New Filters: 46162: HTTP: NI FlexLogger usiReg URI File Parsing Directory Traversal Vulnerability (ZDI-25-146) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a directory traversal vulnerability in NI FlexLoggert. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-2449 CVSS 8.1 - Zero Day Initiative: ZDI-25-146 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Multi-Platform Client Application - Release Date: July 22, 2025 46173: HTTP: Adobe Commerce and Magento InputParamsResolver Improper Authorization Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an improper authorization vulnerability in Adobe Commerce and Magento. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-24434 CVSS 8.2 - Classification: Vulnerability - Access Validation - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 46196: HTTP: SonicWall SMA100 importlogo Directory Traversal Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a directory traversal vulnerability in SonicWall SMA100. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-32821 CVSS 8.2 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Networked Hardware Device Application or Service - Release Date: July 22, 2025 46198: ZDI-CAN-27348: Zero Day Initiative Vulnerability (Apple macOS) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting Apple macOS. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: July 22, 2025 46199: ZDI-CAN-27467: Zero Day Initiative Vulnerability (Dassault Systemes eDrawings Viewer) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Exploits - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Dassault Systemes eDrawings Viewer. - Deployments: - Deployment: Security-Optimized (Block / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: July 22, 2025 46200: HTTP: OpenEMR Patient Image Stored Cross-Site Scripting Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a stored cross-side scripting vulnerability in OpenEMR. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-31121 CVSS 8.1 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 46201: HTTP: WinZip 7Z File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-047) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in WinZip. - Deployments: - Deployment: Security-Optimized (Block / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-1240 CVSS 7.7 - Zero Day Initiative: ZDI-25-047 - Classification: Vulnerability - Other - Protocol: HTTP - Platform: Windows Client Application - Release Date: July 22, 2025 46203: TCP: Veeam Backup and Replication DataTable Insecure Deserialization Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Veeam Backup and Replication. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-23121 - Classification: Vulnerability - Other - Protocol: TCP (Generic) - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 46204: ZDI-CAN-27376: Zero Day Initiative Vulnerability (Schneider Electric PowerChute Serial Shutdown) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: Not available. - Requires: IPS N-Platform, NX-Platform, or TPS models. - Category: Vulnerabilities - Severity: Critical - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Schneider Electric PowerChute Serial Shutdown. - Deployments: - Deployment: Default (Block / Notify / Trace) - Deployment: Evaluation (Permit / Notify / Trace) - Classification: Vulnerability - Other - Protocol: Other Protocol - Platform: Other Server Application or Service - Release Date: July 22, 2025 46205: TCP: Veeam Backup and Replication DataTable Encrypted Insecure Deserialization Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Exploits - Severity: Critical - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Veeam Backup and Replication. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-23121 - Classification: Vulnerability - Other - Protocol: TCP (Generic) - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 46217: HTTP: JSONPath-plus Remote Code Execution Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a remote code execution vulnerability in JSONPath-plus. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-1302 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Windows Client Application - Release Date: July 22, 2025 46218: HTTP: Cisco Identity Services Engine (ISE) ERS Command Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a command injection vulnerability in Cisco Identity Services Engine (ISE). - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-20281 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 46219: HTTP: Wing FTP Server Code Injection Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Category: Vulnerabilities - Severity: Critical - Description: This filter detects an attempt to exploit a code injection vulnerability in Wing FTP Server. - Deployments: - Deployment: Default (Block / Notify) - Deployment: Evaluation (Permit / Notify) - References: - Common Vulnerabilities and Exposures: CVE-2025-47812 - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc) - Protocol: HTTP - Platform: Multi-Platform Server Application or Service - Release Date: July 22, 2025 Modified Filters (logic changes): * = Enabled in Default deployments * 43256: HTTP: Foxit Reader and PhantomPDF ConvertToPDF Integer Overflow Vulnerability - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Detection logic updated. - Release Date: September 19, 2023 - Last Modified Date: July 22, 2025 45626: HTTP: INVT HMITool VPM File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-474) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45626: ZDI-CAN-25044: Zero Day Initiative Vulnerability (INVT HMITool)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45627: HTTP: INVT HMITool VPM File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-475) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45627: ZDI-CAN-25045: Zero Day Initiative Vulnerability (INVT HMITool)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45628: HTTP: INVT HMITool VPM File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-476) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45628: ZDI-CAN-25047: Zero Day Initiative Vulnerability (INVT HMITool)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45629: HTTP: INVT HMITool VPM File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-477) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45629: ZDI-CAN-25048: Zero Day Initiative Vulnerability (INVT HMITool)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45630: HTTP: INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-478) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45630: ZDI-CAN-25550: Zero Day Initiative Vulnerability (INVT VT-Designer)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45631: HTTP: INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-479) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45631: ZDI-CAN-25571: Zero Day Initiative Vulnerability (INVT VT-Designer)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45632: HTTP: INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-480) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45632: ZDI-CAN-25722: Zero Day Initiative Vulnerability (INVT VT-Designer)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45633: HTTP: INVT VT-Designer PM3 File Parsing Type Confusion Vulnerability (ZDI-25-481) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45633: ZDI-CAN-25723: Zero Day Initiative Vulnerability (INVT VT-Designer)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 45634: HTTP: INVT VT-Designer PM3 File Parsing Out-Of-Bounds Write Vulnerability (ZDI-25-482) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45634: ZDI-CAN-25724: Zero Day Initiative Vulnerability (INVT VT-Designer)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: April 01, 2025 - Last Modified Date: July 22, 2025 * 45905: HTTP: Microsoft SharePoint ToolPane Authentication Bypass Vulnerability (Pwn2Own ZDI-25-580) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45905: PWN2OWN ZDI-CAN-27162: Zero Day Initiative Vulnerability (Microsoft SharePoint)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 20, 2025 - Last Modified Date: July 22, 2025 * 45906: HTTP: Microsoft SharePoint DataSetSurrogate Insecure Deserialization Vulnerability (ZDI-25-581) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "45906: PWN2OWN ZDI-CAN-27247: Zero Day Initiative Vulnerability (Microsoft SharePoint)". - Description updated. - Detection logic updated. - Vulnerability references updated. - Release Date: May 20, 2025 - Last Modified Date: July 22, 2025 Modified Filters (metadata changes only): * = Enabled in Default deployments * 46160: HTTP: Microsoft SharePoint ToolPane Authentication Bypass Vulnerability (Pwn2Own ZDI-25-580) - IPS Version: 3.9.5 and after. - TPS Version: 5.2.2 and after. - vTPS Version: 5.2.2 and after. - Name changed from "46160: HTTP: Microsoft SharePoint Insecure Deserialization Vulnerability (Pwn2Own ZDI-25-581)". - Description updated. - Release Date: July 08, 2025 - Last Modified Date: July 22, 2025 Removed Filters: None |