Views:
Table of Contents
--------------------------
  New Filters - 14
  Modified Filters (logic changes) - 18
  Modified Filters (metadata changes only) - 6
  Removed Filters - 0
  New Filters: 

    43345: HTTP: mySCADA myPRO Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in mySCADA myPRO.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-28384 CVSS 8.6
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 24, 2023

    43354: HTTP: PaperCut NG FileUploadAuthenticationFilter Authentication Bypass Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in PaperCut NG.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-3486 CVSS 6.7
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 24, 2023

    43355: HTTP: Dolibarr ERP and CRM Database Backup Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Dolibarr ERP and CRM.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2023-38886 CVSS 6.5
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 24, 2023

    43361: HTTP: win.ini File Access
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an attempt to access the file win.ini over HTTP.
      - Deployment: Not enabled by default in any deployment.
      - Classification: Security Policy - Forbidden Application Access or Service Request
      - Protocol: HTTP
      - Platform: Windows Client Application
      - Release Date: October 24, 2023

    43362: HTTP: HP SiteScope SOAP Call APIPreferenceImpl Multiple Security Bypass Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects requests by unauthenticated clients to update login credentials for arbitrary users in HP SiteScope.
      - Deployments:
        - Deployment: Default (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2012-3261 CVSS 10.0
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 24, 2023

    43363: TCP: Suspicious HP Data Protector CRS Response
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a suspicious response to HP Data Protector CRS request.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2013-6195 CVSS 10.0
      - Classification: Security Policy - Other
      - Protocol: TCP (Generic)
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 24, 2023

    43364: ZDI-CAN-22079: Zero Day Initiative Vulnerability (Microsoft Exchange)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Microsoft Exchange.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43366: ZDI-CAN-21447: Zero Day Initiative Vulnerability (Trend Micro Apex Central)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Trend Micro Apex Central.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43367: ZDI-CAN-21495: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Trend Micro InterScan Web Security Virtual Appliance.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43368: ZDI-CAN-21539: Zero Day Initiative Vulnerability (Sante PACS Server)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Sante PACS Server.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43369: ZDI-CAN-21953: Zero Day Initiative Vulnerability (Ivanti Avalanche)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ivanti Avalanche.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43379: ZDI-CAN-21954: Zero Day Initiative Vulnerability (Arista NG Firewall)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Arista NG Firewall.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43380: ZDI-CAN-22102: Zero Day Initiative Vulnerability (Microsoft Exchange)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Microsoft Exchange.
      - Deployments:
        - Deployment: Default (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

    43381: ZDI-CAN-22127: Zero Day Initiative Vulnerability (Inductive Automation Ignition)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Inductive Automation Ignition.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 24, 2023

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 12705: SMB: Microsoft Remote Administration Protocol Stack Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Release Date: January 15, 2013
      - Last Modified Date: October 24, 2023

    * 12840: SMB: Microsoft Remote Administration Protocol Heap Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Release Date: March 19, 2013
      - Last Modified Date: October 24, 2023

    13761: HTTP: HP OpenView Performance Agent Multiple Opcodes Communication
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: April 01, 2014
      - Last Modified Date: October 24, 2023

    13990: TCP: HP Data Protector Multiple Opcodes Parsing Code Execution Vulnerability (ZDI-14-002)
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: July 01, 2014
      - Last Modified Date: October 24, 2023

    13999: TCP: HP Data Protector Opcode Parsing Directory Traversal Vulnerability (ZDI-14-003)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "13999: TCP: HP Data Protector Opcode Parsing Directory Traversal (ZDI-14-003)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Deployments updated and are now:
        - Deployment: Security-Optimized (Block / Notify)
      - Release Date: May 27, 2014
      - Last Modified Date: October 24, 2023

    17160: TCP: HP LeftHand Virtual SAN Appliance Hydra Login Buffer Overflow Vulnerability (ZDI-13-179)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: May 19, 2015
      - Last Modified Date: October 24, 2023

    19225: TCP: Realtek miniigd Command Injection Vulnerability (ZDI-15-155)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "19225: UPnP: Realtek miniigd Command Injection Vulnerability (ZDI-15-155)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 06, 2015
      - Last Modified Date: October 24, 2023

