← Back to Cybersecurity News Center
Severity
CRITICAL
Priority
0.565
×
Tip
Pick your view
Analyst for full detail, Executive for the short version.
Analyst
Executive
Executive Summary
A critical unauthenticated remote code execution vulnerability (CVE-2026-45829) has been identified in ChromaDB's Python FastAPI server, affecting versions 1.0.0 through 1.5.8. Any attacker with network access to an exposed ChromaDB instance can execute arbitrary code on the server before authentication is ever checked, with no credentials required. Organizations using ChromaDB in AI pipelines or vector search infrastructure face complete server compromise; no confirmed vendor patch exists as of 2026-03-04.
Impact Assessment
CISA KEV Status
Not listed
Attack Vector
HIGH
Exploitable remotely over the internet
Complexity
HIGH
No special conditions required to exploit
Authentication
HIGH
No credentials needed — anyone can attempt
User Interaction
HIGH
Fully automated — no user action needed
Active Exploitation
LOW
No confirmed active exploitation
Affected Product
INFO
ChromaDB Python FastAPI server, versions 1.0.0 through 1.5.8 (PyPI package); Rust frontend not affected
Are You Exposed?
⚠
You use ChromaDB Python FastAPI server, versions 1.0.0 through 1.5.8 (PyPI package); Rust frontend not affected → Investigate immediately
⚠
Affected systems are internet-facing → Increased attack surface
✓
You have patched to the latest version → Reduced risk
✓
Systems are behind network segmentation / WAF → Mitigated exposure
Assessment estimated from CVSS base score (no vector available)
Business Context
ChromaDB is widely used as a vector database in AI and machine learning applications; a compromised ChromaDB server gives an attacker full control of that host, including access to any data stored in or passing through the vector database. Depending on what the affected server connects to, the blast radius extends to AI pipeline data, proprietary embeddings, and any downstream systems reachable from the compromised host. With no patch available and a large proportion of deployed instances reportedly still vulnerable, organizations running internet-exposed ChromaDB installations face immediate risk of server takeover with no vendor-provided fix to point to for remediation timelines.
You Are Affected If
You run ChromaDB Python FastAPI server versions 1.0.0 through 1.5.8 installed via PyPI (pip show chromadb to verify version)
Your ChromaDB instance is internet-facing or reachable from untrusted network segments without strict firewall controls
You have not placed an IPS or WAF between untrusted networks and your ChromaDB service port (default 8000/TCP)
Hugging Face model-loading functionality is enabled and the ChromaDB host has outbound internet access to huggingface.co
No patch has been applied — no confirmed vendor patch exists as of 2026-03-04; monitor ChromaDB release channels for updates
Board Talking Points
A critical, unpatched vulnerability in ChromaDB — a component used in many AI applications — allows any external attacker to take full control of an affected server without needing credentials.
Security teams should immediately block external access to ChromaDB servers and monitor for a vendor patch, with a target of completing containment within 24 hours of awareness.
Without containment, an attacker who exploits this vulnerability gains the same level of access as your own administrators, potentially exposing AI pipeline data and connected internal systems.
Technical Analysis
CVE-2026-45829 affects ChromaDB Python FastAPI server versions 1.0.0 through 1.5.8 (PyPI).
The Rust frontend is not affected.
The vulnerability chain involves four weaknesses: improper authentication (CWE-287), incorrect authorization (CWE-863), inclusion of functionality from an untrusted control sphere (CWE-829), and improper control of code generation (CWE-94).
The attack path allows a remote, unauthenticated attacker to force the ChromaDB server to load and execute a malicious model from Hugging Face before any authentication check is performed, resulting in arbitrary code execution on the host. CVSS base score is 9.5 pending NVD confirmation. EPSS score is 0.00139 (33rd percentile), indicating low observed exploitation probability at time of scoring, though this metric lags real-world activity. The CVE is not listed in CISA KEV as of 2026-03-04. No confirmed patch or vendor advisory has been issued. The 2026 CVE year and absence from NVD at time of writing warrant independent verification at https://nvd.nist.gov/vuln/detail/CVE-2026-45829 and https://www.cve.org/CVERecord?id=CVE-2026-45829 before acting on CVSS or patch status claims. Relevant MITRE ATT&CK techniques: T1190 (Exploit Public-Facing Application), T1203 (Exploitation for Client Execution), T1105 (Ingress Tool Transfer), T1059 /T1059.006 (Command and Scripting Interpreter: Python), T1071 (Application Layer Protocol), T1195.001 /T1195.002 (Supply Chain Compromise). Approximately 73% of internet-exposed instances are reported to remain on a vulnerable version [T3 source, indicative]; this figure should be treated as directional, not authoritative.
