On December 8, 2020, FireEye shared details on a breach which also had access to their red team tools.
Check Point covers vulnerabilities reported by FireEye with the following Threat Prevention protections:
- Pulse Connect Secure File Disclosure (CVE-2019-11510)
- Microsoft Netlogon Elevation of Privilege (CVE-2020-1472)
- Fortinet FortiOS SSL VPN Directory Traversal (CVE-2018-13379)
- Adobe ColdFusion Remote Code Execution (CVE-2018-15961)
- Microsoft SharePoint Remote Code Execution (CVE-2019-0604)
- Microsoft Remote Desktop Services Remote Code Execution (CVE-2019-0708)
- Atlassian Crowd Remote Code Execution (CVE-2019-11580)
- Citrix Multiple Products Directory Traversal (CVE-2019-19781)
- Zoho ManageEngine Remote Code Execution (CVE-2020-10189)
- Microsoft Group Policy Preferences Password Elevation of Privilege (MS14-025: CVE-2014-1812)
- Atlassian Confluence Directory Traversal (CVE-2019-3398)
- Microsoft Exchange Server Remote Code Execution (CVE-2020-0688)
- Microsoft Outlook Security Feature Bypass (CVE-2017-11774)
- Microsoft Exchange Server Privilege Escalation (CVE-2018-8581)
In addition, Threat Emulation covers CVE-2016-0167 with the protections Trojan.Wins.Generic.F and Trojan.Wins.Generic.B.
Source: sk170918