diff --git a/src/content/docs/waf/change-log/2025-04-22.mdx b/src/content/docs/waf/change-log/2025-04-22.mdx index 6823b7867c4ea5e..552e5b71d60013f 100644 --- a/src/content/docs/waf/change-log/2025-04-22.mdx +++ b/src/content/docs/waf/change-log/2025-04-22.mdx @@ -9,6 +9,12 @@ tableOfContents: false import { RuleID } from "~/components"; +Each of this week's rule releases covers a distinct CVE, with half of the rules targeting Remote Code Execution (RCE) attacks. Of the 6 CVEs covered, four were scored as critical, with the other two scored as high. + +When deciding which exploits to tackle, Cloudflare tunes into the attackers' areas of focus. Cloudflare's network intelligence provides a unique lens into attacker activity – for instance, through the volume of blocked requests related with CVE exploits after updating WAF Managed Rules with new detections. + +From this week's releases, one indicator that RCE is a "hot topic" attack type is the fact that the Oracle PeopleSoft RCE rule accounts for half of all of the new rule matches. This rule patches CVE-2023-22047, a high-severity vulnerability in the Oracle PeopleSoft suite that allows unauthenticated attackers to access PeopleSoft Enterprise PeopleTools data through remote code execution. This is particularly concerning because of the nature of the data managed by PeopleSoft – this can include payroll records or student profile information. This CVE, along with five others, are addressed with the latest detection update to WAF Managed Rules. + @@ -83,10 +89,12 @@ import { RuleID } from "~/components"; - + -
100744Oracle Access Manager - Remote Code Execution - CVE:CVE-2021-35587 + Oracle Access Manager - Remote Code Execution - CVE:CVE-2021-35587 + Log Disabled This is a New Detection
\ No newline at end of file +