Potential CVE-2023-27997 Exploitation Indicators
Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs. To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter
Sigma rule (View on GitHub)
1title: Potential CVE-2023-27997 Exploitation Indicators
2id: 31e4e649-7394-4fd2-9ae7-dbc61eebb550
3status: experimental
4description: |
5 Detects indicators of potential exploitation of CVE-2023-27997 in Frotigate weblogs.
6 To avoid false positives it is best to look for successive requests to the endpoints mentioned as well as weird values of the "enc" parameter
7references:
8 - https://blog.lexfo.fr/Forensics-xortigate-notice.html
9 - https://blog.lexfo.fr/xortigate-cve-2023-27997.html
10 - https://research.kudelskisecurity.com/2023/06/12/cve-2023-27997-fortigate-ssl-vpn/
11 - https://labs.watchtowr.com/xortigate-or-cve-2023-27997/
12author: Sergio Palacios Dominguez, Nasreddine Bencherchali (Nextron Systems)
13date: 2023/07/28
14tags:
15 - cve.2023.27997
16 - attack.initial_access
17 - attack.t1190
18logsource:
19 category: webserver
20detection:
21 selection_uri:
22 cs-method:
23 - 'GET'
24 - 'POST'
25 cs-uri-query|contains:
26 - '/remote/hostcheck_validate'
27 - '/remote/logincheck'
28 selection_keywords:
29 - 'enc='
30 condition: all of selection_*
31falsepositives:
32 - Unknown
33level: medium
References
Related rules
- ADSelfService Exploitation
- Apache Threading Error
- JNDIExploit Pattern
- Java Payload Strings
- Potential Exploitation Attempt Of Undocumented WindowsServer RCE