heroui logo

Audit CVE Event

Sigma Rules

View Source
Summary
This detection rule identifies events associated with potential exploits of known vulnerabilities by monitoring calls to the CveEventWrite API made by user-mode applications. Initially introduced in January 2020, this auditing mechanism became particularly relevant with the discovery of CVE-2020-0601, a significant vulnerability in the Windows CryptoAPI that was exploited in various cyber attacks. The rule focuses on specific event logs generated by the Microsoft-Windows-Audit-CVE provider, particularly EventID 1, which denotes an indication of a CVE-related event. As the landscape of vulnerabilities evolves, this rule serves as a critical alerting mechanism for security teams to timely respond to typical exploit attempts. It is essential for detecting actions that may lead to privilege escalation, credential theft, or other malicious activities within the Windows environment.
Categories
  • Windows
  • Endpoint
  • Cloud
Data Sources
  • Application Log
Created: 2020-01-15