Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Digital Vaccine #9588

    • Updated:
    • 15 Sep 2021
    • Product/Version:
    • TippingPoint Digital Vaccine
    • Platform:
Summary
Digital Vaccine #9588      September 14, 2021
Details
Public
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.

New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com.
 
System Requirements
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above,  and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters.
 
Microsoft Security Bulletins
This DV includes coverage for the Microsoft vulnerabilities released on or before September 14, 2021. The following table maps TippingPoint filters to the Microsoft CVEs.
CVEFilterStatus
CVE-2021-26434 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-26435 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-26436 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36930 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36952*39938 
CVE-2021-36954 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36955 Local Exploitation Required
CVE-2021-36956 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36959 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36960 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36961 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36962 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36963 Local Exploitation Required
CVE-2021-36964 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36965 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36966 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36967 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36968 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36969 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36972 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36973 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36974 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-36975 Local Exploitation Required
CVE-2021-38624 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38625 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38626 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38628 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38629 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38630 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38632 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38633 Local Exploitation Required
CVE-2021-38634 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38635 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38636 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38637 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38638 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38639 Local Exploitation Required
CVE-2021-38641 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38642 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38644 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38645 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38646 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38647 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38648 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38649 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38650 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38651 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38652 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38653*39937 
CVE-2021-38654*40001 
CVE-2021-38655*40000 
CVE-2021-38656*39999 
CVE-2021-38657 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38658*40018 
CVE-2021-38659*40074 
CVE-2021-38660 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38661 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38667 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38669 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-38671 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-40440 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-40444 Under Investigation. See ThreatDV filter 40318 for malware coverage.
CVE-2021-40447 Vendor Deemed Reproducibility or Exploitation Unlikely
CVE-2021-40448 Vendor Deemed Reproducibility or Exploitation Unlikely
Filters marked with * shipped prior to this DV, providing zero-day protection.
 
Adobe Security Bulletins
This DV includes coverage for the Adobe vulnerabilities released on or before September 14, 2021. The following table maps TippingPoint filters to the Adobe CVEs.
BulletinCVEFilterStatus
APSB21-55CVE-2021-3983640319 
APSB21-55CVE-2021-39837 Under Investigation
APSB21-55CVE-2021-39838 Under Investigation
APSB21-55CVE-2021-39839 Under Investigation
APSB21-55CVE-2021-39840 Under Investigation
APSB21-55CVE-2021-39841 Under Investigation
APSB21-55CVE-2021-39842 Under Investigation
APSB21-55CVE-2021-3984340320 
APSB21-55CVE-2021-39844 Under Investigation
APSB21-55CVE-2021-39845 Under Investigation
APSB21-55CVE-2021-39846 Under Investigation
Filters marked with * shipped prior to this DV, providing zero-day protection.
 
The Digital Vaccine can be manually downloaded from the following URLs:
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9588.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9588.pkg

Update Details

Table of Contents
--------------------------

Filters
 New Filters - 55
 Modified Filters (logic changes) - 4
 Modified Filters (metadata changes only) - 5
 Removed Filters - 43

Filters
----------------
  New Filters: 

    39723: HTTP: UPnP SOAPAction RecoverAdminPassword Usage
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects the usage of the RecoverAdminPassword SoapAction.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-34870 CVSS 6.5
        - Zero Day Initiative: ZDI-21-1058
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Networked Hardware Device Application or Service
      - Release Date: September 14, 2021

    40183: DNS: DNSmasq extract_name Out-Of-Bounds Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in DNSmasq.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2020-25682 CVSS 6.8
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: DNS
      - Platform: UNIX/Linux Server Application or Service
      - Release Date: September 14, 2021