Action Checklist IR ENRICHED
Triage Priority:
IMMEDIATE
Escalate to CISO and legal/privacy counsel immediately if FastAPI access logs show any external-origin requests to model-loading endpoints during the exposure window, if the ChromaDB host had access to PII, PHI, or regulated data (triggering breach notification timelines under GDPR Art. 33, HIPAA 45 CFR §164.410, or applicable state laws), or if the responding team lacks the capability to perform memory forensics or Python runtime analysis on a potentially compromised host.
1
Step 1: Containment, Immediately restrict network access to all ChromaDB Python FastAPI server instances (versions 1.0.0-1.5.8). Block inbound connections to ChromaDB's default port (8000/TCP) at the perimeter firewall or security group level. If the service is internet-facing with no WAF or IPS, take it offline until remediation is confirmed. Do not rely on application-layer controls given the pre-authentication nature of the flaw.
IR Detail
Containment
NIST 800-61r3 §3.3 — Containment Strategy
NIST IR-4 (Incident Handling)
NIST SC-7 (Boundary Protection)
CIS 4.4 (Implement and Manage a Firewall on Servers)
CIS 12.2 — Establish and Maintain a Secure Network Architecture (IG2/IG3)
Compensating Control
On Linux hosts: run `sudo iptables -I INPUT -p tcp --dport 8000 -j DROP` immediately, then `sudo iptables-save > /etc/iptables/rules.v4` to persist. On Windows: `netsh advfirewall firewall add rule name='Block ChromaDB 8000' protocol=TCP dir=in localport=8000 action=block`. For cloud-deployed instances (AWS/GCP/Azure), remove or restrict the inbound security group / VPC firewall rule for port 8000 to 0.0.0.0/0 immediately. A 2-person team can execute all three in under 10 minutes without any SIEM or EDR tooling.
Preserve Evidence
Before blocking, capture a netstat snapshot to document all active inbound connections to port 8000/TCP: `ss -tnp sport = :8000 > /tmp/chromadb_connections_$(date +%Y%m%d%H%M%S).txt`. Also snapshot the running process tree of the ChromaDB FastAPI service: `ps auxf | grep -A 20 'uvicorn\|chromadb' > /tmp/chromadb_proctree.txt`. These preserve evidence of any active exploitation sessions or spawned child processes before the network cut.
2
Step 2: Detection, Audit all ChromaDB deployments for version (pip show chromadb). Review FastAPI access logs for unexpected POST or GET requests to model-loading endpoints (e.g., /api/v1/collections or any endpoint invoking Hugging Face model references) originating from external IPs. Look for anomalous outbound connections to huggingface.co or hf.co from ChromaDB host processes. Check host process trees for Python child processes spawned by the ChromaDB service outside of normal operation. Correlate with T1190 and T1059.006 detection logic in your SIEM.
IR Detail
Detection & Analysis
NIST 800-61r3 §3.2 — Detection and Analysis
NIST SI-4 (System Monitoring)
NIST AU-6 (Audit Record Review, Analysis, and Reporting)
NIST AU-3 (Content of Audit Records)
CIS 8.2 (Collect Audit Logs)
CIS 7.1 (Establish and Maintain a Vulnerability Management Process)
Compensating Control
Version audit: `pip show chromadb | grep Version` on each host; automate across fleet with `pdsh -g all_hosts 'pip show chromadb | grep Version'` or equivalent SSH loop. FastAPI log review — grep the uvicorn access log (default path: `~/.local/share/chroma/chroma.log` or stdout redirected to `/var/log/chromadb/access.log`): `grep -E '(POST|GET).*/api/v1.*(embed|model|load)' /var/log/chromadb/access.log | grep -v '10\.|172\.16\.|192\.168\.'` to isolate external-origin model-load requests. Outbound connection monitoring without EDR: deploy Sysmon with EventID 3 (Network Connection) filtering on the chromadb/uvicorn PID, then query: `Get-WinEvent -LogName 'Microsoft-Windows-Sysmon/Operational' | Where-Object {$_.Id -eq 3 -and $_.Message -match 'huggingface\.co|hf\.co'}`. On Linux: `auditctl -a always,exit -F arch=b64 -S connect -F ppid=$(pgrep -f uvicorn) -k chromadb_outbound` then review via `ausearch -k chromadb_outbound`. For child process detection (T1059.006), use Sysmon EventID 1 filtering parent process name matching 'uvicorn' or 'chromadb' with child process 'python' or 'sh' or 'bash'.
