Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Digital Vaccine #8981

    • Updated:
    • 1 Aug 2017
    • Product/Version:
    • TippingPoint Digital Vaccine
    • Platform:
Summary
Digital Vaccine #8981      (August 1, 2017)
Details
Public
 
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.

New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com

SMS customers can update the Digital Vaccine through the SMS client. From the top line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update.
 
System Requirements
The 2.5.2 DV will run on IPS with TOS 2.5.2 to TOS 3.1.x.
The 3.2.0 DV will run on IPS with TOS 3.2.0 to TOS 3.9.x, all NGFW and TPS v4.0.0 to 4.2.0.
The 4.0.0 DV only supports the Virtual Threat Protection System (vTPS) platform.
Please note that vTPS does not currently support pre-disclosed ZDI filters.
       
The Digital Vaccine can be manually downloaded from the following URLs:
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_2.5.2_8981.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_8981.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_8981.pkg

Update Details

Table of Contents
--------------------------

Filters
 New Filters
 Modified Filters (logic changes)
 Modified Filters (metadata changes only)
 Removed Filters

Filters
----------------
 New Filters:


    28665: OpenVPN: OpenVPN P_CONTROL Denial-of-Service Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a denial-of-service vulnerability in OpenVPN Project OpenVPN.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 98444
        - Common Vulnerabilities and Exposures: CVE-2017-7478 CVSS 5.0

    28985: HTTP: Array concat Method Usage with Suspiciously Big Arrays (ZDI-17-350)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an attempt to use array concat method with suspiciously big arrays.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Bugtraq ID: 98474
        - Common Vulnerabilities and Exposures: CVE-2017-2544 CVSS 6.8
        - Zero Day Initiative: ZDI-17-350

    29139: HTTP: Cisco Prime Infrastructure and EPNM SystemPreferences_Configurable Cross-Site Scripting
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Cisco Prime Infrastructure and Evolved Programmable Network Manager (EPNM).
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 99221
        - Common Vulnerabilities and Exposures: CVE-2017-6699 CVSS 4.3

    29205: HTTP: Crypttech CryptoLog Command Injection Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in Crypttech Cryptolog.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)

    29206: HTTP: Cisco Prime Infrastructure and EPNM ImportJobResults.jsp Cross-Site Scripting Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Cisco Prime Infrastructure and Evolved Programmable Network Manager (EPNM).
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 99221
        - Common Vulnerabilities and Exposures: CVE-2017-6699 CVSS 4.3

    29207: HTTP: Kaspersky Anti-Virus for Linux File Server getReportStatus Directory Traversal Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Kaspersky Anti-Virus for Linux File Server.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Bugtraq ID: 99330
        - Common Vulnerabilities and Exposures: CVE-2017-9812 CVSS 5.0

    29216: TCP: Malicious Word Document with Template Injection Download Attempt
      - IPS Version: 3.2.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to download a Microsoft Word Document that requests a malicious remote template.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)

    29217: HTTP: Request for External Microsoft Word Template with Macros
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an attempt to retrieve an external Microsoft Word Template.
      - Deployment: Not enabled by default in any deployment.

    29269: TFTP: HP Intelligent Management Center TFTP Acknowledgement
      - IPS Version: 3.2.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an acknowledgement from the HP Intelligent Management Center TFTP server.
      - Deployment: Not enabled by default in any deployment.

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 3259: HTTP: IE Channel Definition File Vulnerability
      - IPS Version: 1.4.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    5614: SMB: Suspicious SMBv1 Probe
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "5614: SMB: Malicious SMB Probe/Attack".
      - Category changed from "Exploits" to "Security Policy".
      - Severity changed from "Critical" to "Moderate".
      - Description updated.
      - Detection logic updated.
      - Deployments updated and are now:
        - Deployment: Performance-Optimized (Block / Notify)

    5673: HTTP: SQL Injection (Boolean Identity)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    * 10626: HTTP: Oracle Java Malicious Soundbank Stream Download (ZDI-11-085)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    10663: SMTP: Microsoft Word RTF Control Word Parsing Remote Code Execution Vulnerability (MS10-087)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "10663: SMTP: Microsoft Word RTF Control Word Parsing Remote Code Execution (MS10-087)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 10821: HTTP: Malicious Embedded Font in PDF Document Download
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category changed from "Vulnerabilities" to "Exploits".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 11369: HTTP: Adobe Shockwave tSAC Chunk String Termination Remote Code Execution Vulnerability (ZDI-11-207)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category changed from "Vulnerabilities" to "Exploits".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    12404: HTTP: Novell iPrint Client Activex Remote Code Execution Vulnerability (ZDI-12-102)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    * 13065: HTTP: Oracle Outside In Excel File Parser Integer Overflow (ZDI-12-151)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    13586: HTTP: Microsoft Internet Explorer runtimeStyle Memory Corruption Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    16278: HTTP: libYAML Scanner Buffer Overflow Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Vulnerability references updated.

    * 16297: LDAP: Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 20113: TCP: Microsoft Windows Media Device Manager Code Execution Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    * 24383: HTTP: Schneider Electric U.motion Builder css.inc Directory Traversal Vulnerability (ZDI-17-390)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "24383: ZDI-CAN-3583: Zero Day Initiative Vulnerability (Schneider Electric U.motion Builder)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 24384: HTTP: Schneider Electric U.motion Builder runscript Directory Traversal Vulnerability (ZDI-17-389)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "24384: ZDI-CAN-3584: Zero Day Initiative Vulnerability (Schneider Electric U.motion Builder)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 25484: HTTP: HPE Intelligent Management Center FileDownloadServlet Information Disclosure (ZDI-17-192)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category changed from "Vulnerabilities" to "Exploits".
      - Detection logic updated.
      - Vulnerability references updated.

