See all of our release notes and learn about helpful features
The following enhancements and improvements are now available to Censys users.Censys PlatformThe new Censys Platform is now available. The Censys Platform gives you sharper insights into internet-facing assets and actionable intelligence to mitigate risks. Read our new documentation for the Censys Platform to learn how to use the new datasets, query language, and additional functionality. This initial release of the Platform is available to Free and Standard license users. Additional features and support for Enterprise customers will be released in the coming weeks. Censys SearchDeployed improvements to the automatic protocol detection of certain protocols running on non-standard ports. Added support for Trend Micro Locality Sensitive Hash (TLSH) of HTTP bodies. These values are present in the services.http.response.body_hashes field and are prepended by tlsh. Censys ASMUpdated the Saved Query Automation configuration UI in the ASM console. You can now configure saved query alerts as well as auto-tagging (see below) from the new “Automate” menu for saved queries. Save time and accelerate research and remediation by automating manual workflows with auto-tagging. Whenever an asset matches a saved query, that asset is tagged. When an asset no longer matches the saved query, the asset is untagged. Auto-tagging checks for new or removed assets every hour. You can enable or disable Auto-tagging in the updated Saved Query Automation UI. Auto-tagging is available to ASM Enterprise customers. Learn more about Saved Query Automation in this video. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.Critical Vulnerabilities in Ivanti Connect Secure, Policy Secure, and CSA [CVE-2025-22467 & 3 Others] Use the following queries to map Ivanti products. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Platform query Censys Search query Censys ASM query Censys ASM risk query [CVE-2024-10644 & CVE-2024-38657] Censys ASM risk query [CVE-2025-22467] New FingerprintsAdded the following fingerprints. Type Name Description Query risk Vulnerable Ivanti Connect Secure Application [CVE-2024-10644 & CVE-2024-38657] This Ivanti Connect Secure (before 22.7R2.4) application is vulnerable to CVE-2024-10644 & CVE-2024-38657. CVE-2024-10644 is a code injection vulnerability and CVE-2024-38657 is an OS injection vulnerability. Both vulnerabilites require the attacker to be authenticated with administrative privileges and have the potential impact of remote code execution if exploited. ASM query risk Vulnerable Ivanti Connect Secure Application [CVE-2025-22467] This Ivanti Connect Secure (before 22.7R2.6) application is vulnerable to CVE-2025-22467, a stack based overflow vulnerability that allows a remote authenticated attacker to achieve remote code execution. ASM query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.Trimble Cityworks Vulnerability Added to CISA KEV [CVE-2025-0994] Use the following queries to map exposed Trimble Citywork instances. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Platform query Censys Search query Censys ASM query Censys ASM risk query New FingerprintsAdded the following fingerprints. Type Name Description Query risk Vulnerable Trimble Cityworks [CVE-2025-0994] This Trimble Cityworks device is running a version prior to 15.8.9 and is vulnerable to CVE-2025-0994, a deserialization vulnerability that may allow an unauthenticated attacker to perform remote code execution against a customer's Microsoft IIS web server. ASM Query software Trimble Cityworks This is a Trimble Cityworks management interface. Trimble Cityworks is an enterprise asset management (EAM) and work order management system designed for local governments and utility agencies. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.SonicWall RCE Vulnerability Added to CISA KEV [CVE-2025-23006] Use the following queries to identify the SonicWall products associated with this issue. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Censys ASM risk query New ProtocolsAdded support for the following protocols. Protocol Description Query NFS_MOUNTD A protocol scanner for NFS mount daemon. This daemon implements the server side of the NFS MOUNT protocol. Search Query New FingerprintsAdded the following fingerprints. Type Name Description Query risk Vulnerable SonicWall Secure Mobile Access [CVE-2025-23006] This SonicWall Secure Mobile Access VPN is vulnerable to CVE-2025-23006. This vulnerability was patched via the following hotfix: 12.4.3-02854. This means that version 12.4.3 is potentially vulnerable to the exploit as we cannot see the full build number. The vulnerability specifically targets the Central and Appliance Management Consoles of SMA VPNs. ASM Query software Huawei Inner Web UI This is a Huawei Inner Web UI Management Interface. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMAdded a card for Swimlane to the Integrations Marketplace in the ASM console. This integration is developed and maintained by Swimlane. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.Windows OLE Vulnerability RCE [CVE-2025-21298] Use the following queries to map Exchange Servers and Outlook Web Access Portals. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query The Censys Research Team also released blogs on the following issues.Using Censys to Track the Murdoc Botnet Campaign Targeting AVTECH Cameras and Huawei Routers Pivoting for Nosviak
