From 97e56c77db8ea95192d4756419fe07d9787259cb Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Sun, 29 Jan 2023 14:18:39 -0500 Subject: [PATCH] Enhancement: technologies/sonicwall-email-security-detect.yaml by mp --- technologies/sonicwall-email-security-detect.yaml | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/technologies/sonicwall-email-security-detect.yaml b/technologies/sonicwall-email-security-detect.yaml index 802d6d9597..f53cc5f2ba 100644 --- a/technologies/sonicwall-email-security-detect.yaml +++ b/technologies/sonicwall-email-security-detect.yaml @@ -1,9 +1,14 @@ id: sonicwall-email-security-detect info: - name: SonicWall Email Security Detection + name: SonicWall Email Security Panel - Detect author: gy741 severity: info +description: SonicWall Email Security panel was detected. + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N + cvss-score: 0.0 + cwe-id: CWE-200 reference: - https://www.fireeye.com/blog/threat-research/2021/04/zero-day-exploits-in-sonicwall-email-security-lead-to-compromise.html - https://www.sonicwall.com/support/product-notification/security-notice-sonicwall-email-security-zero-day-vulnerabilities/210416112932360/ @@ -18,3 +23,5 @@ requests: - type: dsl dsl: - "status_code==200 && (\"2063459123\" == mmh3(base64_py(body)))" + +# Enhanced by mp on 2023/01/29