Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Digital Vaccine #9434

    • Updated:
    • 15 Jul 2020
    • Product/Version:
    • TippingPoint Digital Vaccine
    • Platform:
Summary
Digital Vaccine #9434      July 14, 2020
Details
Public
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.

New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com.

SMS customers can update the Digital Vaccine through the SMS client. From the top-line menu, you can open the "File > Download Digital Vaccine from TMC" menu item to detect and load the latest update.

Note: Customers with TP10 devices should perform a soft reboot of their IPS before installing the new DV to avoid a memory issue during the install.
 
System Requirements
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above,  all NGFW and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters.
 
Microsoft Security Bulletins
This DV includes coverage for the Microsoft vulnerabilities released on or before July 14, 2020.
The following table maps TippingPoint filters to the Microsoft CVEs.
CVEFilterStatus
CVE-2020-1025 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-114737851 
CVE-2020-1240 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1249 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1267 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1330 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1333 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1336 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1342 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1344 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1346 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1347 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1349 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-135037857, 37858 
CVE-2020-1351 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1352 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1353 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1354 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1355*25851 
CVE-2020-1356 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1357 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1358 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1359 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1360 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1361 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1362 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1363 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1364 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1365 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1366 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1367 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1368 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1369 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1370 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1371 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1372 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1373 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-137437837 
CVE-2020-1375 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1381 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1382 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1384 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1385 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1386 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1387 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1388 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1389 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1390 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1391 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1392 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1393 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1394 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1395 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1396 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1397 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1398 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1399 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1400*35156 
CVE-2020-1401 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1402 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-140337838 
CVE-2020-1404 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1405 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1406 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1407 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1408 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1409 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-141037877 
CVE-2020-1411 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1412 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1413 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1414 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1415 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1416 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1418 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1419 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1420 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1421*26004 
CVE-2020-1422 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1423 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1424 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1426 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1427 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1428 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1429 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1430 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1431 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1432 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1433 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1434 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1435 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1436*26078 
CVE-2020-1437 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1438 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1439 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1442 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1443 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1444 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1445 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1446 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1447 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1448 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1449 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1450 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1451 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1454 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1456 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1458 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1461 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1462 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1463 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1465 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1468 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1469 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2020-1481 Vendor Deemed Reproducibility or Exploitation Unlikely
Filters marked with * shipped prior to this DV, providing zero-day protection.
 
The Digital Vaccine can be manually downloaded from the following URLs:
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9434.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9434.pkg

Update Details

Table of Contents
--------------------------

Filters
 New Filters - 8
 Modified Filters (logic changes) - 13
 Modified Filters (metadata changes only) - 2
 Removed Filters - 2

Filters
----------------
 New Filters:
    37826: HTTP: rConfig snippets.inc.php SQL Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a SQL injection vulnerability in rConfig.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-10549
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service

    37837: RDP: Microsoft Remote Desktop Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an integer overflow in Microsoft Remote Desktop.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1374
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: TCP (Generic)
      - Platform: Windows Client Application

    37838: HTTP: Microsoft Internet Explorer Type Confusion Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a type confusion vulnerability in Microsoft Internet Explorer.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1403
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Windows Client Application

    37848: HTTP: Wordpress Users Request Usage
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects a call to Wordpress which retrieves a list of post authors.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2017-5487
      - Classification: Vulnerability - Access Validation
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service

    37851: HTTP: Microsoft .NET Framework Insecure Deserialization Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an insecure deserialization vulnerability in Microsoft .NET Framework.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1477
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Windows Server Application or Service

    37857: DNS: Windows DNS Server Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Windows DNS Server.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1350
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: DNS
      - Platform: Windows Server Application or Service

    37858: DNS: Windows DNS Server Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Microsoft Windows DNS Server.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1350
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: DNS
      - Platform: Windows Server Application or Service

    37877: HTTP: Microsoft Windows Address Book Contact File Parsing Integer Overflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an integer overflow vulnerability in Microsoft Windows.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-1410
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: HTTP
      - Platform: Windows Client Application

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 9595: HTTP: Oracle Java Malicious Soundbank Stack Buffer Overflow
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.

