Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CVE-2023-46604 | Apache ActiveMQ Deserialization of Untrusted Data Vulnerability | secondary_impact | T1053.005 | Scheduled Task |
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
|
CVE-2023-46604 | Apache ActiveMQ Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
|
CVE-2023-46604 | Apache ActiveMQ Deserialization of Untrusted Data Vulnerability | primary_impact | T1059.004 | Unix Shell |
Comments
This vulnerability is exploited by a remote attacker who manipulates serialized class types in the OpenWire protocol to run arbitrary shell commands. This allows the adversary to execute remote code, leading to the download and installation of malware, such as the Kinsing malware and cryptocurrency miners, on Linux systems. Additionally, attackers have attempted to deploy ransomware, attributed to the HelloKitty ransomware family, on target systems.
References
|
CVE-2023-40044 | Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability | secondary_impact | T1202 | Indirect Command Execution |
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
|
CVE-2023-40044 | Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1059 | Command and Scripting Interpreter |
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
|
CVE-2023-40044 | Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability | primary_impact | T1071.002 | File Transfer Protocols |
Comments
Zero-day .NET deserialization vulnerability that allows an adversary to make an HTTP POST request to a vulnerable WS_FTP Server and execute commands.
References
|
CVE-2023-38203 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
|
CVE-2023-38203 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
|
CVE-2023-29492 | Novi Survey Insecure Deserialization Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
CVE-2023-29492 is an insecure deserialization vulnerability. Exploitation of this vulnerability gives remote attackers arbitrary code execution in the context of the service account.
References
|
CVE-2023-29300 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
|
CVE-2023-29300 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1105 | Ingress Tool Transfer |
Comments
This vulnerability can be utilized by exploited a public-facing application. APT groups have used this exploit to deploy webshells.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1071.001 | Web Protocols |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1105 | Ingress Tool Transfer |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1046 | Network Service Discovery |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1003.001 | LSASS Memory |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1036.005 | Match Legitimate Name or Location |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1484.001 | Group Policy Modification |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | secondary_impact | T1505.003 | Web Shell |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26360 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1059.007 | JavaScript |
Comments
This vulnerability gives an adversary access through exploitation of a public-facing server.
References
|
CVE-2023-26359 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This vulnerability is utilized by exploiting a public-facing server.
References
|
CVE-2023-26359 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This vulnerability is utilized by exploiting a public-facing server.
References
|
CVE-2021-45046 | Apache Log4j2 Deserialization of Untrusted Data Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE 2021-45046 is a Log4J-related vulnerability that could enable enables an attacker to cause Remote Code Execution or other effects in certain non-default configurations. This specific vulnerability has been reported to have been leveraged in cryptomining and ransomware operations.
References
|
CVE-2021-45046 | Apache Log4j2 Deserialization of Untrusted Data Vulnerability | secondary_impact | T1486 | Data Encrypted for Impact |
Comments
CVE 2021-45046 is a Log4J-related vulnerability that has been seen to be used in cryptomining and ransomware operations.
References
|
CVE-2019-18935 | Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
|
CVE-2019-18935 | Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability | primary_impact | T1496 | Resource Hijacking |
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
|
CVE-2019-18935 | Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability | primary_impact | T1041 | Exfiltration Over C2 Channel |
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
|
CVE-2019-18935 | Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability | primary_impact | T1505.003 | Web Shell |
Comments
CVE 2019-18935 is a Insecure Deserialization vulnerability with the Telerik UI, which does not properly sanitize serialized data inputs from the user. This vulnerability leads to the application being vulnerable to RCE attacks that may lead to a full system compromise.
References
|
CVE-2018-4939 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1190 | Exploit Public-Facing Application |
Comments
As referenced in the attached report, T1190 is a known impact of this exploit.
References
|
CVE-2018-4939 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution |
Comments
This deserialization vulnerability allows adversaries to insert their own objects into client software for potential execution.
References
|
CVE-2018-4939 | Adobe ColdFusion Deserialization of Untrusted Data Vulnerability | primary_impact | T1133 | External Remote Services |
Comments
As referenced in the attached report, T1133 is a known impact of this exploit.
