Frequently Asked Questions

Vulnerability & Threat Intelligence

What is CVE-2019-18935 and how is it exploited?

CVE-2019-18935 is a critical vulnerability in Telerik UI for ASP.NET AJAX that allows remote code execution. Threat actors exploit it by uploading and executing malicious DLL files on vulnerable IIS servers. Exploitation often requires knowledge of Telerik RadAsyncUpload encryption keys, which can be obtained through prior knowledge or by exploiting other vulnerabilities such as CVE-2017-11357 or CVE-2017-11317 in older, unpatched versions of Telerik.

What attack techniques are used to exploit CVE-2019-18935?

Attackers upload malicious DLL files, sometimes disguised as PNG images, to the C:\Windows\Temp directory and execute them via the w3wp.exe process. Techniques include timestomping to obfuscate file creation times, masquerading DLLs as images, and deleting forensic artifacts to evade detection.

What indicators of compromise (IOCs) are associated with CVE-2019-18935 exploitation?

IOCs include malicious files named in Unix Epoch time format, fake PNG files containing executable code, removal of forensic artifacts (such as DLL files), and communication with threat actors' C2 servers, especially when execution is blocked due to permission restraints.

Who are the main threat actors exploiting this vulnerability?

CISA and partner organizations observed multiple threat actors, including an advanced persistent threat (APT) actor (TA1) and the cybercriminal group XE Group (TA2), exploiting CVE-2019-18935. TA1 focused on system enumeration and defense evasion, while TA2 used masquerading techniques and reverse shell utilities for command and control.

What mitigation strategies are recommended for CVE-2019-18935?

Recommended strategies include patching Telerik UI for ASP.NET AJAX to the latest version, restricting file execution in IIS directories (especially C:\Windows\Temp), monitoring for IOC activity, enhancing endpoint detection and response (EDR) capabilities, and applying least privilege principles to service accounts.

How does Cymulate help organizations validate their defenses against threats like CVE-2019-18935?

Cymulate enables organizations to simulate real-world attacks, including those exploiting vulnerabilities like CVE-2019-18935, to validate their security controls, detect gaps, and prioritize remediation. The platform provides continuous threat validation, actionable insights, and automated testing to ensure defenses are effective against current and emerging threats.

What are the main techniques used by attackers to evade detection when exploiting IIS servers?

Attackers use techniques such as timestomping to alter file timestamps, masquerading DLL files as PNG images, and deleting forensic artifacts to evade detection and hinder incident response efforts.

How can organizations monitor for signs of exploitation related to CVE-2019-18935?

Organizations should monitor for anomalous file creation in C:\Windows\Temp, look for files with Unix Epoch-based naming conventions, detect fake PNG files containing executable code, and watch for suspicious C2 traffic over unencrypted TCP on port 443. Enhanced EDR solutions can help identify and block exploitation attempts in real time.

What is the significance of the w3wp.exe process in these attacks?

The w3wp.exe process is a legitimate IIS worker process that handles web requests. Attackers exploit it to execute malicious DLL files, allowing them to run code with the privileges of the IIS service and evade basic detection mechanisms.

How does Cymulate's Threat Validation solution differ from manual penetration tests?

Cymulate's Threat Validation provides automated, continuous security testing with a library of over 100,000 attack actions aligned to MITRE ATT&CK and daily threat intelligence. Unlike manual pen tests, which are infrequent and resource-intensive, Cymulate offers out-of-the-box integrations, automated mitigation, and actionable remediation, enabling organizations to validate both prevention and detection controls efficiently.

Features & Capabilities

What are the key features of Cymulate's Exposure Management Platform?

Cymulate's platform offers continuous threat validation, unified Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), exposure analytics, attack path discovery, automated mitigation, AI-powered optimization, and an extensive threat library with over 100,000 attack actions updated daily.

How does Cymulate support threat-informed defense strategies?

Cymulate Exposure Validation continuously tests security controls against the latest threats and attack techniques, ensuring defenses are always prepared for current and emerging adversarial methods. This supports a threat-informed defense by aligning validation with real-world tactics and techniques.

What is Cymulate's 'Threat (IoC) updates' feature and how does it improve resilience?

The 'Threat (IoC) updates' feature provides recommended Indicators of Compromise (IoCs) that can be exported via the UI or API in plain text or STIX format. This enables control owners to quickly build defenses against new threats, improving overall threat resilience.

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore (network security), AWS GuardDuty (cloud security), BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a full list, visit our Partnerships and Integrations page.

How does Cymulate automate mitigation of threats?