    40185: ZDI-CAN-15113: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40186: ZDI-CAN-15112: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40187: ZDI-CAN-15111: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40188: ZDI-CAN-15110: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40189: ZDI-CAN-15109: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40190: ZDI-CAN-15108: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40191: ZDI-CAN-15107: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40192: ZDI-CAN-15106: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40193: ZDI-CAN-15105: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40194: ZDI-CAN-15104: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40195: ZDI-CAN-15103: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40196: ZDI-CAN-15102: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40197: ZDI-CAN-15101: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40198: ZDI-CAN-15100: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40199: ZDI-CAN-15099: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40200: ZDI-CAN-15098: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40201: ZDI-CAN-15095: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40202: ZDI-CAN-15077: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40203: ZDI-CAN-15076: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40204: ZDI-CAN-14972: Zero Day Initiative Vulnerability (Sante DICOM Viewer Pro)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Sante DICOM Viewer Pro.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40207: ZDI-CAN-14700,20-22,24: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40208: ZDI-CAN-14717-19,14723: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40209: ZDI-CAN-14713: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40210: ZDI-CAN-14711: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40211: ZDI-CAN-14707,14710: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40212: ZDI-CAN-14706,14709: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40213: ZDI-CAN-14701-14705: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40214: ZDI-CAN-15058: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40215: ZDI-CAN-15057: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40216: ZDI-CAN-15053: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40217: ZDI-CAN-14974: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40218: ZDI-CAN-14584: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40219: ZDI-CAN-14582: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40220: ZDI-CAN-14581: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40221: ZDI-CAN-14580: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40222: ZDI-CAN-14579: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40223: ZDI-CAN-14578: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40224: ZDI-CAN-14577: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40225: ZDI-CAN-14576: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40226: ZDI-CAN-14575: Zero Day Initiative Vulnerability (WECON LeviStudioU)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON LeviStudioU.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40228: ZDI-CAN-14074-76,14078-80: Zero Day Initiative Vulnerability (Veritas Enterprise Vault Monitoring)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting Veritas Enterprise Vault Monitoring.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40229: ZDI-CAN-15058: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40230: ZDI-CAN-15057: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40231: ZDI-CAN-15053: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40232: ZDI-CAN-14974: Zero Day Initiative Vulnerability (Siemens JT2Go)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against the exploitation of a zero-day vulnerability affecting Siemens JT2Go.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40233: ZDI-CAN-13664: Zero Day Initiative Vulnerability (SolarWinds Orion)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting SolarWinds Orion.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: September 14, 2021

    40295: HTTP: Flarum Core Cross-Site Scripting Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a cross-site scripting vulnerability in Flarum Core.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-32671 CVSS 4.3
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: September 14, 2021

    40298: HTTP: Centreon metaService.php meta_id SQL Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a SQL injection vulnerability in Centreon.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: September 14, 2021

    40312: HTTPS: Yik Yak Traffic Detected
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Low
      - Description: This filter detects an attempt to access Yik Yak.
      - Deployment: Not enabled by default in any deployment.
      - Classification: Security Policy - Other
      - Protocol: SSL/TLS
      - Platform: Multi-Platform Client Application
      - Release Date: September 14, 2021

    40313: HTTP: Yealink Remote Code Execution Exploit
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit a remote code execution vulnerability in Yealink communication software.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-27561
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: September 14, 2021

    40315: HTTP: ImageMagick SVG GhostScript Command Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a command injection vulnerability in ImageMagick.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: September 14, 2021

    40319: HTTP: Adobe Acrobat Reader DC AcroForm buttonGetIcon Use-After-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader DC.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-39836
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: September 14, 2021

    40320: HTTP: Adobe Acrobat DC SMask Image XObject Height Out-of-Bounds Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a buffer overflow vulnerability in Adobe Acrobat Pro DC.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-39843
      - Classification: Vulnerability - Buffer/Heap Overflow
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: September 14, 2021

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 33686: HTTP: Microsoft Edge Chakra InlineArrayPush InlineArrayPop Type Confusion Vulnerability(ZDI-18-1433)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33686: HTTP: Microsoft Edge Chakra InlineArrayPush InlineArrayPop Type Confusion Vulnerability".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: December 11, 2018
      - Last Modified Date: September 14, 2021

    * 33957: HTTP: Adobe Acrobat Pro DC TTF Font Parsing Out-Of-Bounds Read Vulnerability (ZDI-18-1445)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "33957: ZDI-CAN-7534: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: January 15, 2019
      - Last Modified Date: September 14, 2021

    37863: HTTP: NETGEAR Orbi UA_Parser Host Name Command Injection Vulnerability (ZDI-20-1430)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: July 21, 2020
      - Last Modified Date: September 14, 2021

    39631: ZDI-CAN-13719: Zero Day Initiative Vulnerability (AutoDesk Navisworks)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Detection logic updated.
      - Release Date: May 04, 2021
      - Last Modified Date: September 14, 2021

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    29657: RPC: Advantech WebAccess Malicious IOCTL(ZDI-17-938-940,ZDI-18-009-025,18-029-054,18-058-063,18-483)
      - IPS Version: 3.2.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: October 03, 2017
      - Last Modified Date: September 14, 2021

    34225: HTTP: Apple Safari FloatingObjects Use-After-Free Vulnerability (ZDI-19-677)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Release Date: February 05, 2019
      - Last Modified Date: September 14, 2021

    36891: HTTP: D-Link Multiple Routers HNAP PrivateLogin Authentication Bypass Vulnerability (ZDI-20-267)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 04, 2020
      - Last Modified Date: September 14, 2021

