Rule Category
SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
Alert Message
SERVER-WEBAPP Adobe Experience Manager adminui authentication bypass attempt
Rule Explanation
This rule looks for attempts to bypass authentication in Adobe Experience Manager by including "login." as a path parameter.
What To Look For
This rule looks for attempts to exploit an authentication bypass and arbitrary code execution vulnerability in Adobe Experience Manager web applications.
Known Usage
Attacks/Scans seen in the wild
False Positives
No known false positives
Contributors
Cisco Talos Intelligence Group
Rule Groups
Rule Categories::Server::Web Applications
Rules for detecting attacks against miscellaneous Web applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other applications with Internet accessible open sockets, such as web servers and related services.
T1190
Additional Links
Rule Vulnerability
Authentication Bypass
An Authentication Bypass occurs when there is a way to avoid providing user credentials to a system before performing restricted operations on said system.
CVE Additional Information
This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2025-54253
|
Loading description
|
|
| Severity | |
Base Score | |
| Impact Score | |
Exploit Score | |
| Confidentiality Impact | |
Integrity Impact | |
| Availability Impact | |
| Authentication | |
Ease of Access | |
|