Rule Category


Alert Message

MALWARE-OTHER Win.Exploit.CVE_2023_28310 download attempt

Rule Explanation

This rule looks for serialized data containing the type "System.Windows.Markup.XamlReader[][]" and malicious XAML that runs a command.

What To Look For

This rule alerts on an attempt to download a PowerShell script that exploits a remote-code execution vulnerability in Microsoft Exchange Server.

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

Rule Groups

No rule groups



Additional Links

Rule Vulnerability

No information provided

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.