September 2, 2025
1 day ago
Cloud CDN Identification for ASM.
ASM
- Use Cloud CDN Identification with ASM Cloud Connectors to understand CDN presence in your attack surface.
- Cloud CDN Identification finds Azure Front Door CDN and AWS CloudFront software and reports it in the software data provided for host services and web entity instances. You can search for these Cloud CDNs in your inventory by performing a full-text search for the applicable service (such as "CloudFront" or "Front Door") or by searching for the product name in
host.services.software.product
orweb_entity.instances.software.product
. - All newly set up Azure and AWS Cloud Connectors will ingest cloud CDN information by default. Customers with existing Azure and AWS Cloud Connector configurations need to manually update their Cloud Connectors to begin ingesting this data. To update your Cloud Connector to ingest Cloud CDN data:
- In the ASM web console, go to Integrations, find your Cloud Connector integration, and click Manage.
- In the configuration panel, click Edit Configuration, then click Next Step. Click Next Step again.
- Click Close. Your Cloud Connector is now updated.
- Cloud CDN Identification finds Azure Front Door CDN and AWS CloudFront software and reports it in the software data provided for host services and web entity instances. You can search for these Cloud CDNs in your inventory by performing a full-text search for the applicable service (such as "CloudFront" or "Front Door") or by searching for the product name in
New fingerprints
Added the following fingerprint.
Type | Name | Description | Query |
---|---|---|---|
risk | Vulnerable Citrix Netscaler Application [CVE-2025-7775, CVE-2025-7776, CVE-2025-8424] | This device is vulnerable to multiple critical CVEs: CVE-2025-7775 (memory overflow leading to pre-authentication remote code execution and DoS), CVE-2025-7776 (memory overflow causing unpredictable behavior and DoS), and CVE-2025-8424 (improper access control on management interface). These vulnerabilities have been actively exploited in the wild since June 2025. | ASM query:
|