Views:
Table of Contents
--------------------------
  New Filters - 9
  Modified Filters (logic changes) - 2
  Modified Filters (metadata changes only) - 5
  Removed Filters - 0
  New Filters: 

    45207: RDP: Microsoft Windows Remote Desktop Protocol Server WebSocketServer Usage
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects usage of RDP WebSocketServer Usage.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-43582
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Windows Client Application
      - Release Date: December 31, 2024

    45208: RDP: Microsoft Windows Remote Desktop Protocol Server WebSocketServer Use-After-Free Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use after free vulnerability in vulnerable installations of Microsoft Remote Desktop Protocol.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-43582
      - Classification: Vulnerability - Other
      - Protocol: TCP (Generic)
      - Platform: Windows Client Application
      - Release Date: December 31, 2024

    45234: HTTP: D-Link NAS OS Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an OS command injection vulnerability in D-Link NAS DNS-320, 320LW, 325, and DNS-340L.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-10914
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: December 31, 2024

    45240: TCP: Digium Asterisk Unsafe Application Function Usage
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects the usage of a certain unsafe function within a certain application in Asterisk.
      - Deployments:
        - Deployment: Performance-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-42365
      - Classification: Security Policy - Other
      - Protocol: TCP (Generic)
      - Platform: Multi-Platform Server Application or Service
      - Release Date: December 31, 2024

    45244: HTTP: WordPress NotificationX Plugin SQL Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a SQL injection vulnerability in the WordPress NotificationX plugin.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2022-0349
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: December 31, 2024

    45245: HTTP: Jenkins Simple Queue Plugin Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in the Simple Queue plugin for Jenkins.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-54003
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: December 31, 2024

    45246: ZDI-CAN-26065: Zero Day Initiative Vulnerability (WS02 API Manager)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting WS02 API Manager.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: December 31, 2024

    45247: ZDI-CAN-25779: Zero Day Initiative Vulnerability (Canon imageCLASS MF656Cdw)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Canon imageCLASS MF656Cdw.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: December 31, 2024

    45248: HTTP: LibreNMS Device Overview Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in LibreNMS.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-50352
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: UNIX/Linux Server Application or Service
      - Release Date: December 31, 2024

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    44197: HTTP: Webmin CGI Command Injection Vulnerability (ZDI-24-1725)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44197: ZDI-CAN-22346: Zero Day Initiative Vulnerability (Webmin)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 30, 2024
      - Last Modified Date: December 31, 2024

    44583: HTTP: Veritas Enterprise Vault MobileHTMLView Cross-Site Scripting Vulnerability (ZDI-24-1659-1662)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44583: ZDI-CAN-24695,24696,24697,24698: Zero Day Initiative Vulnerability (Veritas Enterprise Vault)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 06, 2024
      - Last Modified Date: December 31, 2024

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    44636: HTTP: Fuji Electric Monitouch V-SFT V10 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1620)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44636: ZDI-CAN-24504: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: December 31, 2024

    44637: HTTP: Fuji Electric Monitouch V-SFT X1 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1624)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44637: ZDI-CAN-24663: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: December 31, 2024

    44638: HTTP: Fuji Electric Monitouch V-SFT V10 Stack-based Buffer Overflow Vulnerability (ZDI-24-1616)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44638: ZDI-CAN-24449: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: December 31, 2024

    44639: HTTP: Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Vulnerability (ZDI-24-1619)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44639: ZDI-CAN-24503: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: December 31, 2024

    44640: HTTP: Fuji Electric Monitouch V-SFT X1 Heap-based Buffer Overflow Vulnerability (ZDI-24-1630)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44640: ZDI-CAN-24548: Zero Day Initiative Vulnerability (Fuji Electric Monitouch V-SFT)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: December 31, 2024

  Removed Filters: None