    28093: SCTP: Linux Kernel SCTP sctp_sf_ootb Out-of-Bounds Read Vulnerability
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Release Date: May 09, 2017
      - Last Modified Date: October 24, 2023

    29892: TCP: Adobe ColdFusion RMI Registry Insecure Deserialization Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: January 16, 2018
      - Last Modified Date: October 24, 2023

    41866: HTTP: D-Link DAP-1325 SetAPLanSettings Buffer Overflow Vulnerability (ZDI-23-1504,1505,1506)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41866: ZDI-CAN-18808-18814,18825-18831,18840,18841: Zero Day Initiative Vulnerability (D-Link DAP-1325)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 25, 2022
      - Last Modified Date: October 24, 2023

    41870: HTTP: D-Link DAP-1325 get_value_of_key Stack-based Buffer Overflow Vulnerability (ZDI-23-1503)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41870: ZDI-CAN-18815-18819,18824: Zero Day Initiative Vulnerability (D-Link DAP-1325)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 25, 2022
      - Last Modified Date: October 24, 2023

    41876: HTTP: D-Link DAP-1325 SetSetupWizardStatus Stack-based Buffer Overflow Vulnerability (ZDI-23-1507)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41876: ZDI-CAN-18821,18838: Zero Day Initiative Vulnerability (D-Link DAP-1325)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 25, 2022
      - Last Modified Date: October 24, 2023

    42226: HTTP: D-Link D-View uploadMib Directory Traversal Arbitrary Vulnerability (ZDI-23-717,ZDI-23-718)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 31, 2023
      - Last Modified Date: October 24, 2023

    42396: HTTP: NETGEAR ProSAFE Network Management System Unrestricted File Upload Vulnerability (ZDI-23-918)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: February 28, 2023
      - Last Modified Date: October 24, 2023

    42475: HTTP: LG Simple Editor deleteCheckSession Directory Traversal Vulnerability (ZDI-23-1198)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 14, 2023
      - Last Modified Date: October 24, 2023

    42490: HTTP: LG Simple Editor saveXml Directory Traversal Vulnerability (ZDI-23-1203)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: March 14, 2023
      - Last Modified Date: October 24, 2023

    42544: HTTP: Microsoft SharePoint Authentication Bypass Vulnerability (Pwn2Own ZDI-23-882)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 04, 2023
      - Last Modified Date: October 24, 2023

    43335: HTTP: HTTP Redirect with Invalid Host Name
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Detection logic updated.
      - Release Date: October 17, 2023
      - Last Modified Date: October 24, 2023

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    41496: HTTP: Delta Industrial Automation DIAEnergie Authentication Bypass Vulnerability (ZDI-22-1453)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: July 12, 2022
      - Last Modified Date: October 24, 2023

    41630: HTTP: Ansys SpaceClaim X_B File Parsing Out-Of-Bounds Write Vulnerability (ZDI-23-1498)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41630: ZDI-CAN-17827: Zero Day Initiative Vulnerability (Ansys SpaceClaim)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 16, 2022
      - Last Modified Date: October 24, 2023

    41808: HTTP: A10 Thunder ADC FileMgmtExport Directory Traversal Vulnerability (ZDI-23-1496)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "41808: ZDI-CAN-17905: Zero Day Initiative Vulnerability (A10 Thunder ADC)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: October 04, 2022
      - Last Modified Date: October 24, 2023

    42261: HTTP: D-Link DAP-2622 Telnet CLI Command Injection Vulnerability (ZDI-23-1514)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "42261: ZDI-CAN-20051: Zero Day Initiative Vulnerability (D-Link DAP-2622)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 07, 2023
      - Last Modified Date: October 24, 2023

    42425: TCP: Inductive Automation Ignition OPC UA Cross-Site Scripting Vulnerability (Pwn2Own ZDI-23-1012)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 07, 2023
      - Last Modified Date: October 24, 2023

    43097: HTTP: Citrix ShareFile Storage Zones Controller ProcessRawPostedFile Directory Traversal
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Miscellaneous modification.
      - Release Date: August 08, 2023
      - Last Modified Date: October 24, 2023

  Removed Filters: None