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.Qlik Sense RCE Vulnerability Added to CISA KEV [CVE-2023-48365] Use the following queries to map Qlik Sense products. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Aviatrix Controller Vulnerability Exploited in the Wild [CVE-2024-50603] Use the following queries to map Aviatrix Controller products. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Censys ASM risk query Zero-Day Vulnerability in FortiOS and FortiProxy Added to CISA KEV [CVE-2024-55591] Use the following queries to identify FortiOS and ForiProxy services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query See this blog from the Censys Research Team for more information about this issue. New FingerprintsAdded the following fingerprints. Type Name Description Query software Qlik Sense This is a Qlik Sense data analytics and visualization tool. Search Query software Aviatrix Controller This is an Aviatrix Controller service. Search Query software Ivanti Endpoint Manager Mobile This is an Ivanti Endpoint Manager Mobile service. Search Query software Hytera SmartOne This is a Hytera SmartOne service. Search Query risk Vulnerable Aviatrix Controller Application [CVE-2024-50603] This Aviatrix Controller Application is running an out-of-date version that is vulnerable to CVE-2024-50603, allowing an unauthenticated attacker to execute arbitrary code. ASM Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.GFI KerioControl Susceptible to 1-Click RCE Vulnerability [CVE-2024-52875] Use the following queries to find GFI KerioControl firewalls. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Actively Exploited Unauthenticated RCE in Ivanti Connect Secure [CVE-2025-0282] Use the following queries to find exposed Ivanti Connect Secure instances. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Censys ASM risk query Oracle WebLogic Vulnerability Added to CISA KEV [CVE-2020-2883] Use the following queries to find Oracle WebLogic servers. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Censys ASM risk query New ProtocolsAdded support for the following protocols. Protocol Description Query EZVIZ Used for EZVIZ smart home cameras. Search Query ADB (Android Debug Bridge) The communication protocol used by the Android Debug Bridge tool. Search Query GIT The protocol used to transfer data between a GIT client and server. Search Query SNPP (Simple Network Paging Protocol) Used for sending and receiving paging messages. Search Query RSH A legacy protocol used to execute commands on a remote host. Search Query New FingerprintsAdded the following fingerprints. Type Name Description Query software Oracle WebLogic This is an Oracle WebLogic Server. Search Query software Ivanti This web service was built or is owned by Ivanti. Search Query risk Vulnerable Oracle WebLogic Server [CVE-2020-2883] This Oracle WebLogic Server is vulnerable to CVE-2020-2883. ASM Query risk Vulnerable Ivanti Connect Secure Application [CVE-2025-0282 & CVE-2025-0283] This Ivanti Connect Secure (before 22.7R2.5) application is vulnerable to CVE-2025-0282 & CVE-2025-0283. ASM Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMUse our new Wiz integration to ingest your cloud resources into Censys ASM and ensure that your inventory is always up to date. Cloud resources sourced from Wiz will be added to your attack surface inventory for easy investigation and prioritization. Currently, only hosts and web entities can be brought in from Wiz. Support for storage buckets will be added shortly. Learn more about how to use this integration in this video: Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Actively Exploited Vulnerability in BeyondTrust Products [CVE-2024-12356] Use the following queries to map BeyondTrust products. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Actively Exploited Vulnerability in Palo Alto Networks PAN-OS [CVE-2024-3393] Use the following queries to identify Palo Alto PAN-OS products. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query New FingerprintsAdded the following fingerprints: Type Name Description Query software BeyondTrust Remote Support This is a device running BeyondTrust Remote Support software. Search Query software BeyondTrust Privileged Remote Access This is a device running BeyondTrust Privileged Remote Access software. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Max Severity Vulnerability in Ivanti Cloud Services Appliance [CVE-2024-11639] Use the following queries to map Ivanti Cloud Services Appliances. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Critical Vulnerabilities in Sophos Firewalls [CVE-2024-12727, CVE-2024-12728, & CVE-2024-12729] Use the following queries to identify Sophos Firewalls. