
Summary
The Rapid7 Threat Command CVEs Correlation rule is designed to identify vulnerabilities present in a customer's environment by correlating them with Common Vulnerabilities and Exposures (CVEs) sourced from the Rapid7 Threat Command Integration. This rule initiates a check against CVEs collected over the past 180 days to identify any matches with local observations within the relevant indices. It is structured to run every 30 minutes and allows for the detection of critical vulnerabilities, given its high risk score of 99. When a vulnerability is matched, enriched fields are generated to provide detailed information about the nature of the vulnerability, including the matched atomic vulnerability, field, and type. Additional investigation is recommended to review the activity linked to the alerts, considering factors such as user roles, historical activity, and the context surrounding the vulnerabilities. The setup of this rule requires threat intelligence indicators, which can be obtained through various Elastic Agent integrations. The rule is configured for a maximum of 10,000 alerts per execution, surpassing the default to ensure comprehensive capture of relevant alerts.
Categories
- Network
- Endpoint
- Windows
- Cloud
- Application
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
Created: 2024-05-29