Open directory data enhancements and suspicious directory threat, graphical investigation explorer, CensEye enhancements, and more improvements in the Platform; Chrome browser extension, and registrant email domain pivoting in ASM.

Platform

Threat Hunting

  • Build node-based pivot trees to discover, visualize, and understand connections between web assets in the Censys datasets using the Investigation Manager in the Platform web UI.
  • Use the Suspicious Directory threat to find and track web assets with open directories that contain security tools, penetration testing utilities, webshells, or other potentially malicious files. Use this threat information to find hosts and web services with suspicious files before they are leveraged in attacks.
  • Leverage the open directory visual explorer and open directory parsed fields to quickly understand directory information at a glance, including file names, sizes, last modified dates, and directory structure.
  • Made several changes to the default CensEye pivot fields for hosts, web properties, and certificates, including:
    • Added TLS fingerprinting fields (JA4S, JA3S, JA4X, JARM) for better network analysis
    • Added SSH, Cobalt Strike, and protocol-specific pivots for threat detection
    • Added HTTP metadata fields (headers, favicons, body hashes) for web analysis
    • Switched favicon hashes from MD5 to SHA256 for improved security
    • Added support for specialized protocols including SCADA, Kubernetes, and SNMP

Chrome browser extension

API

  • Added the count_by_level parameter to the aggregate endpoint to allow you to specify which document level's count is returned per term bucket, primarily for nested fields. This is the same functionality available in the Count By dropdown in the Report Builder UI.

ASM

  • Added registrant email domain pivoting to the ASM attribution process during seed discovery.
    • If ASM finds the email address [email protected] associated with a domain that belongs to you, it will pivot to find other assets registered to any censys.com email address. If you accept an email domain as a seed, you will see many new registrant emails appear in the seed discovery list.
    • If you have continuous seed discovery enabled, this update may result in more frequent seed discovery emails for newly found email addresses.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

risk

Vulnerable CrushFTP [CVE-2025-54309]

CrushFTP 11 before 11.3.4_23 (update < 756), when the DMZ proxy feature is not used, is vulnerable to CVE-2025-54309 due to mishandled AS2 validation, allowing remote attackers to obtain admin access via HTTPS.

ASM risk query:

risks.name: `Vulnerable CrushFTP [CVE-2025-54309]`

software

Cisco ISE

Cisco Identity Services Engine (ISE) is a network access control and policy enforcement system that provides secure access via identity-based policies.

Platform query

Platform MCP Server for AI agents, Platform web service screenshots, and more enhancements.

Platform

  • Use the Platform Model Context Protocol (MCP) Server to give your AI agents and workflows secure, governed, and direct access to the entire Censys Internet Map and Platform APIs, empowering you to hunt, triage, and respond at machine speed.
  • Visually investigate exposed assets on the Censys Platform with recurring and on-demand web service screenshots.
  • Added HTML titles (host.services.endpoints.http.html_title and web.endpoints.http.html_title) to the default pivot fields for CensEye to quickly discover related infrastructure.
  • Use the filter_by_query parameter on Platform API aggregate endpoints to limit aggregation results to those that match your query. This functionality is equivalent to the filter checkbox in the Report Builder UI.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues.

New CensEye API endpoint, Live Rescan for all Enterprise customers, enhancements to Platform AI tool configuration, recent searches in the Platform web UI, and more.

Platform

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

risk

Vulnerable Wing FTP Server CVE-2025-47812

This Wing FTP Server is running a vulnerable version of the software that is susceptible to CVE-2025-47812, an unauthenticated remote code execution vulnerability.

ASM risk query:

risks.name = "Vulnerable Wing FTP Server CVE-2025-47812"

software

Wing FTP Server

This service is running a Wing FTP server.

Platform query

CVE risk rescan and scan data links in ASM, three new software fingerprints, and one new Rapid Response bulletin.

ASM

  • Use the ability to rescan CVE risks on host risk cards in the ASM web console to verify that a CVE risk has been closed after completing your or remediation workflows. Use the View Scan Data button to see the scan data for the service.

  • Added the ability to copy data field names from table header rows in the ASM web console to quickly search your inventory for relevant assets.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
softwareMCP InspectorMCP Inspector is a developer tool that enables inspection and debugging of Model Context Protocol workflows.Platform query
softwareBentoMLBentoML is an open-source platform designed to help developers package and deploy machine learning models.Platform query
softwareAMI MegaRAC SP-X FirmwareThis is a device running AMI MegaRAC SP-X firmware, a proprietary Linux-based platform for Baseboard Management Controllers (BMCs). MegaRAC SP-X provides out-of-band management functionality via interfaces like Redfish, IPMI, and a web GUI, and is commonly deployed in enterprise servers and datacenter hardware.Platform query

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

Five new hardware and software fingerprints and three new risks for ASM.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issue.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

hardware

Planet Router

This is a Planet Technology Corporation router or network device.

