Skip to main content

The following enhancements and improvements are now available to Censys users.

Censys Platform

  • Use Collections to track and monitor the results of a Censys query over time. 
    • Save time and resources by creating a collection and configuring alerts to track new assets that match your queries. 
    • Collections track both additions and subtractions to assets that match your queries.
    • Configure collection webhooks to receive real-time alerts for any changes within your collections.
    • Collections are currently available to Platform Starter users.
    • Learn more about Collections in the Censys Academy.

Censys ASM

  • Use risk evidence to understand how Censys ASM detected a risk and determine whether a risk requires further validation before it is prioritized for remediation. 
    • Risk evidence links directly to the scan data that includes the evidence for risk. This enables you to accelerate your investigations and use Censys data to find and close risks faster.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New protocols

Added support for the following protocols.

Protocol

Query

CHECK_MK_AGENT

Censys Platform query

NATS_IO

Censys Platform query

 

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

risk

Exposed Kubernetes Ingress NGINX Admission Controller

The affected service exposes a Kubernetes Ingress NGINX Admission Controller. This controller is vulnerable to multiple critical unauthenticated Remote Code Execution vulnerabilities collectively known as "IngressNightmare" (CVE-2025-1974, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-24513). Exploitation can lead to unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster, which could result in complete cluster takeover.

Censys ASM query

risk

Vulnerable Next.js .CVE-2025-29927]

Next.js contains a vulnerability that could allow an attacker to execute arbitrary code through a specially crafted request. This affects versions 11.1.4 through 12.3.5, 13.0.0 through 13.5.9, 14.0.0 through 14.2.25, and 15.0.0 through 15.2.3.

Censys ASM query


 

Be the first to reply!