CVE [7.2]
CVE ID (for example, CVE-1999-0003) from vulnerability scan data.
This field is not available in LogRhythm versions earlier than 7.2.1.
Data Type
String (64 characters maximum)
Aliases
Use | Alias |
---|---|
Client Console Full Name | Not applicable |
Client Console Short Name | Not applicable |
Web Console Tab/Name | Classification/CVE |
Elasticsearch Field Name | cve |
Rule Builder Column Name | CVE |
Regex Pattern | <cve> |
NetMon Name | Not applicable |
Field Relationships
- Object (prior parsing for CVE)
- VMID (prior parsing for CVE)
- Threat Name
- VMID
Common Applications
- Vulnerability scanners
- F5
- Qualys
- IDS (Bro, Snort)
- NGFW (Palo Alto, Check Point)
Use Case
- Cross referencing threat feeds.
- Finding an entry point for an attack.
- Locating what is vulnerable to CVE and what is the impact if exposed.
MPE/Data Masking Manipulations
Not applicable.
Usage Standards
- Use most common format standard CVE-YYYY-#######.
- A malformed CVE can be represented as CVE-MAP-NOMATCH. Parse that as a valid CVE because that is what the log message says.
Examples
- Symantec Endpoint Protection
05 23 2014 20:21:58 1.1.1.1 <LPTR:CRIT> May 23 20:07:35 SymantecServer USABLDRRECFLOW01: USABLDRRECFLOW01,[SID: 27517] Attack: OpenSSL Heartbleed CVE-2014-0160 3 attack blocked. Traffic has been blocked for this application: SYSTEM,Local: 1.1.1.1,Local: 000000000000,Remote: ,Remote: 1.1.1.1,Remote: 000000000000,Inbound,TCP,Intrusion ID: 0,Begin: 2014-05-23 19:48:52,End: 2014-05-23 19:48:52,Occurrences: 1,Application: SYSTEM,Location: Coprorate Network,User: pete.store,Domain: safaware,Local Port 443,Remote Port 52901,CIDS Signature ID: 27517,CIDS Signature string: Attack: OpenSSL Heartbleed CVE-2014-0160 3,CIDS Signature SubID: 73036,Intrusion URL: ,Intrusion Payload URL:
CVE-2014-0160 parsed into CVE.
- Cb Response
05 18 2016 09:51:39 1.1.1.1 <USER:NOTE> LEEF:1.0|CB|CB|511|feed.storage.hit.binary|alliance_data_nvd=["10473","10472","10475","10470","10435"] alliance_link_nvd=http://web.nvd.nist.gov/view/vuln/detail?vulnId\=CVE-2013-3353 alliance_score_nvd=100 alliance_updated_nvd=2015-08-03T23:55:33.000Z cb_server=cbserver cb_version=511 company_name=Adobe Systems Incorporated computer_name= USABLDRRECFLOW01 copied_mod_len=7790179 digsig_result=Unsigned digsig_result_code=2148204800 endpoint=[" USABLDRRECFLOW01|26"," USABLDRRECFLOW01|13"," USABLDRRECFLOW01|39"," USABLDRRECFLOW01|35"," USABLDRRECFLOW01|14"] feed_id=13 feed_name=nvd file_desc=Adobe Acrobat Annot Plug-In file_version=1.1.1.1 group=RecordFlow HQ host_count=5 hostname= USABLDRRECFLOW01 ioc_attr={} ioc_type=md5 ioc_value=4c6b53d9f75cb772e43f65960f905919 is_64bit=false is_executable_image=false last_seen=2016-05-18T00:01:11.682Z legal_copyright=Copyright 1984-2012 Adobe Systems Incorporated and its licensors. All rights reserved. md5=59E0D058686BD35B0D5C02A4FD8BD0E0 observed_filename=["c:\\program files (x86)\\adobe\\reader 11.0\\reader\\plug_ins\\annots.api"] orig_mod_len=7790179 original_filename=Annot.api os_type=Windows product_name=Adobe Acrobat Annot product_version=1.1.1.1 report_id=10435 report_score=100 sensor_id=14 server_added_timestamp=2016-05-17T15:26:48.469Z server_name=localhost.localdomain timestamp=1463589930.842 type=feed.storage.hit.binary watchlist_4=2016-05-17T15:30:03.182Z
CVE parsed into CVE field from URL (may not be sustainable). Not predictable enough to parse.
- ForcePoint
10 28 2016 15:22:15 1.1.1.1 <KERN:INFO> CEF:0|FORCEPOINT|Alert|unknown|278069|HTTP_SHS-Microsoft-Windows-MHTML-Information-Disclosure-CVE-2011-0096-3|7|spt=3811 destinationServiceName=HTTP deviceExternalId=Davestown node 2 dst=1.1.1.1 requestMethod=POST cat=Potential Compromise requestURL=Host2 app=tcp_service_5080 rt=Oct 28 2016 15:22:14 deviceFacility=Inspection destinationTranslatedPort=5080 sourceTranslatedPort=3811 destinationTranslatedAddress=1.1.1.1 sourceTranslatedAddress=1.1.1.1 act=Permit deviceOutboundInterface=2 proto=6 dpt=5080 src=1.1.1.1 dvc=1.1.1.1 dvchost=1.1.1.1 cs1Label=RuleId cs1=1073.1
CVE showing inline within CEF vendor info. Full header could be VMID or VendorInfo.
- McAfee Network Security Manager
03 27 2014 08:29:30 1.1.1.1 <SAU1:WARN> Mar 27 08:29:35 SyslogAlertForwarder: 2014-03-27 08:29:32 EDT!N/A!N/A!22222222222!0x4510fa00!Signature!Medium!Medium!Unknown!Exploit!code-execution!Inbound!Inconclusive!1.1.1.1!1.1.1.1!80!24683!http!tcp!BBQ!BBQ!Proxy Traffic (8A-8B)!signature!CVE-2013-3861!Not Forwarded!Unknown!No error!Unknown!HTTP: JSON Parsing Vulnerability
CVE within exclamation delimiters.