Platform query

software

Wordpress Plugin - Rank Math SEO

A very popular search engine optimization plugin for Wordpress.

Platform query

software

wordpress-plugin-wp-rocket

A wordpress performance-based plugin to speed up websites with caching.

Platform query

software

wordpress-plugin-wpforms

A wordpress plugin associated with POST forms.

Platform query

software

Wordpress Plugin - Yoast SEO

A search-engine optimization plugin for wordpress.

Platform query

risk

Vulnerable Citrix Netscaler Application [CVE-2025-6543]

This device is vulnerable to CVE-2025-6543 - A memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server, potentially leading to remote code execution.

ASM risk query:

risks.name: `Vulnerable Citrix Netscaler Application [CVE-2025-6543]`

risk

Vulnerable Citrix Netscaler Application [CVE-2025-5349, CVE-2025-5777]

This device is vulnerable to CVE-2025-5349, which involves improper access control on the NetScaler Management Interface, and CVE-2025-5777, which results from insufficient input validation leading to memory overread. Successful exploitation of CVE-2025-5349 may allow unauthorized changes or lateral movement within the network, while CVE-2025-5777 could enable attackers to read sensitive memory contents such as session tokens or credentials by hijacking sessions.

ASM risk query:

risks.name: `Vulnerable Citrix Netscaler Application [CVE-2025-5349, CVE-2025-5777]`

risk

Vulnerable Sitecore Experience Platform [CVE-2025-34509]

Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP. [CVE-2025-34509]. We cannot detect the revision number of the software, so this risk is medium confidence and assumes 10.4.1/10.3.3/10.1.4 are vulnerable.

ASM risk query:

risks.name: `Vulnerable Sitecore Experience Platform [CVE-2025-34509]`

CVE risk exploit context in ASM, two new software fingerprints, and one risk fingerprint.

ASM

  • Use new CVE risk exploit context data to help you understand, triage, and remediate risks in your attack surface.
    • New context data includes risk exploit maturity status, threat actor, botnet, and ransomware enrichment, EPSS scores, and CVSSv4 scores.

      Details, description, and threat context information on the CVE details page.

      Exploit information and links on the CVE details page.

    • CVE risk exploit context is available to all ASM Enterprise customers. ASM Advanced customers may purchase access to it.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

risk

Vulnerable Erlang OTP Instance [CVE-2025-32433]

This service is running a vulnerable version of Erlang OTP that is affected by unauthenticated remote code execution vulnerability CVE-2025-32433. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution by exploiting a flaw in SSH protocol message handling.

ASM query:

risks.name: `Vulnerable Erlang OTP Instance [CVE-2025-32433]`

software

Mottech ICC Pro Control System

ICC PRO is a control platform for centralized and remote irrigation management. It communicates with system components to monitor and control sites, providing real-time status and performance data for devices such as valves, water meters, sensors, and pumps. The software supports continuous monitoring and execution of irrigation programs.

Platform query

software

RainMachine Web Application

RainMachine is a web-based application that allows users to monitor and control their irrigation system from remote devices.

Platform query

Four new fingerprints and two Rapid Response bulletins.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

Synology VPN Plus Server

This is a Synology VPN Plus Server.

Platform query

software

3CX Web Client

The 3CX Web Client is a browser-based application that provides users with tools for communication and collaboration, including call management, video conferencing, live chat, and integration with messaging platforms such as WhatsApp, Facebook, and SMS/MMS.

Platform query

risk

Vulnerable Wazuh [CVE-2025-24016]

An unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. The vulnerability can be triggered by anybody with API access (compromised dashboard or Wazuh servers in the cluster) or, in certain configurations, even by a compromised agent.

ASM query:

risks.name: `Vulnerable Wazuh [CVE-2025-24016]`

risk

Vulnerable Roundcube [CVE-2025-49113]

This is a Roundcube server running a version of Roundcube that is vulnerable to CVE-2025-49113. Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

ASM query:

risks.name: `Vulnerable Roundcube [CVE-2025-49113]`

Platform Query Assistant beta for all users, Platform Threat Hunting module release, general availability for the Platform, two Rapid Response bulletins, several new risk fingerprints, and one new software fingerprint.

