New Filters: 45237: DNS: TinyPilot KVM - Domain Name Detection - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Low - Description: This filter detects DNS queries to the domain tinypilotkvm.com. - Deployment: Not enabled by default in any deployment. - Classification: Security Policy - Forbidden Application Access or Service Request - Protocol: DNS - Platform: Multi-Platform Client Application - Release Date: January 07, 2025 45239: HTTP: TinyPilot KVM - Remote Access Detected (Homepage Server Response) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects attempted access to the TinyPilot KVM server. - Deployment: Not enabled by default in any deployment. - Classification: Security Policy - Forbidden Application Access or Service Request - Protocol: HTTP - Platform: UNIX/Linux Server Application or Service - Release Date: January 07, 2025 45241: HTTP: TinyPilot KVM - Remote Access Detected (API Response) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects attempted access to the TinyPilot KVM server. - Deployment: Not enabled by default in any deployment. - Classification: Security Policy - Forbidden Application Access or Service Request - Protocol: HTTP - Platform: UNIX/Linux Server Application or Service - Release Date: January 07, 2025 45243: HTTP: TinyPilot KVM - Remote Access Detected (API Request) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Security Policy - Severity: Moderate - Description: This filter detects attempted access to the TinyPilot KVM server. - Deployment: Not enabled by default in any deployment. - Classification: Security Policy - Forbidden Application Access or Service Request - Protocol: HTTP - Platform: UNIX/Linux Server Application or Service - Release Date: January 07, 2025 45253: HTTP: SourceCodester Clinics Patient Management System Arbitrary File Upload Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an arbitrary file upload vulnerability in SourceCodester Clinics Patient Management System. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2022-40471 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application - Release Date: January 07, 2025 45255: PWN2OWN ZDI-CAN-25587: Zero Day Initiative Vulnerability (QNAP TS-464) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter protects against exploitation of a zero-day vulnerability affecting QNAP TS-464. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45258: ZDI-CAN-25953: Zero Day Initiative Vulnerability (Ivanti Endpoint Manager) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Ivanti Endpoint Manager. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45259: ZDI-CAN-25943: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45260: ZDI-CAN-25972: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45261: ZDI-CAN-25945: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45262: ZDI-CAN-25944: Zero Day Initiative Vulnerability (Ashlar-Vellum Cobalt) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Cobalt. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45265: ZDI-CAN-25862: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Graphite. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45266: ZDI-CAN-25755: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Graphite. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45267: LDAP: Microsoft Windows Lightweight Directory Access Protocol Denial of Service Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: High - Description: This filter detects an attempt to exploit a denial of service vulnerability in Microsoft Windows Active Directory Domain Services. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2024-49113 - Classification: Vulnerability - Other - Protocol: LDAP - Platform: Windows Server Application or Service - Release Date: January 07, 2025 45268: ZDI-CAN-25756: Zero Day Initiative Vulnerability (Ashlar-Vellum Graphite) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Ashlar-Vellum Graphite. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: January 07, 2025 45269: TCP: Oracle WebLogic Server Insecure Deserialization Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Oracle WebLogic Server. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2024-21182 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: TCP (Generic) - Platform: Multi-Platform Server Application or Service - Release Date: January 07, 2025 Modified Filters (logic changes): None Modified Filters (metadata changes only): None Removed Filters: None |