Skip to content

Commit 9a71581

Browse files
committed
[WAF] Add note to 2025-04-22 changelog entry
1 parent 29028c2 commit 9a71581

File tree

1 file changed

+10
-2
lines changed

1 file changed

+10
-2
lines changed

src/content/docs/waf/change-log/2025-04-22.mdx

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,18 @@ import { RuleID } from "~/components";
8383
<RuleID id="410317f1e32b41859fa3214dd52139a8" />
8484
</td>
8585
<td>100744</td>
86-
<td>Oracle Access Manager - Remote Code Execution - CVE:CVE-2021-35587</td>
86+
<td>
87+
Oracle Access Manager - Remote Code Execution - CVE:CVE-2021-35587
88+
</td>
8789
<td>Log</td>
8890
<td>Disabled</td>
8991
<td>This is a New Detection</td>
9092
</tr>
9193
</tbody>
92-
</table>
94+
</table>
95+
96+
Each of this week's rule releases covers a distinct CVE, with half of the rules targeting Remote Code Execution (RCE) attacks. Of the 6 CVEs covered, four were scored as critical, with the other two scored as high.
97+
98+
When deciding which exploits to tackle, Cloudflare tunes into the attackers' areas of focus. Cloudflare's network intelligence provides a unique lens into attacker activity – for instance, through the volume of blocked requests related with CVE exploits after updating WAF Managed Rules with new detections.
99+
100+
From this week's releases, one indicator that RCE is a "hot topic" attack type is the fact that the Oracle PeopleSoft RCE rule accounts for half of all of the new rule matches. This rule patches CVE-2023-22047, a high-severity vulnerability in the Oracle PeopleSoft suite that allows unauthenticated attackers to access PeopleSoft Enterprise PeopleTools data through remote code execution. This is particularly concerning because of the nature of the data managed by PeopleSoft – this can include payroll records or student profile information. This CVE, along with five others, are addressed with the latest detection update to WAF Managed Rules.

0 commit comments

Comments
 (0)