Platform

  • Quickly generate valid search Censys Query Language (CenQL) queries using natural language input with the new Query Assistant tool in the Platform web UI.
    • Query Assistant is a beta feature available to all Platform users.
  • Use the Platform Threat Hunting module to detect, analyze, and track threat infrastructure with speed and precision. The module enables you to explore the threat dataset with structured tools, historical context, and workflows. These capabilities help users validate threats in real time and uncover hidden clusters of malicious assets. The Threat Hunting module includes the following:
    • The Platform threat dataset that maps malware, threat actors, and tactics to services or endpoints running on exposed hosts and web properties.
    • Interactive Explore Threats page that provides a centralized view into internet-facing infrastructure linked to malware and threat actors. Use interactive visualizations, curated threat profiles, and simplified filtering to quickly identify relevant threats.
    • CensEye automated pivoting tool to help you identify web assets on the internet that share a specific key-value pair with an asset of interest to quickly pivot into related infrastructure.
    • Live Rescan and Discovery to run fresh scans on specific ports to instantly validate infrastructure behavior, detect configuration changes, and confirm asset persistence without waiting for scheduled Censys scans.
    • Certificate Timeline that provides a visual history of when a certificate presented itself on hosts and web properties. This visualization gives threat hunters historical context that simplifies the detection of patterns, trends, and anomalies that could signal malicious behavior.
  • The Censys Platform is now generally available to all customers.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

vBulletin

vBulletin is a PHP-based bulletin board software that is used to create and manage online forums.

Platform query

risk

Insecure SNMP Service Exposed

This service is running SNMPv1 or SNMPv2, which transmit community strings in plaintext and lack proper authentication and encryption. Attackers can easily sniff network traffic to determine community strings, enabling man-in-the-middle attacks, replay attacks, and unauthorized access to network device management functions.

ASM query:

risks.name: `Insecure SNMP Service Exposed`

risk

Vulnerable ConnectWise ScreenConnect [CVE-2025-3935]

This is a ConnectWise server is running a version vulnerable to CVE-2025-3935, a ViewState code injection attack. ASP.NET Web Forms use ViewState to preserve page and control state, with data encoded using Base64 protected by machine keys. It is important to note that to obtain these machine keys, privileged system level access must be obtained. If these machine keys are compromised, attackers could create and send a malicious ViewState to the website, potentially leading to remote code execution on the server. The risk does not originate from a vulnerability introduced by ScreenConnect, but from platform level behavior.

ASM query:

risks.name: `Vulnerable ConnectWise ScreenConnect [CVE-2025-3935]`

risk

Vulnerable vBulletin [CVE-2025-48827]

vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later

ASM query:

risks.name: `Vulnerable vBulletin [CVE-2025-48827]`

risk

ASUS Backdoor IOC

This ASUS device has SSH running on the high, ephemeral port TCP/53282, a port that has been linked with a malicious backdoor installed by the AyySSHush botnet. It's recommended to examine this device for the specific attacker-controlled SSH key associated with this botnet.

ASM query:

risks.name: `ASUS Backdoor IOC`

Sort, filter, and search options on the Collections page in the Platform web UI, two Rapid Response bulletins, and two new fingerprints.

Platform

  • Added the ability to filter by owner, filter by category, search by name or ID, and sort by creation date, last updated date, or name on the Collections page in the Platform web UI.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New fingerprints

Added the following fingerprints.

Type

Name

Description

Query

software

Samsung MagicInfo 9 Server

This is a Samsung MagicInfo server. Samsung's MagicINFO is a comprehensive digital signage software solution that enables businesses to create, publish, and manage content across various display networks

Platform query

risk

Vulnerable Ivanti Endpoint Manager Mobile [CVE-2025-4427 & CVE-2025-4428]

Vulnerable Ivanti Endpoint Manager Mobile [CVE-2025-4427 & CVE-2025-4428]

ASM query:

risks.name: `Vulnerable Ivanti Endpoint Manager Mobile [CVE-2025-4427 & CVE-2025-4428]`

Dark mode and CT logs page in the Platform web UI, improved filtering on the ASM Ports & Protocols dashboard, two new Rapid Response bulletins.

Platform

  • Added dark mode to the Platform web UI. To switch between light and dark mode, click your profile icon and use the Light Mode / Dark Mode toggle.

  • Use the new Certificate Transparency (CT) logs page in the Platform web UI to see the logs Censys monitors as well as additional certificate metadata.

    • This page always reflects the current state of Censys CT log monitoring.
    • Navigate to the page via the Help menu in the top-right corner of the Platform web console.

ASM

  • Added the ability to filter the Ports & Protocols dashboard to a specific port range.

  • Added a filter option for unknown protocols to the Ports & Protocols dashboard.

Rapid Response

The Censys Rapid Response team published information about and queries for the following issues and vulnerabilities.

New fingerprints

Added the following fingerprints.

TypeNameDescriptionQuery
riskSrimax Output Messenger RCE Vulnerability [CVE-2025-27920]This is an Srimax Output Messenger instance vulnerable to a directory traversal attack.ASM query
softwareSrimax Output MessengerSrimax Output Messenger is a software product that allows users to send and receive messages from a remote server.Platform query
softwareLantronix XPortThis is a Lantronix XPort server.Platform query