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:PoC Exploit Available for Mitel MiCollab VoIP Platform [CVE-2024-35286, CVE-2024-41713, CVE-2024-55550] Use the following queries to map Mitel services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Cleopocalypse: 70% of Cleo File Transfer Exposures may be Vulnerable to Unauthenticated RCE [CVE-2024-55956] Use the following queries to map Cleo services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Censys ASM risk query Actively Exploited Flaw in Apache Struts File Upload Logic [CVE-2024-53677] Use the following queries to identify Struts services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Additionally, this query can be used as a strong indicator of Apache Struts. However, it has a lower confidence level than the query above and requires further investigation on the host to confirm that Struts is in use. New FingerprintsAdded the following fingerprints: Type Name Description Query software Apache Struts This is an Apache Struts service. Search Query software Mitel MiCollab This is a Mitel MiCollab service. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMAdded a card for Axonius to the Integrations Marketplace in the ASM console. This integration is developed and maintained by Axonius. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Unrestricted File Upload Vulnerability in Multiple Cleo File Transfer Products [CVE-2024-50623] Censys Search query Censys ASM query Censys ASM risk query Veeam Service Provider Console RCE [CVE-2024-42448] Use the following queries to map Veeam Service Provider Consoles. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query New FingerprintsAdded the following fingerprints: Type Name Description Query risk Vulnerable Cleo Instance [CVE-2024-50623] This service is running a vulnerable version of Cleo Harmony, VLTrader, and LexiCom that is affected by unauthenticated remote code execution vulnerability CVE-2024-50623. ASM Query software Cleo Harmony This is a Cleo Harmony Managed File Transfer server. Search Query software Fortinet FortiAIOps This is a Fortinet FortiAIOps server. FortiAIOps simplifies LAN and WAN network management and leverages artificial intelligence with machine learning for enhanced network operations. Search Query software Cleo VLTrader This is a Cleo VLTrader Managed File Transfer server. Search Query software Cleo LexiCom This is a Cleo LexiCom Managed File Transfer server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMImplemented several improvements to the saved query automation UI in the ASM console: The number of results returned for a saved query is now displayed on its entry in the saved query menu. A warning is now displayed next to a saved query entry in the saved query menu if it is nearing or exceeding 40,000 results. Saved query automation cannot be enabled for saved queries that exceed 40,000 results. Updated the icons for automation configuration status in the saved query menu. Added the word “Resources” next to the question mark icon in the top right corner of the ASM console.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Actively Exploited RCE Vulnerability in ProjectSend [CVE-2024-11680] Use the following queries to map ProjectSend services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query RCE Vulnerability in Progress WhatsUp Gold [CVE-2024-8785] Use the following queries to map WhatsUp Gold services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query New ProtocolsAdded support for the following protocols:FreeSWITCH
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys SearchUse the new Censeye tool to discover useful pivots in Censys host data and crawl related hosts using data from those discoveries. Censeye is designed to help you identify hosts with characteristics similar to a given target. For instance, if you come across a suspicious host, the tool enables you to determine the most effective Censys search terms for discovering related infrastructure. Learn more about Censeye and how to use it in this blog post. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Actively Exploited RCE Vulnerability in Array Networks VPNs [CVE-2023-28461] Use the following queries to map Array Networks AG/vxAG Series VPN devices. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMSee our new Google Security Operations integration in action in this video. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:VMware vCenter Server Vulnerabilities Actively Exploited [CVE-2024-38812, CVE-2024-38813] Use the following queries to see all exposed vCenter services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query Apache Traffic Server Vulnerabilities [CVE-2024-38479, CVE-2024-50305, CVE-2024-50306] Use the following queries to see all exposed Apache Traffic Server services. Not all of these are necessarily vulnerable, as specific version information may not be available. Censys Search query Censys ASM query New FingerprintsAdded the following fingerprints: Type Name Description Query risk Vulnerable Apache Traffic Server [CVE-2024-50306] This is a service running a version of Apache Traffic Server that is vulnerable to CVE-2024-50306, a privilege escalation on startup vulnerability that may allow attackers to retain elevated privileges during startup. ASM Query software Apache Traffic Server This is an Apache Traffic Server. Search Query
The Censys connector for Google Security Operations (SecOps) enables you to send Censys-discovered assets and their risks straight to SecOps. This allows you to conduct logging, reporting, and correlation on your Censys data from a central location to simplify your security workflows.This integration is available to Censys ASM Advanced and Enterprise customers.The video below shows you how to quickly set up the integration and walks through a few example queries. Learn more in the documentation.
