← Back to SOC feed Coverage →

CVE-2022-22965 Network Activity

kql MEDIUM Azure-Sentinel
DeviceNetworkEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

Adversaries may exploit CVE-2022-22965 by establishing unauthorized network connections to exfiltrate data or establish command and control. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential compromise from known vulnerabilities before they lead to data breaches or system compromise.

KQL Query

DeviceNetworkEvents
| where Timestamp > ago(7d)
| where ActionType =~ "NetworkSignatureInspected"
| where AdditionalFields contains ".jsp?cmd="
| summarize makeset(AdditionalFields, 5), min(Timestamp), max(Timestamp) by DeviceId, DeviceName

Analytic Rule Definition

id: 98b496c6-da2e-4b03-8e38-c038b2e3062d
name: CVE-2022-22965 Network Activity
description: |
  The following query surface network activity associated with exploitation of CVE-2022-22965.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceNetworkEvents
tactics:
- Privilege escalation
- Exploit
query: |   
  DeviceNetworkEvents
  | where Timestamp > ago(7d)
  | where ActionType =~ "NetworkSignatureInspected"
  | where AdditionalFields contains ".jsp?cmd="
  | summarize makeset(AdditionalFields, 5), min(Timestamp), max(Timestamp) by DeviceId, DeviceName

Required Data Sources

Sentinel TableNotes
DeviceNetworkEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/CVE-2022-22965 Network Activity.yaml