    25851: HTTP: Microsoft Windows Font Parsing Out-Of-Bounds Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "25851: ZDI-CAN-10808: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    26004: HTTP: Microsoft Windows LNK Type Confusion Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "26004: ZDI-CAN-10895: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Category changed from "Exploits" to "Vulnerabilities".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    26078: HTTP: Microsoft Windows PFB Font File Out-Of-Bounds Write Privilege Escalation Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "26078: ZDI-CAN-10903: Zero Day Initiative Vulnerability (Microsoft Windows)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    * 33444: HTTP: HPE Intelligent Management Center devGroupSelect Expression Language Injection (ZDI-19-164)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    35156: HTTP: Microsoft JET Database Integer Underflow Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "35156: ZDI-CAN-11121: Zero Day Initiative Vulnerability (Microsoft JET Database)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36272: HTTP: Cisco Data Center Network Manager getEndPorts SQL Injection Vulnerability (ZDI-20-032)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36272: ZDI-CAN-9065: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36274: HTTP: D-Link DCS-960L HNAP SOAPAction Buffer Overflow Vulnerability (ZDI-19-1031)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36274: ZDI-CAN-8458: Zero Day Initiative Vulnerability (D-Link DCS-960L)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36308: HTTP: Advantech WISE-PaaS/RMM RecoveryMgmt XML External Entity Processing (ZDI-19-944)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36308: ZDI-CAN-9094: Zero Day Initiative Vulnerability (Advantech WISE-PaaS/RMM)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36683: HTTP: Cisco Data Center Network Manager getTaskList SQL Injection Vulnerability (ZDI-20-088)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36683: ZDI-CAN-9214: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36687: HTTP: Cisco Data Center Network Manager getIslListWithPMForTopology SQL Injection (ZDI-20-040)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36687: ZDI-CAN-9221: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36688: HTTP: Cisco Data Center Network Manager checDiscoveryEthSwCandidates4List SQL Injection (ZDI-20-093)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36688: ZDI-CAN-9234: Zero Day Initiative Vulnerability (Cisco Data Center Network Manager)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

    36978: HTTP: Microsoft SharePoint Scorecards Deserialization of Untrusted Data Vulnerability (ZDI-20-465)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    36615: HTTP: Amazon Echo Show Integer Overflow Vulnerability (Pwn2Own ZDI-20-537)
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.

    * 37841: HTTP: F5 BIG-IP TMUI Code Execution Vulnerability
      - IPS Version: 3.6.2 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Vulnerability references updated.

  Removed Filters:

    17038: HTTP: Kovter Scareware Communication Attempt
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.

    17045: HTTP: Kovter Ransomware Communication Attempt
      - IPS Version: 1.0.0 and after.
      - NGFW Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.

  
Business Support Portal (BSP): Trend Micro™ TippingPoint provides an online support portal for its customers. This tool provides customers with the ability to create and manage support cases, and it enhances case management and collaboration by guiding you to product specific solutions, self-help, and technical assistance. You can reach the BSP from the Threat Management Center (TMC) website by navigating to Support → BSP Global or BSP Japan. In order to register for the portal, you will need to have a current Trend Micro™ TippingPoint device certificate number (CERT) or Activation Code (AC). If you need assistance locating your device CERT number, you can click here or contact Trend Micro TippingPoint Technical Assistance Center (TAC) for additional information. For updated contact information, please click here.

© Copyright Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro logo, TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro Incorporated. TippingPoint Reg. U.S. Pat. & Tm. Off. The information is provided “as is” without warranty of any kind and is subject to change without notice. The only warranties for Trend Micro products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Trend Micro shall not be liable for technical or editorial errors or omissions contained herein.

If you no longer wish to receive these emails, please unsubscribe.

Top of the Page
Premium
Internal
Partner
Rating:
Category:
Configure; Troubleshoot; Deploy
Solution Id:
TP000258746
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.