Preserve Evidence
Collect before analysis: (1) Full uvicorn/FastAPI stdout and stderr logs covering the exposure window — `journalctl -u chromadb --since '7 days ago' > /tmp/chromadb_journal.txt`. (2) Outbound DNS query logs from the host resolving huggingface.co or hf.co — check `/var/log/syslog` or `journalctl` for systemd-resolved entries, or run `tcpdump -nn -r /path/to/existing/pcap 'host huggingface.co'` if packet capture was active. (3) Python package cache and model download artifacts: `find ~/.cache/huggingface -newer /tmp/chromadb_install_timestamp -ls` — any model files downloaded after initial deployment without authorized model updates are exploitation artifacts specific to the Hugging Face model-loading vector of CVE-2026-45829.
3
Step 3: Eradication, No confirmed vendor patch exists as of 2026-03-04. Monitor the ChromaDB GitHub repository (https://github.com/chroma-core/chroma) and PyPI package page for a patched release. If a patch is released, upgrade immediately via pip install --upgrade chromadb and verify the installed version. Until a patch is available, consider disabling Hugging Face model-loading functionality at the network layer (block outbound to huggingface.co/hf.co from ChromaDB hosts) and enforce strict network segmentation so ChromaDB is not reachable from untrusted networks.
IR Detail
Eradication
NIST 800-61r3 §3.4 — Eradication
NIST SI-2 (Flaw Remediation)
NIST SI-3 (Malicious Code Protection)
NIST CM-6 (Configuration Settings)
CIS 7.3 (Perform Automated Operating System Patch Management)
CIS 7.4 (Perform Automated Application Patch Management)
CIS 2.2 (Ensure Authorized Software is Currently Supported)
Compensating Control
Until a vendor patch exists, implement a two-layer network eradication control: (1) Outbound DNS/IP block for Hugging Face model-loading — on Linux: `iptables -I OUTPUT -d 34.105.0.0/16 -j DROP && iptables -I OUTPUT -d 13.107.0.0/16 -j DROP` (verify current HF IP ranges via `dig huggingface.co` and `dig hf.co` first); also add `/etc/hosts` override: `echo '0.0.0.0 huggingface.co' >> /etc/hosts && echo '0.0.0.0 hf.co' >> /etc/hosts`. (2) Monitor PyPI for patch release without manual checking: use `pip index versions chromadb 2>/dev/null | head -1` in a cron job every 6 hours and alert on version string change above 1.5.8. If exploitation is confirmed and the host is compromised, do not patch-in-place — rebuild from a known-clean base image and restore ChromaDB configuration from pre-compromise backup, as a compromised Python runtime environment cannot be trusted after T1059.006 execution.
Preserve Evidence
Before eradication actions, preserve: (1) Full pip environment snapshot: `pip freeze > /tmp/pip_freeze_preremoval_$(date +%Y%m%d%H%M%S).txt` — establishes baseline of all installed packages, including any attacker-installed Python packages that may have been dropped via the RCE. (2) Hugging Face model cache contents and timestamps: `find ~/.cache/huggingface /tmp -name '*.bin' -o -name '*.safetensors' -o -name 'config.json' | xargs ls -la > /tmp/hf_cache_inventory.txt` — attacker-loaded models or payloads disguised as model files will appear here. (3) Filesystem changes since ChromaDB service start: `find / -newer /proc/$(pgrep -f uvicorn)/exe -not -path '/proc/*' -not -path '/sys/*' -ls 2>/dev/null > /tmp/fs_changes_since_service_start.txt` — new files written by the ChromaDB process are primary indicators of post-exploitation staging.
4
Step 4: Recovery, After applying any released patch, verify the installed version with pip show chromadb and confirm it falls outside the 1.0.0-1.5.8 range. Re-audit FastAPI access logs for evidence of prior exploitation (unexpected model loads, unusual outbound connections, new files written to disk by the ChromaDB process). Rotate any credentials or API keys accessible from the ChromaDB host. Restore service only after confirming no indicators of prior compromise are present.