    26648: HTTP: Microsoft Internet Explorer and Edge JSON.parse Type Confusion Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    26703: LDAP: Samba NDR Parsing ndr_pull_dnsp_name Integer Overflow Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    27239: TCP: HPE Intelligent Management Center dbman Opcode 10006 Command Injection (ZDI-17-339)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27239: ZDI-CAN-4379: Zero Day Initiative Vulnerability (Hewlett Packard Enterprise Intelligent Management)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    27551: HTTP: Google Chrome List Item Marker Type Confusion Vulnerability (ZDI-17-314)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27551: ZDI-CAN-4429: Zero Day Initiative Vulnerability (Google Chrome)".
      - Category changed from "Vulnerabilities" to "Exploits".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    27634: HTTP: Trend Micro Deep Discovery Email Inspector policy_setting Arbitrary File Upload (ZDI-17-283)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27634: ZDI-CAN-4427: Zero Day Initiative Vulnerability (Trend Micro Deep Discovery Email Inspector)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    28465: SMB: Linux Samba Code Execution Vulnerability (EternalRed)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    * 28923: HTTPS: AlienVault USM and OSSIM get_fqdn Command Injection Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    28925: HTTP: Microsoft Chakra Array JIT Optimization Type Confusion Vulnerability (ZDI-17-480)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28925: ZDI-CAN-4894: Zero Day Initiative Vulnerability (Microsoft Chakra)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    39121: HTTP: Ecava IntegraXor getdata name SQL Injection Vulnerability (ZDI-17-058)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39121: ZDI-CAN-3849: Zero Day Initiative Vulnerability (Ecava IntegraXor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    0141: ICMP: Destination Unreachable (Port Unreachable)
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.

    24947: NetBIOS: Microsoft Windows NBNS WPAD Man-in-the-Middle Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.
      - Deployments updated and are now:
        - Deployment: Security-Optimized (Block / Notify)

    * 26700: HTTP: Microsoft Windows ADO Array-Type Parameter Use-After-Free Vulnerability (ZDI-17-284)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.

    * 27539: HTTP: Apple Safari Array concat Integer Overflow Vulnerability (ZDI-17-350, Pwn2Own)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27539: PWN2OWN ZDI-CAN-4613: Zero Day Initiative Vulnerability (Apple Safari)".
      - Description updated.
      - Vulnerability references updated.

    * 27699: HTTP: Apple Safari ElementData Use-After-Free Vulnerability (ZDI-17-191)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27699: ZDI-CAN-4454: Zero Day Initiative Vulnerability (Apple Safari)".
      - Description updated.
      - Vulnerability references updated.

    * 27745: HTTP: Microsoft Windows PDF LibraryJPEG2000 Parsing Out-Of-Bounds Read Vulnerability (ZDI-17-398)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "27745: ZDI-CAN-4483: Zero Day Initiative Vulnerability (Microsoft Windows PDF Library)".
      - Description updated.
      - Vulnerability references updated.

    * 28004: HTTP: Foxit Reader getAnnot Use-After-Free Vulnerability (ZDI-17-313)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28004: ZDI-CAN-4525: Zero Day Initiative Vulnerability (Foxit Reader)".
      - Description updated.
      - Vulnerability references updated.

    28011: HTTP: Adobe Reader DC PDF Parsing Out-Of-Bounds Read Vulnerability (ZDI-17-335)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28011: ZDI-CAN-4550: Zero Day Initiative Vulnerability (Adobe Reader DC)".
      - Description updated.
      - Vulnerability references updated.

    * 28099: HTTP: Adobe Flash PSDKEvent Use-After-Free Vulnerability (ZDI-17-287)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28099: ZDI-CAN-4565: Zero Day Initiative Vulnerability (Adobe Flash)".
      - Description updated.
      - Vulnerability references updated.

    * 28220: HTTP: Microsoft Windows OTL Font Parsing Out-Of-Bounds Read Vulnerability (ZDI-17-405)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28220: ZDI-CAN-4700: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Description updated.
      - Vulnerability references updated.

    * 28918: HTTP: Microsoft Chakra Typed Array JIT Optimization Use-After-Free Vulnerability (ZDI-17-478)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "28918: ZDI-CAN-4886: Zero Day Initiative Vulnerability (Microsoft Chakra)".
      - Description updated.
      - Vulnerability references updated.

    * 29047: HTTP: Microsoft Edge Uint8ClampedArray Type Confusion Vulnerability
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.

    * 29069: HTTPS: Cisco Prime Collaboration Provisioning Arbitrary File Deletion Vulnerability (ZDI-17-446)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.

    37514: HTTP: EMC Data Protection Advisor ImageServlet Directory Traversal Vulnerability (ZDI-17-394)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "37514: ZDI-CAN-3844: Zero Day Initiative Vulnerability (EMC Data Protection Advisor)".
      - Description updated.
      - Vulnerability references updated.

    39119: HTTP: Ecava IntegraXor getdata param SQL Injection Vulnerability (ZDI-17-059)
      - IPS Version: 3.1.3 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39119: ZDI-CAN-3824: Zero Day Initiative Vulnerability (Ecava IntegraXor)".
      - Description updated.
      - Vulnerability references updated.

  Removed Filters: None    
  
Premium
Internal
Rating:
Category:
Configure; Troubleshoot; Deploy
Solution Id:
TP000085749
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.