From a4d0e3453d5a72ef39850089ab204fe17badc694 Mon Sep 17 00:00:00 2001 From: Bhabesh Rai Date: Wed, 25 Aug 2021 10:24:15 +0545 Subject: [PATCH] Fix for CVE tag --- ...b_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/rules/web/web_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml b/rules/web/web_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml index 7cda3b67..a816bc22 100644 --- a/rules/web/web_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml +++ b/rules/web/web_arcadyan_router_cve_2021_20090_2021_20091_exploit.yml @@ -4,21 +4,20 @@ id: f0500377-bc70-425d-ac8c-e956cd906871 status: experimental description: Detects exploitation of vulnerabilities in Arcadyan routers as reported in CVE-2021-20090 and CVE-2021-20091. references: - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20090 - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20091 + - https://nvd.nist.gov/vuln/detail/cve-2021-20090 + - https://nvd.nist.gov/vuln/detail/cve-2021-20091 - https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2 - https://www.tenable.com/security/research/tra-2021-13 - https://blogs.juniper.net/en-us/security/freshly-disclosed-vulnerability-cve-2021-20090-exploited-in-the-wild author: Bhabesh Raj date: 2021/08/24 +modified: 2021/08/25 falsepositives: - Unknown level: critical tags: - attack.initial_access - attack.t1190 - - cve.2021-20090 - - cve.2021-20091 --- logsource: # CVE-2021-20090 (Path Traversal) category: webserver