WAZUH_VERSION="v4.12.0" CLUSTER="soc-prod-01"
Last indexer sync: OK · retention 90d · ILM hot/warm
--- tail -n 12 /var/ossec/logs/alerts/alerts.json ---
{"timestamp":"…Z","rule":{"id":5503,"level":10},"agent":{"name":"edge-fw"},"data":{"srcip":"203.0.113.44"}}
{"timestamp":"…Z","rule":{"id":5710,"level":7},"agent":{"name":"web-srv-01"},"syscheck":{"path":"/etc/nginx/nginx.conf"}}
--- /var/ossec/bin/wazuh-control status ---
wazuh-clusterd not running
wazuh-modulesd is running
wazuh-monitord is running
wazuh-logcollector is running
wazuh-remoted is running
wazuh-syscheckd is running
wazuh-analysisd is running
wazuh-maild not running
wazuh-execd is running
wazuh-db is running
wazuh-authd is running
--- quick host snapshot ---
uptime: 14:22:01 up 38 days, load average: 0.41, 0.36, 0.29
Mem: 31.2Gi used · 4.1Gi avail · Swap 512Mi/2.0Gi
ss -tulpn | head: LISTEN 0.0.0.0:1514(userspace) 0.0.0.0:443(nginx) 127.0.0.1:9200(java)
iptables -L INPUT -n | head: ACCEPT est/rel · DROP invalid · LOG prefix [FW-DROP]
ausearch -m USER_LOGIN --raw 2>/dev/null | tail -1: uid=1000 tty=ssh res=success
grep -c "Failed password" /var/log/auth.log | tail window: 7 (last 15 min)
openssl s_client -connect 127.0.0.1:443 -brief 2>/dev/null | grep "Verification: OK"
- IV.35.7.d 121K
- IV.32.2 8.2K
- IV.31.1 5.1K
- other 3.4K
| PID | USER | CPU% | MEM% | COMMAND |
|---|---|---|---|---|
| 1842 | root | 2.1 | 0.4 | systemd |
| 2201 | wazuh | 4.8 | 1.2 | wazuh-manager |
| 2840 | root | 1.2 | 0.3 | sshd |
| 3011 | www-data | 3.4 | 2.1 | nginx |
| 3156 | www-data | 6.2 | 4.0 | php-fpm8.2 |
- CVE-2024-47076 CRITICAL CUPS/IPP — RCE без авторизации (Linux)
- CVE-2024-38812 CRITICAL VMware vCenter — heap overflow RCE
- CVE-2024-38063 CRITICAL Windows IPv6 TCP/IP — RCE через пакеты
- CVE-2024-6387 HIGH OpenSSH regreSSHion — RCE (glibc Linux)
- CVE-2024-3094 CRITICAL XZ Utils — backdoor в SSH (supply chain)
- CVE-2024-21412 HIGH Windows SmartScreen — обход защиты
- CVE-2024-30078 HIGH Windows Wi-Fi Driver — RCE по воздуху
- CVE-2023-44487 HIGH HTTP/2 Rapid Reset — масс. DDoS
- CVE-2023-4863 CRITICAL libwebp — heap overflow (Chrome/Firefox)
- CVE-2024-43491 CRITICAL Windows Servicing Stack — обход откатов