Views:
Table of Contents
--------------------------
  New Filters - 13
  Modified Filters (logic changes) - 5
  Modified Filters (metadata changes only) - 9
  Removed Filters - 0
  New Filters: 

    45593: HTTP: WordPress Load Gallery Unrestricted File Upload Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an unrestricted file upload vulnerability in the WordPress Load Gallery Plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-23942
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45597: HTTP: Microsoft SharePoint Server Workflow Rules File Upload Detected
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a suspicious upload workflow rules file in a Microsoft SharePoint request.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-43464
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Windows Server Application or Service
      - Release Date: March 25, 2025

    45598: HTTP: B&R Systems Diagnostics Manager Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in the B&R Systems Diagnostics Manager.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2022-4286
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45599: ZDI-CAN-23114: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting eCharge Hardy Barth cPH2.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: March 25, 2025

    45600: ZDI-CAN-23115: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting eCharge Hardy Barth cPH2.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: March 25, 2025

    45601: ZDI-CAN-23113: Zero Day Initiative Vulnerability (eCharge Hardy Barth cPH2)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting eCharge Hardy Barth cPH2.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: March 25, 2025

    45603: HTTP: Palo Alto Networks Expedition Admin Password Reset
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects an attempt to reset the Admin password in Palo Alto Networks Expedition.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-5910
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45604: HTTP: SimpleSAMLphp SAML2 Authentication Bypass Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit an authentication bypass vulnerability in SimpleSAMLphp SAML2.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-27773
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45605: HTTP: Aviatrix Controller API cloud_type Command Injection Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Aviatrix Controller.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-50603
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Other Server Application or Service
      - Release Date: March 25, 2025

    45608: HTTP: Apache Camel CamelExecCommandExecutable Code Execution Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a code execution vulnerability in Apache Camel.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-27636, CVE-2025-29891
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45612: HTTP: WordPress WP Shortcodes Plugin src Stored Cross-Site Scripting Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a stored cross-site scripting vulnerability in the WordPress WP Shortcodes plugin.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-0370 CVSS 4.0
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

    45623: RDP: Microsoft Windows RDP Server HandleDisconnected Use-After-Free Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Microsoft Remote Desktop Protocol.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2024-49116
      - Classification: Vulnerability - Other
      - Protocol: TCP (Generic)
      - Platform: Windows Client Application
      - Release Date: March 25, 2025

    45635: HTTP: Next.js Middleware Authorization Bypass Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an authorization bypass vulnerability in a Next.js using the middleware feature.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Evaluation (Permit / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2025-29927 CVSS 9.1
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: March 25, 2025

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 44745: HTTP: Ivanti Endpoint Manager serverStorage SQL Injection Vulnerability (ZDI-24-1506)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: September 10, 2024
      - Last Modified Date: March 25, 2025

    44824: HTTP: Delta Electronics ISPSoft DVP File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-101)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44824: ZDI-CAN-25284: Zero Day Initiative Vulnerability (Delta Electronics ISPSoft)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: March 25, 2025

    * 44963: HTTP: Ivanti Endpoint Manager Patch Unrestricted File Upload Vulnerability (ZDI-25-114)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44963: ZDI-CAN-25312: Zero Day Initiative Vulnerability (Ivanti Endpoint Manager)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 22, 2024
      - Last Modified Date: March 25, 2025

    * 45070: HTTP: Fortinet FortiWeb cgi_grpc_idl_file_post Command Injection Vulnerability (ZDI-25-094)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: November 12, 2024
      - Last Modified Date: March 25, 2025

    45441: ZDI-CAN-26364,26372: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Detection logic updated.
      - Release Date: February 18, 2025
      - Last Modified Date: March 25, 2025

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    35498: TCP: YSoSerial.Net Deserialization Tool Usage
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Vulnerability references updated.
      - Release Date: June 18, 2019
      - Last Modified Date: March 25, 2025

    * 44071: HTTP: Adobe ColdFusion PMSGenericServlet Improper Access Control Vulnerability
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: April 09, 2024
      - Last Modified Date: March 25, 2025

    * 44606: HTTP: Apache Pinot Authentication Bypass Vulnerability (ZDI-25-109)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44606: ZDI-CAN-24001: Zero Day Initiative Vulnerability (Apache Pinot)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: August 13, 2024
      - Last Modified Date: March 25, 2025

    44823: HTTP: Delta Electronics ISPSoft DVP File Parsing Buffer Overflow Vulnerability (ZDI-25-102)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44823: ZDI-CAN-25225: Zero Day Initiative Vulnerability (Delta Electronics ISPSoft)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: September 24, 2024
      - Last Modified Date: March 25, 2025

    * 44844: HTTP: Microsoft Windows LNK File UI Misrepresentation Vulnerability (ZDI-25-148)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "44844: ZDI-CAN-25373: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: October 01, 2024
      - Last Modified Date: March 25, 2025

    * 45054: HTTP: SolarWinds Platform TestWebsiteUrl Server-Side Request Forgery Vulnerability (ZDI-25-104)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45054: ZDI-CAN-25334: Zero Day Initiative Vulnerability (SolarWinds Platform)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: November 12, 2024
      - Last Modified Date: March 25, 2025

    45155: HTTP: Siemens Simcenter Femap NEU File Parsing Memory Corruption Vulnerability (ZDI-25-130)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45155: ZDI-CAN-25443: Zero Day Initiative Vulnerability (Siemens Simcenter Femap)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: December 10, 2024
      - Last Modified Date: March 25, 2025

    45211: HTTP: HP LaserJet Pro MFP 3301fdw PostScript File Parsing Type Confusion (Pwn2Own ZDI-25-106)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45211: PWN2OWN ZDI-CAN-25533: Zero Day Initiative Vulnerability (HP Color LaserJet Pro MFP 3301fdw)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: December 24, 2024
      - Last Modified Date: March 25, 2025

    45233: HTTP: Adobe Acrobat Reader DC Doc Object Out-Of-Bounds Read Vulnerability (ZDI-25-134)
      - IPS Version: 3.9.5 and after.
      - TPS Version: 5.2.2 and after.
      - vTPS Version: 5.2.2 and after.
      - Name changed from "45233: ZDI-CAN-25734: Zero Day Initiative Vulnerability (Adobe Acrobat Reader DC)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: December 24, 2024
      - Last Modified Date: March 25, 2025

      
  Removed Filters: None