Zeek script to detect exploitation attempts of CVE-2022-21449 targeting TLS clients# CVE-2022-21449
Zeek script to detect exploitation attempts of CVE-2022-21449 targeting TLS clients. Only works for TLS 1.2 and below.
## Install
`zkg install https://github.com/thack1/CVE-2022-21449`
## Run
Run against supplied pcap file:
`$ zeek -Cr pcaps/CVE-2022-21449.pcap CVE-2022-21449`
## Example Notices
```
#separator \x09
#set_separator ,
#empty_field (empty)
#unset_field -
#path notice
#open 2022-04-24-13-05-55
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p fuid file_mime_type file_desc proto note msg sub src dst p n peer_descr actions email_dest suppress_for remote_location.country_code remote_location.region remote_location.city remote_location.latitude remote_location.longitude
#types time string addr port addr port string string string enum enum string string addr addr port count string set[enum] set[string] interval string string string double double
1650798355.280690 CrR9204TYgm1nkpJG1 192.168.125.154 59592 192.168.125.167 443 - - - tcp CVE_2022_21449::Null_Signature Null server signature; potential CVE-2022-21449 exploit attempt - 192.168.125.154 192.168.125.167 443 - - Notice::ACTION_LOG (empty) 3600.000000 - - - - -
#close 2022-04-24-13-14-45
```
## References
1. https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/
1. https://github.com/khalednassar/CVE-2022-21449-TLS-PoC
[4.0K] /data/pocs/84e6b6e05ff06eb7b1eeb798bd3d74683eb5ef19
├── [4.0K] pcaps
│ ├── [ 12K] CVE-2022-21449.pcap
│ ├── [ 11K] CVE-2022-21449-rn.pcap
│ ├── [ 11K] CVE-2022-21449-rsn.pcap
│ └── [ 11K] CVE-2022-21449-sn.pcap
├── [1.6K] README.md
├── [4.0K] scripts
│ ├── [2.8K] CVE_2022_21449.zeek
│ └── [ 28] __load__.zeek
└── [ 31] zkg.meta
2 directories, 8 files