Hey there Gregory,
Thank you for the additional information. Would it be possible to provide guidance here in this forum thread for creating these rules for endpoints in an environment?
Additionally, what did you mean by "Power over looked tools.", sorry?
Thank you for your time
Original Message:
Sent: Apr 14, 2022 09:56 AM
From: Gregory Anderson
Subject: CVE-2022-26809 - definitions/response from Broadcom
This is an RCE attack or vulnerability, this means that Host Firewall and HIPS signatures are the first line of defense.
SOnar and Bloodhound are local File execution and process behavior driven.
I can show you how to create these rules for your endpoints, I current have 80,000 end point running Host FW and HIPS, with some custom HIPS also. Power over looked tools.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809
Original Message:
Sent: Apr 13, 2022 08:27 AM
From: Simon Steven
Subject: CVE-2022-26809 - definitions/response from Broadcom
Hi,
Has Broadcom provided definitions or a response for this CVE or the other zero days, i.e. if not certified defs will SONAR pick this up?