Skip to main content

Test-MtXspmPublicRemotelyExploitableHighExposureDevices

SYNOPSIS

Test to find public exposed devices with remotely exploitable, highly likely to be exploited, high or critical severity CVE's

SYNTAX

Test-MtXspmPublicRemotelyExploitableHighExposureDevices [-ProgressAction <ActionPreference>]
[<CommonParameters>]

DESCRIPTION

Test to find devices that comply to the following:

  • Incoming connections from public IP addresses in the last 7 days (internet exposed)
  • High or Critical severity CVE's
  • CVE's must have known exploits
  • CVE's are remotely exploitable over the network
  • No user interaction required to exploit CVE's
  • EPSS score of CVE must be above 10% (likelihood of exploitation)

EXAMPLES

EXAMPLE 1

Test-MtXspmPublicRemotelyExploitableHighExposureDevices

PARAMETERS

-ProgressAction

{{ Fill ProgressAction Description }}

Type: ActionPreference
Parameter Sets: (All)
Aliases: proga

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

[bool] - Returns $true if no devices are found, $false if any are found, $null if skipped or prerequisites not met.

NOTES

https://maester.dev/docs/commands/Test-MtXspmPublicRemotelyExploitableHighExposureDevices