ThreatPulse — April 19, 2026 | 0 threats, personalised for you
ThreatPulse — April 19, 2026
Personalised for Demo User | Soc Analyst | Detection: KQL
CVE-2025-61882 (NetVanguard-cmd) is a critical vulnerability with a CVSS score of 9.8 affecting multiple platforms including Windows, Azure, and Docker environments. Detection should focus on identifying exploitation attempts through command execution patterns and suspicious process activity associated with vulnerable NetVanguard components.
Detection Query (KQL)DeviceProcessEvents | where ProcessCommandLine contains "netvanguard" or ProcessCommandLine contains "netguard" or ProcessCommandLine matches regex @"(?i)(netvanguard|netguard).*cmd" | where InitiatingProcessName !in ("explorer.exe", "svchost.exe") | project Timestamp, DeviceName, ProcessId, ProcessCommandLine, InitiatingProcessName, InitiatingProcessId, AccountName | union (SecurityEvent | where EventID == 4688 and (CommandLine contains "netvanguard" or CommandLine contains "netguard") | project TimeGenerated, Computer, NewProcessId, CommandLine, ParentProcessName, SubjectUserName)
Detection Logic
Monitor for process creation events containing NetVanguard-cmd references in command lines, focusing on suspicious parent processes and execution contexts. Cross-reference Windows Security Event logs (EventID 4688) and Microsoft Defender for Endpoint process events to identify exploitation attempts. Alert on any execution from non-standard locations or by unexpected service accounts.
Affected ProductsWindows, Azure, Docker, VMware, Cisco, Chrome, Python, Office365
ATT&CK TechniquesT1059.001, T1190, T1203
False Positive NotesLegitimate NetVanguard administrative tools may trigger alerts; whitelist known administrative accounts and scheduled maintenance windows. Filter out expected system processes and legitimate security software. Tune based on organizational baseline of NetVanguard usage patterns. Consider excluding events from approved administrative workstations and change management systems.
CVE-2026-6560 is a critical remote buffer overflow vulnerability in H3C Magic B0 devices affecting the Edit_BasicSSID function in /goform/aspForm, with a CVSS score of 8.8. Detection should focus on identifying exploitation attempts targeting H3C devices through malicious web requests and subsequent process execution or network anomalies.
Detection Query (KQL)let timeframe = 7d; let h3c_indicators = dynamic(['Edit_BasicSSID', 'aspForm', 'goform']); union (DeviceNetworkEvents | where Timestamp > ago(timeframe) | where RemoteUrl has_any (h3c_indicators) or InitiatingProcessCommandLine has_any (h3c_indicators) | project Timestamp, DeviceId, DeviceName, RemoteIP, RemoteUrl, RemotePort, InitiatingProcessFileName, InitiatingProcessCommandLine, ActionType), (DeviceProcessEvents | where Timestamp > ago(timeframe) | where ProcessCommandLine has_any (h3c_indicators) or FolderPath has_any (h3c_indicators) | project Timestamp, DeviceId, DeviceName, ProcessCommandLine, ProcessId, FileName, FolderPath, AccountName, ActionType), (SecurityEvent | where TimeGenerated > ago(timeframe) | where Activity has_any (h3c_indicators) or CommandLine has_any (h3c_indicators) | project TimeGenerated, Computer, Activity, CommandLine, Account, EventID) | where ActionType !in ('ProcessTerminated', 'NetworkConnectionTerminated') or Activity !has 'Success' | limit 1000
Detection Logic
Monitor for HTTP requests containing Edit_BasicSSID, aspForm, or goform path indicators targeting H3C devices. Correlate with subsequent suspicious process creation, command execution, or unexpected network connections from affected devices. Focus on remote connection attempts to H3C management interfaces and buffer overflow exploitation patterns in request payloads.
Affected ProductsH3C Magic B0, H3C Magic B0 100R002
ATT&CK TechniquesT1190, T1133, T1071
False Positive NotesLegitimate H3C device management traffic and administrative configuration changes may trigger alerts; whitelist known H3C management IPs and scheduled maintenance windows. Filter out normal device firmware update processes and authenticated administrative sessions. Exclude internal network scanning and vulnerability assessment tools that may probe H3C devices.