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMRestored the ability to add comments to risks after accepting them or changing the default severity level on risk instance pages for non-CVE risks in the ASM console.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Critical Missing Authentication Bug in PAN Expedition could lead to Stolen Network Secrets [CVE-2024-5910] Cross-Site Scripting Vulnerability in pfSense [CVE-2024-46538] The following queries will return exposed pfSense Web Portal instances, though not all are necessarily vulnerable. Censys Search query Censys ASM query Windows KDC Proxy Remote Code Execution Vulnerability [CVE-2024-43639] Note that displayed devices are only vulnerable when configured as a Kerberos KDC Proxy Protocol server. Censys Search query Censys ASM query Active Exploitation of Critical RCE in Palo Alto Networks PAN-OS [CVE-2024-0012 and CVE-2024-9474] The following queries will return Palo Alto management interfaces regardless of PAN-OS version. Censys Search query Censys ASM query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMFixed several bugs impacting the displayed risk count in the ASM console. The Overview dashboard, Trends & Benchmarks dashboard widgets, and Asset Inventory now display the correct risk count. You may see a drop in active risks on the Trends & Benchmarks dashboard. This is expected, as Censys is changing how this dashboard is calculating risks. On the Risk Instances page in the ASM console, the port, service name, and risk change history are now displayed in the expanded risk display.Updates to end-of-life software versions in ASMThe end-of-life (EOL) versions for existing risks associated with the following software in ASM have been updated to reflect their most up-to-date EOL versions. The following table provides a complete list of affected software. Software EOL Versions MySQL Versions 5.7 and below, between 8.1 and 8.3, and between 9.0.0 and 9.0.1 are considered end of life. PostgreSQL Versions 12.2 and below are considered end of life. MariaDB Versions below 10.3, between 10.7.0 and 10.10.7, and between 11.0.0 and 11.3.2 are considered end of life. MSSQL Versions 12.0.6449 and below are considered end of life. Elasticsearch Versions below 7.17 are considered end of life. Kubernetes Versions 1.29.9 and below are considered end of life. Redis Versions below 6.2, and between 7.0 and 7.2 are considered end of life. Python Versions below 3.9 are considered end of life. Exim Versions below 4.98 are considered end of life. Apache Traffic Versions below 10.0 are considered end of life. Microsoft IIS Versions below 10.0 are considered end of life. PHP Versions below 8.1.0 are considered end of life. OpenSSL Versions below 3.0.0 are considered end of life. Nginx Versions below 1.26 are considered end of life. Red Hat JBoss EAP Versions below 7.0 are considered end of life. ASUS Routers Added support to identify over 270 end of life ASUS routers. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Linear eMerge OS Command Injection [CVE-2024-9441] Censys Search query Censys ASM query Microsoft SharePoint Vulnerabilities [CVE-2024-38094 and Others] Censys Search query Censys ASM query CyberPanel Command Injection Vulnerabilities [CVE-2024-51567, CVE-2024-51568] Censys Search query Censys ASM query New FingerprintsAdded or updated the following fingerprints: Type Name Description Query software ZFile This is a ZFile Server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMSend Censys-discovered assets and their risks to Google Security Operations (SecOps) using our new integration. Conduct logging, reporting, and correlation on your Censys data from a central location to simplify your security workflows. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:CyberPanel RCE Leveraged for Ransomware [CVE-2024-51378] Censys Search query Censys ASM query New FingerprintsAdded the following fingerprints: Type Name Description Query software Reverse_SSH Server This is a reverse_ssh server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Zero day in Fortinet FortiManager seeing Active Exploitation [CVE-2024-47575] To identify all exposed FortiManager instances regardless of version, the following Censys queries can be used: Censys Search Query: services.software: (vendor="Fortinet" and product="FortiManager") Censys ASM Query: host.services.software: (vendor="Fortinet" and product="FortiManager") or web_entity.instances.software: (vendor="Fortinet" and product="FortiManager") New FingerprintsAdded the following fingerprints: Type Name Description Query software ScienceLogic SL1 This is a ScienceLogic SL1 Server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.New FingerprintsAdded the following fingerprints: Type Name Description Query software Linear eMerge This is a Linear eMerge Device. Search Query software PolarSSL This is a PolarSSL Server. Search Query software PTZOptics Camera This is a PTZOptics Camera Device. