New Filters:
40026: ZDI-CAN-23074: Zero Day Initiative Vulnerability (Papercut NG)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Papercut NG.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Performance-Optimized (Disabled)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: February 13, 2024
40065: ZDI-CAN-22328: Zero Day Initiative Vulnerability (Papercut NG)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Papercut NG.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: February 13, 2024
42983: HTTP: Paessler PRTG Network Monitor Cross-Site Scripting Vulnerability (ZDI-24-073)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Paessler PRTG.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-51630 CVSS 8.8
- Zero Day Initiative: ZDI-24-073
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: February 13, 2024
43568: HTTP: Ivanti Connect and Policy Secure SAML Component Server-Side Request Forgery Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a sever-side request forgery vulnerability in Ivanti Connect and Policy Secure.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2024-21893
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: February 13, 2024
43678: HTTP: Cacti Group Cacti managers.php SQL Injection Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a SQL injection vulnerability in Cacti Group Cacti.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-51448 CVSS 6.7
- Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
- Protocol: HTTP
- Platform: Multi-Platform Server Application or Service
- Release Date: February 13, 2024
43784: HTTP: Arcserve UDP Directory Traversal Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter detects an attempt to exploit a directory traversal vulnerability in Arcserve UDP.
- Deployments:
- Deployment: Security-Optimized (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-42000
- Classification: Vulnerability - Other
- Protocol: HTTP
- Platform: Multi-Platform Client Application
- Release Date: February 13, 2024
43785: HTTP: GNU GIMP PSP Image Channel Block Buffer Overflow Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Category: Exploits
- Severity: Critical
- Description: This filter detects an attempt to exploit a buffer overflow vulnerability in GNU Image Manipulation Program (GIMP).
- Deployments:
- Deployment: Default (Block / Notify)
- References:
- Common Vulnerabilities and Exposures: CVE-2023-44444
- Classification: Vulnerability - Buffer/Heap Overflow
- Protocol: HTTP
- Platform: Multi-Platform Client Application
- Release Date: February 13, 2024
43786: ZDI-CAN-22812: Zero Day Initiative Vulnerability (Papercut NG)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Category: Vulnerabilities
- Severity: Critical
- Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Papercut NG.
- Deployments:
- Deployment: Default (Block / Notify / Trace)
- Deployment: Performance-Optimized (Disabled)
- Classification: Vulnerability - Other
- Protocol: Other Protocol
- Platform: Other Server Application or Service
- Release Date: February 13, 2024
Modified Filters (logic changes):
* = Enabled in Default deployments
43317: HTTP: Ivanti Avalanche FileStoreConfig Arbitrary File Upload Vulnerability (ZDI-24-056)
- IPS Version: 3.9.5 and after.
- TPS Version: 4.0.0 and after.
- vTPS Version: 4.0.1 and after.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: October 10, 2023
- Last Modified Date: February 13, 2024
43543: HTTP: Lexmark CX331adwe Missing Authentication Vulnerability (Pwn2Own ZDI-24-084)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43543: ZDI-CAN-22520: Zero Day Initiative Vulnerability (Lexmark CX331adwe)".
- Description updated.
- Detection logic updated.
- Vulnerability references updated.
- Release Date: December 12, 2023
- Last Modified Date: February 13, 2024
* 43700: HTTP: Microsoft Windows Internet Shortcut SmartScreen Bypass Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: January 17, 2024
- Last Modified Date: February 13, 2024
* 43702: ZDI-CAN-22890: Zero Day Initiative Vulnerability (Linux Kernel)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: Not available.
- Requires: IPS N-Platform, NX-Platform, or TPS models.
- Detection logic updated.
- Release Date: January 23, 2024
- Last Modified Date: February 13, 2024
* 43766: HTTP: Jenkins CI Server Arbitrary File Read Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Detection logic updated.
- Release Date: February 06, 2024
- Last Modified Date: February 13, 2024
Modified Filters (metadata changes only):
* = Enabled in Default deployments
* 43257: HTTP: Microsoft Exchange IsUNCPath Improper Input Validation NTLM Relay Vulnerability (ZDI-23-1637)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Vulnerability references updated.
- Release Date: September 19, 2023
- Last Modified Date: February 13, 2024
43544: HTTP: Lexmark CX331adwe PostScript File Parsing Memory Corruption Vulnerability (Pwn2Own ZDI-24-083)
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43544: ZDI-CAN-22445: Zero Day Initiative Vulnerability (Lexmark CX331adwe)".
- Description updated.
- Vulnerability references updated.
- Release Date: December 12, 2023
- Last Modified Date: February 13, 2024
* 43701: HTTP: Microsoft Windows SmartScreen Internet Shortcut Files Security Feature Bypass Vulnerability
- IPS Version: 3.9.5 and after.
- TPS Version: 5.2.2 and after.
- vTPS Version: 5.2.2 and after.
- Name changed from "43701: ZDI-CAN-23100: Zero Day Initiative Vulnerability (Microsoft Windows SmartScreen)".
- Description updated.
- Vulnerability references updated.
- Release Date: January 17, 2024
- Last Modified Date: February 13, 2024
Removed Filters: None
|