Query Details
# Vulnerabilities that have a publicly available POC ## Query Information #### Description A list has been made on Github with links to available POCs for CVE's. This query lists the vulnerabilities in your environment that have a publicly available POC. This might help to prioritize which vulnerabilities need to be patches first. #### Risk The vulnerabilities is known to be have a POC available, which increases the changes of it being used by threat actors, thus depending on your configuration the exploit can also be used to gain access into your environment. #### References - https://github.com/tg12/PoC_CVEs ### Defender For Endpoint ``` // Extract the CVE IDs that have an available POC let VulnerabilitiesWithPOC = externaldata(CVE: string, URL: string )[@"https://raw.githubusercontent.com/tg12/PoC_CVEs/main/cve_links.csv"] with (format="csv", ignoreFirstRecord=True); DeviceTvmSoftwareVulnerabilities // Join POC information with the Software Vulnerabilities based on CVE | join kind=inner (VulnerabilitiesWithPOC | summarize POCLinks = make_set(URL), POCTotal = dcount(URL) by CVE) on $left.CveId == $right.CVE // Summarize Results to get statistics | summarize TotalVulnerableDevices = dcount(DeviceName), arg_max(CveId, POCTotal, POCLinks) by CveId // Sort the results | sort by POCTotal, TotalVulnerableDevices ```
This query extracts the CVE IDs that have a publicly available Proof of Concept (POC) from a list on Github. It then joins this POC information with the software vulnerabilities in your environment based on the CVE. The results are summarized to get statistics, including the total number of vulnerable devices and the number of POC links for each CVE. The results are sorted by the number of POCs and the total number of vulnerable devices. This query helps prioritize which vulnerabilities need to be patched first based on the availability of POCs.

Bert-Jan Pals
Released: February 14, 2023
Tables
Keywords
Operators