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMAdded a “Resources” dropdown menu to the top navigation bar in the ASM web interface. Some links, like API Documentation and Censys Academy, were moved from the user profile menu to the Resources menu. The Resources menu now features a link to the Censys Community. Added an “accepted” status to risks that are sent to Splunk via our integration. This enables you to filter out risks that have been accepted, as well as track exclusions in one place instead of two. Additionally, default dashboards and searches have been updated to include web entity risks. Fixed an issue that allowed users with the Member role to access Integrations in the ASM web interface. Now, only users with the Manager role can see Integrations.New FingerprintsAdded the following fingerprints: Type Name Description Query software Mana Ouma Botnet This is a Mana Ouma Botnet Server. Search Query software Matryosh Botnet This is a Matryosh Botnet Server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:14 Bugs in DrayTek Vigor Routers Disclosed: Admin Interfaces Widely Exposed Across Major ISPs [CVE-2024-41592] Censys Search query: services: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001"))= Censys ASM query: host.services: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001")) or web_entity.instances: (http.response.status_code=200 and http.request.uri:"/weblogin.htm" and (http.response.html_title:"Vigor" or http.response.favicons.md5_hash="208b1c5af9e2cc7d46e3ec5bf4d12001")) Censys ASM risk query: risks.name="Exposed DrayTek Vigor Router" New ProtocolsAdded support for the following protocols:RLOGIN NTRIP PGBOUNCER WS_DISCOVERYNew FingerprintsAdded or updated the following fingerprints: Type Name Description Query software DrayTek VigorConnect Admin Page This is a DrayTek VigorConnect admin page. Search Query software DrayTek Vigor Router This is a DrayTek Vigor Router. Search Query risk Exposed DrayTek Vigor Router The affected service exposes a DrayTek Vigor router administration interface. This web application can be used to modify router configurations, which makes it a target. ASM Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Rapid ResponseThe Censys Rapid Response team published information about the following issue:Vulnerabilities in the Common Unix Printing Service (CUPS) New FingerprintsAdded the following fingerprints: Type Name Description Query label Suspicious Open Directory This shows indications of being a Suspicious Open Directory. Search Query software Butterfly Network Ultrasound Butterfly Network Ultrasound is a portable, handheld ultrasound device that connects to a smartphone or tablet. Search Query software Stryker Medical Device This is a Stryker Medical Device. Search Query
CVE risks in Censys ASM help you identify software vulnerabilities in your attack surface and understand how critical and exploitable they are, enabling you to respond to the most important risks in your attack surface first and avoid chasing low-risk issues.CVE risks feature CVE data, KEV information, and CVSS scores along with first seen and last seen dates to make it easy for you to evaluate risks at a glance. This information is highlighted in your risk instances page in the ASM web interface as well as on individual risk detail pages on your inventory assets.You have complete control over the criteria used to surface CVE risks in your workspace--you can restrict CVE risks to only those that have been scored as critical, that utilize specific attack vectors, and are present in the KEV catalog. By default, only CVE risks that have been scored high to critical, use network attack vectors, or are present in the KEV catalog will be shown in your attack surface.Learn more about how to use CVE risks in ASM with the following resources:This short lesson in the Censys Academy Our documentation Or in the brief video embedded below If you have any questions about CVE risks, let us know! We recommend working with your customer success manager to ensure that you get the best results out of CVE risks.