References
|
CVE-2017-9805 | Apache Struts Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
CVE-2017-9805 is a deserialization vulnerability in the Apache Struts REST Plugin that could allow an attacker to execute arbitrary commands remotely on the affected systems by sending a specially crafted web request to the application.
References
|
CVE-2017-9805 | Apache Struts Deserialization of Untrusted Data Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
CVE-2017-9805 is a deserialization vulnerability in the Apache Struts REST Plugin that could allow an attacker to execute arbitrary commands remotely on the affected systems by sending a specially crafted web request to the application.
References
|
CVE-2025-23006 | SonicWall SMA1000 Appliances Deserialization Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This pre-authentication vulnerability, present in SonicWall SMA1000 appliances running version 12.4.3-02804 or earlier, allows attackers to perform remote code execution on exploited machines, allowing for arbitrary OS command execution.
References
|
CVE-2025-23006 | SonicWall SMA1000 Appliances Deserialization Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This pre-authentication vulnerability, present in SonicWall SMA1000 appliances running version 12.4.3-02804 or earlier, allows attackers to perform remote code execution on exploited machines, allowing for arbitrary OS command execution.
References
|
CVE-2025-0994 | Trimble Cityworks Deserialization Vulnerability | exploitation_technique | T1068 | Exploitation for Privilege Escalation |
Comments
A deserialization vulnerability in Trimble Cityworks versions before 15.8.9 (and Cityworks with Office Companion versions prior to 23.10) can be exploited by attackers using maliciously crafted serialized objects to the server, ending with escalated privileges permitting the execution remote code against a target's Microsoft IIS web server.
References
|
CVE-2025-0994 | Trimble Cityworks Deserialization Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
A deserialization vulnerability in Trimble Cityworks versions before 15.8.9 (and Cityworks with Office Companion versions prior to 23.10) can be exploited by attackers to execute remote code against a target web server.
References
|
CVE-2024-20953 | Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
An attacker can create a serialized object specifically designed to exploit the deserialization vulnerability, embedding this payload into a request, which is then sent to a WebLogic server, leading to arbitrary code execution.
References
|
CVE-2024-20953 | Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
An attacker can create a serialized object specifically designed to exploit the deserialization vulnerability, embedding this payload into a request, which is then sent to a WebLogic server, leading to arbitrary code execution.
References
|
CVE-2025-24016 | Wazuh Server Deserialization of Untrusted Data Vulnerability | secondary_impact | T1203 | Exploitation for Client Execution |
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
|
CVE-2025-24016 | Wazuh Server Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1078 | Valid Accounts |
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
|
CVE-2025-24016 | Wazuh Server Deserialization of Untrusted Data Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
Attackers with API access have been reported as exploiting this vulnerability through a JSON payload sent to a Wazuh worker server. Requests relayed to the master server can result in arbitrary code execution.
References
|
CVE-2025-53770 | Microsoft SharePoint Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This deserialization vulnerability in Microsoft SharePoint allows an unauthenticated remote attacker to execute remote code on the network.
References
|
CVE-2025-53770 | Microsoft SharePoint Deserialization of Untrusted Data Vulnerability | exploitation_technique | T1059 | Command and Scripting Interpreter |
Comments
This deserialization vulnerability in Microsoft SharePoint allows an unauthenticated remote attacker to execute remote code on the network.
References
|
CVE-2025-42999 | SAP NetWeaver Deserialization Vulnerability | exploitation_technique | T1190 | Exploit Public-Facing Application |
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
|
CVE-2025-42999 | SAP NetWeaver Deserialization Vulnerability | exploitation_technique | T1203 | Exploitation for Client Execution |
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
|
CVE-2025-42999 | SAP NetWeaver Deserialization Vulnerability | primary_impact | T1059 | Command and Scripting Interpreter |
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
|
CVE-2025-42999 | SAP NetWeaver Deserialization Vulnerability | secondary_impact | T1505.003 | Web Shell |
Comments
This deserialization vulnerability in NetWeaver Visual Composer, when chained with CVE-2025-31324, allows an attacker to execute unauthenticated remote code with administrator privileges, leading to consequences such as web shell deployment.
References
|