CISA KEV 集成

编辑

版本

1.4.0 (查看全部)

兼容的 Kibana 版本

8.13.0 或更高版本

支持的无服务器项目类型
这是什么?

安全
可观测性

订阅级别
这是什么?

基本

支持级别
这是什么?

社区

此集成用于 CISA KEV 日志。根据 CISA 的说法,这些数据对于当前了解已知被利用的漏洞以及丰富 Elastic Stack 中的其他漏洞扫描数据非常有用。该集成会定期检查最新的 CISA KEV 列表。它包括以下数据集,用于从 CISA KEV 网站检索日志

  • vulnerability 数据集:支持 CISA 分类为已知被利用的漏洞。

示例富集策略和 ES|QL 相关查询

编辑

可以创建富集策略,以便根据 CVE 编号丰富其他漏洞信息。

在安装集成后,可以使用以下请求来创建和执行富集策略

PUT /_enrich/policy/enrich_cve_with_context_cisa_kev
{
  "match": {
    "indices": ".ds-logs-cisa_kevs.vulnerability-*",
    "match_field": "vulnerability.id",
    "enrich_fields": ["cisa_kev.vulnerability.date_added", "cisa_kev.vulnerability.due_date", "cisa_kev.vulnerability.known_ransomware_campaign_use", "cisa_kev.vulnerability.name", "cisa_kev.vulnerability.notes","cisa_kev.vulnerability.product","cisa_kev.vulnerability.required_action","cisa_kev.vulnerability.vendor_project"]
  }
}

PUT /_enrich/policy/enrich_cve_with_context_cisa_kev/_execute

这是一个示例 ES|QL 查询,它使用 logs-nessus.vulnerability* 的索引模式来使用 CISA KEV 信息丰富数据源,并保留前 10 个结果。请注意,必须首先创建富集策略(如上所示)

from logs-nessus.vulnerability*
| where vulnerability.id IS NOT NULL
| keep vulnerability.*, nessus.plugin.name, host.name
| enrich enrich_cve_with_context_cisa_kev with cisa_kev.vulnerability.due_date, cisa_kev.vulnerability.known_ransomware_campaign_use, cisa_kev.vulnerability.name, cisa_kev.vulnerability.notes, cisa_kev.vulnerability.product, cisa_kev.vulnerability.required_action, cisa_kev.vulnerability.vendor_project, cisa_kev.vulnerability.date_added
| where cisa_kev.vulnerability.name IS NOT NULL
| stats count = COUNT(host.name) BY nessus.plugin.name, vulnerability.severity, cisa_kev.vulnerability.date_added, cisa_kev.vulnerability.product
| sort count desc
| keep nessus.plugin.name, vulnerability.severity, cisa_kev.vulnerability.product, cisa_kev.vulnerability.date_added, count
| limit 10

日志

编辑

漏洞

编辑

CISA KEV data_stream 从端点 https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json 检索漏洞信息。

示例

以下是 vulnerability 的示例事件

{
    "@timestamp": "2024-02-15T00:00:00.000Z",
    "agent": {
        "ephemeral_id": "39957f93-aff4-4e3f-84f0-66d18441ccd6",
        "id": "7edf8be5-ad5d-4c57-a6bd-b86bddc66601",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.12.2"
    },
    "cisa_kev": {
        "vulnerability": {
            "date_added": "2024-02-15",
            "due_date": "2024-03-07",
            "known_ransomware_campaign_use": "Known",
            "name": "Cisco ASA and FTD Information Disclosure Vulnerability",
            "notes": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB",
            "product": "Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)",
            "required_action": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
            "vendor_project": "Cisco"
        }
    },
    "data_stream": {
        "dataset": "cisa_kevs.vulnerability",
        "namespace": "ep",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "7edf8be5-ad5d-4c57-a6bd-b86bddc66601",
        "snapshot": false,
        "version": "8.12.2"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "vulnerability"
        ],
        "created": "2024-03-13T01:01:09.893Z",
        "dataset": "cisa_kevs.vulnerability",
        "ingested": "2024-03-13T01:01:21Z",
        "kind": "enrichment",
        "original": "{\"cveID\":\"CVE-2020-3259\",\"dateAdded\":\"2024-02-15\",\"dueDate\":\"2024-03-07\",\"knownRansomwareCampaignUse\":\"Known\",\"notes\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-info-disclose-9eJtycMB\",\"product\":\"Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD)\",\"requiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"shortDescription\":\"Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations.\",\"vendorProject\":\"Cisco\",\"vulnerabilityName\":\"Cisco ASA and FTD Information Disclosure Vulnerability\"}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "cisa-kev"
    ],
    "vulnerability": {
        "description": "Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) contain an information disclosure vulnerability. An attacker could retrieve memory contents on an affected device, which could lead to the disclosure of confidential information due to a buffer tracking issue when the software parses invalid URLs that are requested from the web services interface. This vulnerability affects only specific AnyConnect and WebVPN configurations.",
        "id": "CVE-2020-3259"
    }
}
导出的字段
字段 描述 类型

@timestamp

事件时间戳。

日期

cisa_kev.vulnerability.date_added

漏洞以 YYYY-MM-DD 格式添加到目录的日期

日期

cisa_kev.vulnerability.due_date

所需操作的到期日期,格式为 YYYY-MM-DD

日期

cisa_kev.vulnerability.known_ransomware_campaign_use

如果已知此漏洞已被用作勒索软件活动的一部分,则为已知;如果 CISA 缺乏确认该漏洞已用于勒索软件的证据,则为未知

关键字

cisa_kev.vulnerability.name

漏洞的名称

关键字

cisa_kev.vulnerability.notes

有关漏洞的任何其他注释

关键字

cisa_kev.vulnerability.product

漏洞产品

关键字

cisa_kev.vulnerability.required_action

解决漏洞所需的措施

关键字

cisa_kev.vulnerability.vendor_project

漏洞的供应商或项目名称

关键字

data_stream.dataset

数据流数据集。

常量关键字

data_stream.namespace

数据流命名空间。

常量关键字

data_stream.type

数据流类型。

常量关键字

input.type

Filebeat 输入的类型。

关键字

变更日志

编辑
变更日志
版本 详细信息 Kibana 版本

1.4.0

增强 (查看拉取请求)
将“preserve_original_event”标签添加到 event.kind 设置为“pipeline_error”的文档。

8.13.0 或更高版本

1.3.1

错误修复 (查看拉取请求)
在引用摄取管道中的变量时,使用三重大括号 Mustache 模板。

8.13.0 或更高版本

1.3.0

增强 (查看拉取请求)
允许 @custom 管道访问 event.original,而无需设置 preserve_original_event。

8.13.0 或更高版本

1.2.0

增强 (查看拉取请求)
将 kibana 约束更新为 ^8.13.0。修改了字段定义,以删除 ecs@mappings 组件模板中冗余的 ECS 字段。

8.13.0 或更高版本

1.1.0

增强 (查看拉取请求)
改进了对空响应的处理。

8.11.4 或更高版本

1.0.1

错误修复 (查看拉取请求)
更新徽标以与 Elastic 集成页面对齐,修复描述措辞

8.11.4 或更高版本

1.0.0

增强 (查看拉取请求)
将富集/ES|QL 示例添加到 Readme,使其成为 GA。

8.11.4 或更高版本

0.1.0

增强 (查看拉取请求)
该软件包的初始草案