CVE-2026-3055 is a critical vulnerability (CVSS 9.8) affecting NetVanguard-cmd with high exploitation probability (EPSS 55.7%). Detection should focus on identifying exploitation attempts and suspicious command execution patterns associated with this vulnerability.
Detection Query (KQL)DeviceProcessEvents | where ProcessCommandLine contains "netvanguard" or ProcessCommandLine matches regex @"(?i)(netvanguard|cve.?2026.?3055)" | where InitiatingProcessName !in ("explorer.exe", "svchost.exe") | project Timestamp, DeviceName, AccountName, ProcessCommandLine, InitiatingProcessName, InitiatingProcessId | union (SecurityEvent | where EventID == 4688 and CommandLine contains "netvanguard" | project TimeGenerated, Computer, Account, CommandLine, ParentProcessName) | union (CommonSecurityLog | where Activity contains "NetVanguard" or RequestURL contains "netvanguard" | project TimeGenerated, SourceIP, DestinationIP, Activity, RequestURL)
Detection Logic
Monitor for process creation events containing 'netvanguard' or CVE-2026-3055 references in command lines, excluding legitimate system processes. Cross-correlate with network logs for suspicious communication patterns and web requests related to the vulnerability.
Affected ProductsNetVanguard-cmd, Windows, Azure, Office365
ATT&CK TechniquesT1190, T1059
False Positive NotesLegitimate NetVanguard administrative tools and updates may trigger alerts; whitelist known administrative accounts and scheduled maintenance windows. Filter out benign security scanning tools that may reference CVE identifiers in logs.
union DeviceNetworkEvents, CloudAppEvents
| where RemoteUrl has "owntracks" or RemoteUrl has "logtracks" or InitiatingProcessFileName has "django"
| where ActionType in ("ConnectionSuccess", "ConnectionAttempted") or isnotempty(RemoteUrl)
| project Timestamp, DeviceName, RemoteUrl, RemoteIP, InitiatingProcessFileName, AccountName
| where Timestamp > ago(7d)
| limit 1000
CloudAppEvents
| where Timestamp > ago(7d)
| where ObjectName has "owntracks" or ObjectName has "logtracks"
| where RawEventData has_any ("401", "403") == false
| where RawEventData !has "Authorization" or RawEventData !has "Cookie"
| project Timestamp, AccountName, ObjectName, IPAddress, UserAgent, RawEventData
| limit 1000
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName has_any ("python", "django", "uwsgi", "gunicorn")
| where ProcessCommandLine has_any ("bash", "cmd", "powershell", "sh", "/bin/")
| project Timestamp, DeviceName, InitiatingProcessFileName, ProcessCommandLine, AccountName, ProcessId
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has "/public/install/lp.sql" or RemoteUrl has "/public/install/" and InitiatingProcessFileName has_any ("curl", "wget", "powershell", "python")
| project Timestamp, DeviceName, RemoteUrl, RemoteIP, InitiatingProcessFileName, InitiatingProcessCommandLine
| limit 1000
DeviceFileEvents
| where Timestamp > ago(7d)
| where FolderPath has_any ("/public/install", "\\public\\install") and FileName has_any ("lp.sql", "install.sql")
| where ActionType in ("FileCreated", "FileModified", "FileRenamed")
| project Timestamp, DeviceName, FolderPath, FileName, InitiatingProcessFileName, InitiatingProcessCommandLine, ActionType
| limit 1000
DeviceProcessEvents
| where Timestamp > ago(7d)
| where ProcessCommandLine has_any ("sql", "credential", "password", "key") and (InitiatingProcessFileName has_any ("apache", "nginx", "iis", "php") or FolderPath has "/public/")
