Detection rules › Sigma

Audit CVE Event

Severity
critical
Author
Florian Roth (Nextron Systems), Zach Mathis
Source
upstream

Detects events generated by user-mode applications when they call the CveEventWrite API when a known vulnerability is trying to be exploited. MS started using this log in Jan. 2020 with CVE-2020-0601 (a Windows CryptoAPI vulnerability. Unfortunately, that is about the only instance of CVEs being written to this log.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1203 Exploitation for Client Execution
Privilege EscalationT1068 Exploitation for Privilege Escalation
Defense EvasionT1211 Exploitation for Defense Evasion
Credential AccessT1212 Exploitation for Credential Access
Lateral MovementT1210 Exploitation of Remote Services
ImpactT1499.004 Endpoint Denial of Service: Application or System Exploitation

Event coverage

ProviderEvent IDTitle
Audit-CVE1Possible detection of CVE: PossibleDetectionOfCVE.

Stages and Predicates

Stage 1: selection

Provider_Name: [Audit-CVE, Microsoft-Windows-Audit-CVE]

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Provider_Nameeq
  • Audit-CVE
  • Microsoft-Windows-Audit-CVE