← Back to SOC feed Coverage →

fireeye-red-team-tools-CVEs [Nobelium]

kql MEDIUM Azure-Sentinel
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that adversaries are exploiting unpatched CVEs associated with FireEye Red Team tools to maintain persistence and evade detection, as seen in Nobelium activity. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and remediate vulnerable systems before they are leveraged in targeted attacks.

KQL Query

let FireEyeCVE= dynamic(
[
"CVE-2019-11510", //pre-auth arbitrary file reading from Pulse Secure SSL VPNs - CVSS 10.0
"CVE-2020-1472", //Microsoft Active Directory escalation of privileges - CVSS 10.0
"CVE-2018-13379", //pre-auth arbitrary file reading from Fortinet Fortigate SSL VPN - CVSS 9.8 //no find CVE
"CVE-2018-15961", //RCE via Adobe ColdFusion (arbitrary file upload that can be used to upload a JSP web shell) - CVSS 9.8
"CVE-2019-0604", //RCE for Microsoft Sharepoint - CVSS 9.8
"CVE-2019-0708", //RCE of Windows Remote Desktop Services (RDS) - CVSS 9.8
"CVE-2019-11580", //Atlassian Crowd Remote Code Execution - CVSS 9.8
"CVE-2019-19781", //RCE of Citrix Application Delivery Controller and Citrix Gateway - CVSS 9.8  //no find CVE
"CVE-2020-10189", //RCE for ZoHo ManageEngine Desktop Central - CVSS 9.8
"CVE-2014-1812", //Windows Local Privilege Escalation - CVSS 9.0
"CVE-2019-3398", //Confluence Authenticated Remote Code Execution - CVSS 8.8
"CVE-2020-0688", //Remote Command Execution in Microsoft Exchange - CVSS 8.8
"CVE-2016-0167", //local privilege escalation on older versions of Microsoft Windows - CVSS 7.8
"CVE-2017-11774", //RCE in Microsoft Outlook via crafted document execution (phishing) - CVSS 7.8
"CVE-2018-8581", //Microsoft Exchange Server escalation of privileges - CVSS 7.4
"CVE-2019-8394" //arbitrary pre-auth file upload to ZoHo ManageEngine ServiceDesk Plus - CVSS 6.5
]
);
DeviceTvmSoftwareVulnerabilitiesKB
| where CveId in(FireEyeCVE)
| join DeviceTvmSoftwareVulnerabilities on CveId
| project-away CveId1, VulnerabilitySeverityLevel1, AffectedSoftware

Analytic Rule Definition

id: c4c6a792-2309-4218-bd2c-13f3cbe0600f
name: fireeye-red-team-tools-CVEs [Nobelium]
description: |
  Search for the CVEs that should be prioritized and resolved to reduce the success of the FireEye Red Team tools compromised by the Nobelium activity group.
  See red_team_tool_countermeasures on the official FireEye repo.
  References:
  https://github.com/fireeye/red_team_tool_countermeasures/blob/master/CVEs_red_team_tools.md
  https://github.com/fireeye
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceTvmSoftwareVulnerabilitiesKB
  - DeviceTvmSoftwareVulnerabilities
tactics:
- Privilege escalation
- Vulnerability
tags:
- Nobelium
query: |
  let FireEyeCVE= dynamic(
  [
  "CVE-2019-11510", //pre-auth arbitrary file reading from Pulse Secure SSL VPNs - CVSS 10.0
  "CVE-2020-1472", //Microsoft Active Directory escalation of privileges - CVSS 10.0
  "CVE-2018-13379", //pre-auth arbitrary file reading from Fortinet Fortigate SSL VPN - CVSS 9.8 //no find CVE
  "CVE-2018-15961", //RCE via Adobe ColdFusion (arbitrary file upload that can be used to upload a JSP web shell) - CVSS 9.8
  "CVE-2019-0604", //RCE for Microsoft Sharepoint - CVSS 9.8
  "CVE-2019-0708", //RCE of Windows Remote Desktop Services (RDS) - CVSS 9.8
  "CVE-2019-11580", //Atlassian Crowd Remote Code Execution - CVSS 9.8
  "CVE-2019-19781", //RCE of Citrix Application Delivery Controller and Citrix Gateway - CVSS 9.8  //no find CVE
  "CVE-2020-10189", //RCE for ZoHo ManageEngine Desktop Central - CVSS 9.8
  "CVE-2014-1812", //Windows Local Privilege Escalation - CVSS 9.0
  "CVE-2019-3398", //Confluence Authenticated Remote Code Execution - CVSS 8.8
  "CVE-2020-0688", //Remote Command Execution in Microsoft Exchange - CVSS 8.8
  "CVE-2016-0167", //local privilege escalation on older versions of Microsoft Windows - CVSS 7.8
  "CVE-2017-11774", //RCE in Microsoft Outlook via crafted document execution (phishing) - CVSS 7.8
  "CVE-2018-8581", //Microsoft Exchange Server escalation of privileges - CVSS 7.4
  "CVE-2019-8394" //arbitrary pre-auth file upload to ZoHo ManageEngine ServiceDesk Plus - CVSS 6.5
  ]
  );
  DeviceTvmSoftwareVulnerabilitiesKB
  | where CveId in(FireEyeCVE)
  | join DeviceTvmSoftwareVulnerabilities on CveId
  | project-away CveId1, VulnerabilitySeverityLevel1, AffectedSoftware

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/fireeye-red-team-tools-CVEs [Nobelium].yaml