IR Detail
Recovery
NIST 800-61r3 §3.5 — Recovery
NIST IR-4 (Incident Handling)
NIST SI-7 (Software, Firmware, and Information Integrity)
NIST IA-5 (Authenticator Management)
CIS 5.2 (Use Unique Passwords)
CIS 7.2 (Establish and Maintain a Remediation Process)
Compensating Control
Version verification after patch: `pip show chromadb | awk '/Version/{print $2}' | python3 -c "import sys; v=sys.stdin.read().strip(); print('SAFE' if tuple(map(int,v.split('.'))) > (1,5,8) else 'STILL VULNERABLE')"`. Credential rotation scope for ChromaDB hosts: enumerate all secrets accessible to the process — check environment variables (`cat /proc/$(pgrep -f uvicorn)/environ | tr '\0' '\n' | grep -iE 'key|token|secret|password'`), `.env` files in the application directory, and mounted Kubernetes secrets if applicable. Rotate any OpenAI API keys, Hugging Face access tokens, AWS/GCP service account credentials, and database connection strings found. For integrity verification without a commercial tool, run `pip hash --algorithm sha256 chromadb` against the PyPI-published SHA256 to confirm the installed package was not tampered with post-exploitation.
Preserve Evidence
Before restoring service: (1) Capture final state of FastAPI access logs with exploitation timeline annotations — `grep -E '(POST|GET).*/api/v1' /var/log/chromadb/access.log | awk '{print $1,$2,$3,$4,$7,$8,$9}' > /tmp/chromadb_access_timeline.txt`. (2) Document all environment variables and secrets present at time of compromise (redact values, preserve key names for rotation tracking). (3) Run a YARA scan against the ChromaDB working directory and Python site-packages for common webshell and Python backdoor patterns: `yara /path/to/webshell.yar /usr/local/lib/python*/dist-packages/chromadb/ /tmp/ ~/.cache/huggingface/` — a successful CVE-2026-45829 RCE could drop a Python-based reverse shell or modify existing ChromaDB module files to maintain persistence (MITRE T1546).
5
Step 5: Post-Incident, Review your AI/ML pipeline asset inventory to ensure all components with external model-loading capabilities are subject to the same network segmentation and authentication enforcement applied to other production services. Evaluate whether Hugging Face model ingestion should be restricted to a controlled, air-gapped process rather than live server-side fetching. Add ChromaDB and similar vector database components to your vulnerability management scope with automated version monitoring.
IR Detail
Post-Incident
NIST 800-61r3 §4 — Post-Incident Activity
NIST IR-8 (Incident Response Plan)
NIST RA-3 (Risk Assessment)
NIST SI-5 (Security Alerts, Advisories, and Directives)
CIS 1.1 (Establish and Maintain Detailed Enterprise Asset Inventory)
CIS 2.1 (Establish and Maintain a Software Inventory)
CIS 7.1 (Establish and Maintain a Vulnerability Management Process)
Compensating Control
AI/ML pipeline asset discovery without a CMDB: `find / -name 'chromadb' -o -name 'chroma.log' -o -name 'chroma_collections' 2>/dev/null` across hosts; supplement with `pip list --format=columns | grep -iE 'chroma|langchain|llama|faiss|pinecone|weaviate|qdrant'` to identify the broader vector DB and AI pipeline attack surface. For automated version monitoring of ChromaDB and similar packages, set up a free GitHub Actions workflow or cron job using `pip index versions <package>` and compare against your pinned version baseline weekly. For air-gapped model ingestion, establish a policy requiring all Hugging Face models to be downloaded by a dedicated internal model registry host (e.g., a hardened Python script on an isolated VM with outbound-only access to huggingface.co), cached locally, and served internally — eliminating live server-side fetching that CVE-2026-45829 exploits. Document this architectural control as a formal compensating control in your GRC system referencing NIST SC-7 (Boundary Protection) until a vendor patch is confirmed.
Preserve Evidence
Lessons-learned documentation should capture: (1) The full exposure window — date ChromaDB was first deployed at the vulnerable version versus date of containment — to support breach notification scope assessment if PII or regulated data was accessible from the ChromaDB host. (2) Inventory of all AI pipeline components (LangChain, LlamaIndex, embedding services) that interacted with the compromised ChromaDB instance, as these may have transmitted query data or vector embeddings containing sensitive organizational information. (3) Network flow records (NetFlow/sFlow or VPC flow logs) for the ChromaDB host covering the full exposure window, retained per NIST AU-11 (Audit Record Retention) requirements for potential regulatory or legal review.