| project Timestamp, DeviceName, ProcessCommandLine, ProcessId, InitiatingProcessFileName, AccountName, ProcessIntegrityLevel
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has "/app/controller/share.class.php" or RemoteUrl has "fileGet"
| where ActionType == "ConnectionSuccess" or ActionType == "ConnectionAttempted"
| project Timestamp, DeviceName, RemoteUrl, RemoteIP, InitiatingProcessFileName, InitiatingProcessCommandLine
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl matches regex @"(?i)(fileGet|fileUrl|share\.class\.php)" and RemoteUrl contains "fileUrl="
| where RemoteIPType == "Public" or RemoteIPType == "Internet"
| summarize AccessCount=count(), UniqueIPs=dcount(RemoteIP), UniqueDevices=dcount(DeviceName) by RemoteUrl, InitiatingProcessFileName
| where AccessCount > 5
| limit 1000
DeviceProcessEvents
| where Timestamp > ago(7d)
| where ProcessCommandLine has_any ("kodexplorer", "share.class.php", "fileGet") or FolderPath has "kodexplorer"
| where ProcessCommandLine contains "fileUrl" or ProcessCommandLine contains "improper"
| project Timestamp, DeviceName, ProcessCommandLine, AccountName, ProcessId, ParentProcessFileName
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has_any ("share.class.php", "/app/controller/share.class.php")
| where RemoteUrl matches regex @"(\.\./|\.\.\\|%2e%2e|path=.*\.\./)"
| project Timestamp, DeviceName, RemoteIP, RemoteUrl, InitiatingProcessFileName
| limit 1000
DeviceFileEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName in~ ("php.exe", "php-cgi.exe", "w3wp.exe", "httpd.exe")
| where FolderPath matches regex @"(\.\.\/|\.\.\\|%2e%2e)" or FolderPath has_any ("/etc/", "c:\\windows\\", "c:\\winnt\\")
| where ActionType in ("FileCreated", "FileModified", "FileRead")
| project Timestamp, DeviceName, InitiatingProcessFileName, FolderPath, FileName, ActionType
| limit 1000
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName in~ ("php.exe", "php-cgi.exe", "w3wp.exe", "httpd.exe")
| where ProcessCommandLine matches regex @"(cmd|powershell|bash|sh|nc|curl|wget)" or FileName in~ ("cmd.exe", "powershell.exe", "bash", "sh")
| project Timestamp, DeviceName, InitiatingProcessFileName, ProcessCommandLine, FileName, ProcessId
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemoteUrl has "/index/Search/index.html"
| where InitiatingProcessFileName in~ ("chrome.exe", "firefox.exe", "iexplore.exe", "msedge.exe", "curl.exe", "powershell.exe")
| where RemoteUrl matches regex @"(?i)(keyword|search).*(\bunion\b|\bselect\b|\bfrom\b|\bwhere\b|--|;|'|\")"
| project Timestamp, DeviceName, RemoteIP, RemoteUrl, InitiatingProcessFileName, InitiatingProcessCommandLine
| limit 1000
union
(SecurityEvent | where EventID == 4688 and CommandLine has "dameng" or CommandLine has "muucmf"),
(DeviceProcessEvents | where ProcessCommandLine has "dameng" or ProcessCommandLine has "muucmf" or FolderPath has "dameng")
| where Timestamp > ago(7d)
| where ProcessCommandLine matches regex @"(?i)(keyword|search).*(\bunion\b|\bselect\b|\bfrom\b|--|;|')"
| project Timestamp, DeviceName, AccountName, ProcessCommandLine, ProcessId
| limit 1000
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName in~ ("java.exe", "dameng.exe", "muucmf.exe")
| where RemoteIPType == "Public"
| where RemotePort in (3306, 5432, 1433, 27017, 6379)
| summarize ConnectionCount=count(), UniqueRemoteIPs=dcount(RemoteIP), RemoteIPList=make_set(RemoteIP) by DeviceName, InitiatingProcessFileName, RemotePort
| where ConnectionCount > 5
| limit 1000
ThreatPulse — Automated Threat Intelligence
Unsubscribe |
Update Preferences