April 2, 2025

This release includes Collections for the Platform and risk evidence for ASM.

For product updates from before April 2, 2025, please refer to the product updates section of the Censys Community.

Censys Platform

  • Use Collections to track and monitor the results of a Censys query over time. 
    • Save time and resources by creating a collection and configuring alerts to track new assets that match your queries. 
    • Collections track both additions and subtractions to assets that match your queries.
    • Configure collection webhooks to receive real-time alerts for any changes within your collections.
    • Collections are currently available to Platform Starter users.
    • Learn more about Collections in the Censys Academy.

Censys ASM

  • Use risk evidence to understand how Censys ASM detected a risk and determine whether a risk requires further validation before it is prioritized for remediation. 
    • Risk evidence links directly to the scan data that includes the evidence for risk. This enables you to accelerate your investigations and use Censys data to find and close risks faster.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New protocols

Added support for the following protocols.

ProtocolQuery
CHECK_MK_AGENTPlatform query
NATS_IOPlatform query

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
riskExposed Kubernetes Ingress NGINX Admission ControllerThe affected service exposes a Kubernetes Ingress NGINX Admission Controller. This controller is vulnerable to multiple critical unauthenticated Remote Code Execution vulnerabilities collectively known as "IngressNightmare" (CVE-2025-1974, CVE-2025-24514, CVE-2025-1097, CVE-2025-1098, CVE-2025-24513). Exploitation can lead to unauthorized access to all secrets stored across all namespaces in the Kubernetes cluster, which could result in complete cluster takeover.ASM query
riskVulnerable Next.js [CVE-2025-29927]Next.js contains a vulnerability that could allow an attacker to execute arbitrary code through a specially crafted request. This affects versions 11.1.4 through 12.3.5, 13.0.0 through 13.5.9, 14.0.0 through 14.2.25, and 15.0.0 through 15.2.3.ASM query