Recovery Guidance
After patching, maintain elevated monitoring of the ChromaDB host for a minimum of 30 days: watch for Python child processes spawned by uvicorn (Sysmon EID 1 or auditd execve), outbound connections to huggingface.co or non-standard IPs from the ChromaDB process, and unexpected modifications to Python site-packages (SI-7). Verify that all credentials and API keys rotated during recovery have been invalidated in their respective platforms (Hugging Face token revocation at hf.co/settings/tokens, cloud IAM key deletion confirmed via provider console). Do not restore internet-facing exposure of the ChromaDB service until network-layer authentication enforcement (reverse proxy with mandatory auth, e.g., nginx + OAuth2 proxy) is in place, given the pre-authentication nature of CVE-2026-45829.
Key Forensic Artifacts
Uvicorn/FastAPI stdout logs (default: journalctl -u chromadb or /var/log/chromadb/access.log) — query for POST/GET requests to /api/v1/ endpoints with Hugging Face model references or base64-encoded payloads in request bodies, originating from non-RFC1918 source IPs, which represent the primary exploitation vector for CVE-2026-45829
Hugging Face model cache directory (~/.cache/huggingface/hub/) — file creation timestamps for any model files (*.bin, *.safetensors, config.json, tokenizer.json) downloaded after initial deployment without authorized model update activity; attacker-controlled models loaded via the unauthenticated RCE path will appear here
Python process audit trail — Linux auditd EXECVE records or Windows Sysmon EventID 1 logs filtered on parent process matching uvicorn/chromadb with child processes python3, sh, bash, curl, or wget, which indicate successful RCE and post-exploitation command execution per MITRE T1059.006
Host network connection logs — Sysmon EventID 3 (Network Connection) or Linux auditd CONNECT syscall records for the ChromaDB process PID, specifically outbound connections to huggingface.co (34.105.x.x), hf.co, or any non-organizational external IP initiated by the uvicorn worker process, evidencing the model-load exfiltration/execution chain
Python site-packages integrity — directory listing with mtimes for /usr/local/lib/python*/dist-packages/chromadb/ and all installed dependencies; any files modified after the ChromaDB installation timestamp and not corresponding to a pip upgrade event indicate attacker modification of the Python runtime for persistence (MITRE T1546.005 — Trap)
Detection Guidance
Query FastAPI access logs for requests to any endpoint that triggers model loading or collection creation from external or unexpected source IPs, particularly referencing Hugging Face model paths.
Monitor outbound network flows from ChromaDB host processes to huggingface.co, hf.co, or cdn-lfs.huggingface.co; legitimate use may exist, but unexpected or high-frequency connections warrant review.
On the host, inspect process ancestry: ChromaDB spawning Python subprocesses executing unfamiliar scripts is a strong indicator.
In SIEM, correlate with T1059.006 (Python interpreter abuse) and T1105 (tool/file transfer) alerts. If you have EDR, create a rule for file writes originating from the ChromaDB process outside its expected working directory. Log sources: FastAPI stdout/stderr, host process audit logs (auditd or equivalent), network flow logs (firewall, VPC flow logs), EDR telemetry.
Indicators of Compromise (2)
Export as
Splunk SPL
KQL
Elastic
Copy All (2)
2 domains
Type Value Enrichment Context Conf.
⌘ DOMAIN
huggingface.co
VT
US
Hugging Face model repository — ChromaDB exploitation involves forcing the server to load a malicious model from this domain; unexpected or anomalous outbound connections from ChromaDB hosts to this domain warrant investigation. Note: this domain has legitimate uses and is not inherently malicious.
LOW
⌘ DOMAIN
hf.co
VT
US
Hugging Face short domain — same context as huggingface.co; monitor for unexpected outbound connections from ChromaDB host processes.
LOW
Platform Playbooks
Microsoft Sentinel / Defender
CrowdStrike Falcon
AWS Security
🔒
Microsoft 365 E3
3 log sources
Basic identity + audit. No endpoint advanced hunting. Defender for Endpoint requires separate P1/P2 license.
🛡
Microsoft 365 E5
18 log sources
Full Defender suite: Endpoint P2, Identity, Office 365 P2, Cloud App Security. Advanced hunting across all workloads.
🔍
E5 + Sentinel
27 log sources
All E5 tables + SIEM data (CEF, Syslog, Windows Security Events, Threat Intelligence). Analytics rules, playbooks, workbooks.