Cymulate's Automated Mitigation feature integrates with security controls to push updates for immediate prevention of threats. This reduces manual effort and ensures rapid response to new vulnerabilities and attack techniques.

What certifications and compliance standards does Cymulate meet?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications. These cover security, availability, confidentiality, privacy, and cloud security controls, ensuring robust compliance for enterprise customers. More details are available on Security at Cymulate.

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC). The platform includes mandatory 2FA, RBAC, IP restrictions, and is GDPR compliant with a dedicated privacy and security team.

How frequently is Cymulate's platform updated?

Cymulate updates its SaaS platform every two weeks, adding new features such as AI-powered SIEM rule mapping and advanced exposure prioritization to ensure customers always have access to the latest capabilities.

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. The platform addresses the unique needs of each role, from strategic oversight to operational efficiency and advanced adversary simulation.

What measurable outcomes have customers achieved with Cymulate?

Customers have reported up to an 81% reduction in cyber risk (Hertz Israel, four months), a 52% reduction in critical exposures, a 60% increase in team efficiency, and a 20-point improvement in threat prevention. These outcomes are documented in public case studies and customer testimonials.

How does Cymulate help organizations with fragmented security tools?

Cymulate integrates exposure data and automates validation, providing a unified view of the security posture. This helps organizations overcome gaps in visibility and control caused by disconnected tools.

How does Cymulate address resource constraints in security teams?

Cymulate automates manual processes, improves operational efficiency, and enables teams to focus on strategic initiatives rather than repetitive tasks. This is especially valuable for teams with limited resources.

How does Cymulate help prioritize vulnerabilities and exposures?

The platform validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, helping organizations focus on the most critical vulnerabilities.

What are some real-world use cases for Cymulate?

Use cases include reducing cyber risk (Hertz Israel), scaling penetration testing (sustainable energy company), proactive security validation (credit union), improving detection in hybrid/cloud environments (Nemours Children's Health), and proving compliance for audits (Saffron Building Society). See more at Cymulate Case Studies.

How does Cymulate support communication between security leaders and stakeholders?

Cymulate provides quantifiable metrics and insights tailored to different roles, enabling CISOs and security leaders to justify investments, communicate risks, and align security strategies with business objectives.

How does Cymulate help with post-breach recovery?

Cymulate enhances visibility and detection capabilities, enabling organizations to recover faster after a breach by replacing manual processes with automated validation and actionable insights.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and ease of implementation. Testimonials highlight the platform's simplicity, actionable insights, and accessible support, making it effective for users of all skill levels.

Pricing & Implementation

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected for testing. For a personalized quote, schedule a demo with the Cymulate team.

How easy is it to implement Cymulate?

Cymulate is designed for quick, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately, and comprehensive support is available via email, chat, webinars, and a knowledge base.

What support resources are available for Cymulate customers?

Cymulate offers email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for real-time assistance and best practices. Support is accessible at [email protected] and via the chat support page.

What are the technical requirements for deploying Cymulate?

Cymulate operates in agentless mode and does not require additional hardware or dedicated servers. Customers are responsible for providing necessary infrastructure and third-party software as per Cymulate's prerequisites, but the platform is designed for seamless integration into existing workflows.

Company & Industry Leadership

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment where organizations can achieve lasting improvements in cybersecurity strategies. Learn more on our About Us page.

What industry recognition has Cymulate received?

Cymulate has been named a Customers' Choice in the 2025 Gartner Peer Insights, recognized as a market leader by Frost & Sullivan, and rated #1 by customers on G2. These accolades reflect Cymulate's commitment to innovation and customer satisfaction.

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and exposure analytics, continuous 24/7 validation, AI-powered optimization, ease of use, and measurable outcomes. Unlike competitors focused on point-in-time assessments, Cymulate offers real-time, automated testing and actionable insights for all user segments.

What is Gartner's prediction regarding threat exposure findings by 2028?

Gartner predicts that by 2028, more than half of threat exposure findings will result from nontechnical vulnerabilities, requiring a fundamental shift in security priorities as these risks surpass traditional IT concerns. Read more.

What are the main challenges Continuous Threat Exposure Management (CTEM) addresses?

CTEM helps security leaders manage the increasing number of threats, proliferation of security tools, and lack of clear answers. It provides a proactive framework to prioritize and mitigate exposures, reducing the risk of breaches and improving operational efficiency.

Where can I download the Threat Exposure Validation Impact Report 2025?

