME,Action1.MESSAGE,Action1.PROCESSNAME,Action1.FILENAME,Action1.PREVVAL,Action1.CHANGES,Action1.PROCESSID,Action1.USERNAME,Action2.HOSTNAME,Action2.MESSAGE,Action2.DOMAIN,Action2.OBJECTNAME,Action2.REMOTEIP,Action2.SHAREPATH,Action2.USERNAME
Detection
Execution Mode
realtime
Log Sources
Windows