Hard indicator (direct match)
Contextual (behavioral query)
Shared platform (review required)
MITRE ATT&CK Hunting Queries (4)
Sentinel rule: Web application exploit patterns
KQL Query Preview
Read-only — detection query only
CommonSecurityLog
| where TimeGenerated > ago(7d)
| where DeviceVendor has_any ("PaloAlto", "Fortinet", "F5", "Citrix")
| where Activity has_any ("attack", "exploit", "injection", "traversal", "overflow")
or RequestURL has_any ("../", "..\\\\", "<script", "UNION SELECT", "\${jndi:")
| project TimeGenerated, DeviceVendor, SourceIP, DestinationIP, RequestURL, Activity, LogSeverity
| sort by TimeGenerated desc
Sentinel rule: Suspicious file download
KQL Query Preview
Read-only — detection query only
DeviceFileEvents
| where Timestamp > ago(7d)
| where ActionType == "FileCreated"
| where FileOriginUrl != ""
| where InitiatingProcessFileName in~ ("powershell.exe", "cmd.exe", "certutil.exe", "bitsadmin.exe", "curl.exe", "wget.exe")
| project Timestamp, DeviceName, FileName, FolderPath, FileOriginUrl, SHA256, InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
Sentinel rule: Suspicious PowerShell command line
KQL Query Preview
Read-only — detection query only
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "cscript.exe", "mshta.exe")
| where ProcessCommandLine has_any ("-enc", "-nop", "bypass", "hidden", "downloadstring", "invoke-expression", "iex", "frombase64", "new-object net.webclient")
| project Timestamp, DeviceName, FileName, ProcessCommandLine, AccountName, InitiatingProcessFileName
| sort by Timestamp desc
Sentinel rule: Unusual C2 communication patterns
KQL Query Preview
Read-only — detection query only
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemotePort in (80, 443, 8080, 8443)
| where InitiatingProcessFileName !in~ ("chrome.exe", "msedge.exe", "firefox.exe", "teams.exe", "outlook.exe", "svchost.exe")
| summarize Connections = count() by DeviceName, RemoteIP, InitiatingProcessFileName
| where Connections > 50
| sort by Connections desc
Falcon API IOC Import Payload (2 indicators)
POST to /indicators/entities/iocs/v1 — Weak/benign indicators pre-filtered. Expiration set to 90 days.
Copy JSON
[
{
"type": "domain",
"value": "huggingface.co",
"source": "SCC Threat Intel",
"description": "Hugging Face model repository \u2014 ChromaDB exploitation involves forcing the server to load a malicious model from this domain; unexpected or anomalous outbound connections from ChromaDB hosts to this",
"severity": "medium",
"action": "no_action",
"platforms": [
"windows",
"mac",
"linux"
],
"applied_globally": true,
"expiration": "2026-08-19T00:00:00Z"
},
{
"type": "domain",
"value": "hf.co",
"source": "SCC Threat Intel",
"description": "Hugging Face short domain \u2014 same context as huggingface.co; monitor for unexpected outbound connections from ChromaDB host processes.",
"severity": "medium",
"action": "no_action",
"platforms": [
"windows",
"mac",
"linux"
],
"applied_globally": true,
"expiration": "2026-08-19T00:00:00Z"
}
]
No hard IOCs available for AWS detection queries (contextual/benign indicators excluded).
Compliance Framework Mappings
T1190
T1203
T1105
T1059
T1071
T1195.001
+2
CA-8
RA-5
SC-7
SI-2
SI-7
SI-3
+9
A01:2021
A03:2021
A07:2021
6.1
6.8
16.10
6.3
6.4
6.5
+2
MITRE ATT&CK Mapping
T1190
Exploit Public-Facing Application
initial-access
T1203
Exploitation for Client Execution
execution
T1105
Ingress Tool Transfer
command-and-control
T1059
Command and Scripting Interpreter
execution
T1071
Application Layer Protocol
command-and-control
T1195.001
Compromise Software Dependencies and Development Tools
initial-access
T1195.002
Compromise Software Supply Chain
initial-access
Guidance Disclaimer
The analysis, framework mappings, and incident response recommendations in this intelligence
item are derived from established industry standards including NIST SP 800-61, NIST SP 800-53,
CIS Controls v8, MITRE ATT&CK, and other recognized frameworks. This content is provided
as supplemental intelligence guidance only and does not constitute professional incident response
services. Organizations should adapt all recommendations to their specific environment, risk
tolerance, and regulatory requirements. This material is not a substitute for your organization's
official incident response plan, legal counsel, or qualified security practitioners.
View All Intelligence →