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMUse CVE (Common Vulnerability and Exposures) risks in Censys ASM to identify software vulnerabilities in your attack surface and understand how critical and exploitable they are, enabling you to respond to the most important risks in your attack surface first and avoid chasing low-risk issues. This release adds over 5,000 CVE risks to the ASM risk library. Each CVE risk includes Known Exploited Vulnerability (KEV) information, Common Vulnerability Scoring System (CVSS) scores, and attack vector indicators. When a new CVE is cataloged by the National Vulnerability Database (NVD), it becomes discoverable in Censys ASM alongside its CVSS score within 24 hours. You can adjust the criteria for surfacing CVE risks in your ASM workspace. By default, only CVEs that meet the following criteria are included: CVSS score High to Critical Present in KEV catalog Network Attack Vector CVE risks are available to all ASM customers. Learn more about CVE risks in ASM in the following video. Rapid ResponseThe Censys Rapid Response team published information about and queries for the following issues and vulnerabilities:Advisory: VMware vCenter DCERPC Heap-Overflow RCE [CVE-2024-38812] To identify potentially vulnerable vCenter instances, the following Censys queries can be used: Censys Search query: services.software: (vendor: VMware and product: vCenter) Censys ASM query: host.services.software: (vendor: VMware and product: vCenter) Ivanti Cloud Services Appliance (CSA) Unauthenticated Remote Code Execution Vulnerability [CVE-2024-8963 and CVE-2024-8190] To identify exposed Ivanti Cloud Services Appliance instances, the following Censys queries can be used: Censys Search query: services.http.response.html_title=`Ivanti(R) Cloud Services Appliance` Censys ASM query: host.services.http.response.html_title=`Ivanti(R) Cloud Services Appliance` or web_entity.instances.http.response.html_title=`Ivanti(R) Cloud Services Appliance` New ProtocolsAdded support for the following protocols:Expanded detection of Murmur/Mumble servers MURMUR Servers (new) MURMUR Tunnels (existing) New FingerprintsAdded the following fingerprints: Type Name Description Query software AutoGPT This is an AutoGPT Server. Search Query software Ivanti Cloud Services Appliance This is an Ivanti Cloud Services Appliance Server. Search Query software Scope Sentry This is a Scope Sentry Server. Search Query software VMware vSphere This is a VMware vSphere Server. Search Query
The following enhancements and improvements are now available to Censys ASM and Search customers.Censys ASMAdded support for scanning AWS Transfer Family resources to our AWS Cloud Connector.New ProtocolsAdded support for the following protocols:CMORE_HMI RTSP MDNSNew FingerprintsAdded the following fingerprints: Type Name Description Query software Dignity Health PACS Dignity Health sites for managing and accessing PACS systems through browser-based access. Search Query software PacsGear by Hyland PacsGear by Hyland is a medical imaging software solution for managing and accessing PACS systems through browser-based access. Search Query software PICOM365 This is a cloud PACS service. PICOM365 delivers automated, scalable, secure diagnostic imaging workflow and data exchange. Search Query software Ligolo This is a Ligolo Server. Search Query software OpenCVE This is an OpenCVE Server. Search Query software XRay This is an XRay Server. Search Query software VueTorrent This is a VueTorrent Server. Search Query
Already have an account? Login
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
OKSorry, our virus scanner detected that this file isn't safe to download.
OK