You can download the full report for detailed insights on CTEM, automation, AI, and threat prevention at this link.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

US Cert Alert - Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server

March 15, 2023

This version (2013.2.717) of Telerik UI for ASP.NET AJAX contains the following known vulnerabilities: CVE-2017-11357, CVE-2017-11317, and CVE-2017-9248. Analysis suggests that cyber threat actors exploited CVE-2019-18935 in conjunction with either CVE-2017-11357 or CVE-2017-11317.

Australian Cyber Security Centre (ACSC) Advisory 2020-004 assesses that exploitation of CVE-2019-18935 is only possible with knowledge of Telerik RadAsyncUpload encryption keys. Threat actors can obtain these keys through either prior knowledge or exploitation of vulnerabilities—CVE-2017-11357 or CVE-2017-11317—present in older, unpatched versions of Telerik released between 2007 and 2017. Forensic evidence is not available to definitively confirm exploitation of either CVE-2017-11357 or CVE-2017-11317.

Exploitation of CVE-2019-18935

Threat actors have actively exploited CVE-2019-18935 in targeted attacks. The vulnerability allows attackers to execute remote code by uploading and executing malicious DLL files on vulnerable IIS servers running Telerik UI for ASP.NET AJAX.

Threat Actor Activity and Attack Methods

CISA and authoring organizations observed multiple cyber threat actors, including an APT actor—hereafter referred to as Threat Actor 1 (TA1)—and known cybercriminal actor XE Group—hereafter referred to as Threat Actor 2 (TA2). These actors conducted reconnaissance and scanning activities [T1595.002] that correlated with the successful exploitation of CVE-2019-18935 in an agency’s IIS server.

Techniques Used in the Attack

When exploiting the vulnerability, the threat actors uploaded malicious dynamic-link library (DLL) files (some masqueraded as portable network graphics [PNG] files) [T1105] to the C:\Windows\Temp directory. These malicious files were executed via the w3wp.exe process—a legitimate process that runs on IIS servers to handle web requests.

Review of antivirus logs identified that some DLL files were created [T1055.001] and detected as early as August 2021. Threat actors used a unique Unix Epoch-based file naming convention, such as [10 digits].[7 digits].dll (e.g., 1667203023.5321205.dll). The uncorrelated timestamps suggest the use of timestomping [T1070.006] to obfuscate activity.

Indicators of Compromise (IOCs)

  • Malicious files named in Unix Epoch time format.
  • Fake PNG files containing executable code.
  • Removal of forensic artifacts using malware that deletes .dll files [T1070.004].
  • Communication with threat actors’ C2 servers when execution was blocked due to permission restraints.

Threat Actor 1 (TA1) Operations

CISA and authoring organizations observed TA1 exploiting CVE-2019-18935 for system enumeration beginning in August 2022. TA1 successfully uploaded and executed at least nine DLL files for discovery [TA0007], C2 [TA0011], and defense evasion [TA0005].

All analyzed samples collected and communicated network parameters—including host name, domain name, IP address, and NetBIOS ID—to C2 servers at 137.184.130[.]162 or 45.77.212[.]12. C2 traffic used an unencrypted TCP protocol over port 443 [T1095]. Additional analysis revealed that:

  • Some samples loaded additional libraries, enumerated system files, and wrote new files [T1083].
  • Other samples deleted .dll files from C:\Windows\Temp to erase traces.

Threat Actor 2 (TA2) Operations

TA2—identified as likely the cybercriminal actor XE Group—frequently uses the "xe[word]" naming convention in file names and registered domains. As early as August 2021, TA2 delivered malicious PNG files that were actually DLL files masquerading as images to evade detection [T1036.005].

Similar to TA1, TA2 exploited CVE-2019-18935 to upload at least three unique DLL files to the C:\Windows\Temp directory and execute them via the w3wp.exe process. These DLL files dropped and executed reverse shell utilities to communicate with C2 servers.

Defensive Measures and Mitigation Strategies

To mitigate the risks associated with CVE-2019-18935 and related vulnerabilities, organizations should:

  • Patch Telerik UI for ASP.NET AJAX: Apply the latest security updates to eliminate vulnerabilities.
  • Restrict File Execution in IIS Directories: Limit execution of untrusted files in C:\Windows\Temp.
  • Monitor for IOC Activity: Detect anomalous file creation, timestomping, and C2 traffic.
  • Enhance Endpoint Detection & Response (EDR) Capabilities: Implement solutions that identify and block exploitation attempts in real time.
  • Use Least Privilege Principles: Restrict service account permissions to limit attackers’ ability to execute malicious code.

Organizations should implement these measures to prevent further exploitation of CVE-2019-18935 and related threats.