    * 36892: HTTP: D-Link Multiple Routers HNAP Authentication Bypass Vulnerability (ZDI-20-268, ZDI-21-1025)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "36892: HTTP: D-Link Multiple Routers HNAP Authentication Bypass Vulnerability (ZDI-20-268)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: February 11, 2020
      - Last Modified Date: September 14, 2021

    38060: HTTP: NETGEAR Multiple Routers Authentication Bypass Vulnerability (ZDI-20-1451,ZDI-21-1051)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "38060: HTTP: NETGEAR Multiple Routers Authentication Bypass Vulnerability (ZDI-20-1451)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: September 01, 2020
      - Last Modified Date: September 14, 2021

  Removed Filters:

    25909: ZDI-CAN-10811: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: May 19, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.

    33389: ZDI-CAN-6742: Zero Day Initiative Vulnerability (Microsoft Office Word)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 19, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    33391: ZDI-CAN-9227: Zero Day Initiative Vulnerability (Microsoft Office PowerPoint)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: August 27, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    33979: ZDI-CAN-7603,7622-7624: Zero Day Initiative Vulnerability (Microsoft Chakra)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 15, 2019
      - Note: This filter is being unshipped because the filter logic has been merged into filter 33686.
	  
    34226: ZDI-CAN-7794: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 05, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    34789: ZDI-CAN-7678: Zero Day Initiative Vulnerability (Microsoft Office)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 19, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    34790: ZDI-CAN-7887: Zero Day Initiative Vulnerability (Microsoft JET Database)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 19, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    34791: ZDI-CAN-7891: Zero Day Initiative Vulnerability (Microsoft JET Database)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 19, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    34864: PWN2OWN ZDI-CAN-8365: Zero Day Initiative Vulnerability (Apple Safari)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 26, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    34923: ZDI-CAN-11036: Zero Day Initiative Vulnerability (Microsoft Windows Media Foundation)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: June 16, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    35121: ZDI-CAN-8120: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: May 14, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    35148: ZDI-CAN-7949: Zero Day Initiative Vulnerability (Microsoft Office Word)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: May 14, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    36040: ZDI-CAN-9183: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: August 27, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    36333: ZDI-CAN-9364: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: October 15, 2019
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37034: ZDI-CAN-10376: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 11, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37054: ZDI-CAN-11154: Zero Day Initiative Vulnerability (Microsoft JET Database)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: June 23, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37246: ZDI-CAN-10522: Zero Day Initiative Vulnerability (Microsoft Windows Media Player)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 03, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37337: ZDI-CAN-10691: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37339: ZDI-CAN-10689: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37340: ZDI-CAN-10688: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37346: ZDI-CAN-10682: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37383: ZDI-CAN-10382: Zero Day Initiative Vulnerability (Microsoft Windows PDF Library)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37396: ZDI-CAN-10744: Zero Day Initiative Vulnerability (Microsoft Windows Media Foundation)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37428: ZDI-CAN-10755: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 31, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37579: ZDI-CAN-10588: Zero Day Initiative Vulnerability (Microsoft Word)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: April 14, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37657: ZDI-CAN-10836: Zero Day Initiative Vulnerability (Microsoft Word)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: April 28, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    37665: ZDI-CAN-10935: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: April 28, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38069: ZDI-CAN-11788: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: September 01, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38330: ZDI-CAN-11975: Zero Day Initiative Vulnerability (Microsoft JET Database)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 03, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38368: ZDI-CAN-12085: Zero Day Initiative Vulnerability (Apache Struts)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Release Date: November 03, 2020
      - Last Modified Date: February 02, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38397: ZDI-CAN-12183: Zero Day Initiative Vulnerability (Microsoft Outlook)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38399: ZDI-CAN-12234: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 17, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38488: ZDI-CAN-12145: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.

    38489: ZDI-CAN-12146: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38490: ZDI-CAN-12149: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38493: ZDI-CAN-12235: Zero Day Initiative Vulnerability (Microsoft Outlook)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38494: ZDI-CAN-12329: Zero Day Initiative Vulnerability (Microsoft JET Database)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: November 24, 2020
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38731: ZDI-CAN-12636: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 19, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38732: ZDI-CAN-12639: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 19, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38733: ZDI-CAN-12642: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 19, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    38734: ZDI-CAN-12644: Zero Day Initiative Vulnerability (Microsoft Windows)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 19, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    39249: ZDI-CAN-12578: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 16, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
	  
    39416: ZDI-CAN-13173: Zero Day Initiative Vulnerability (Oracle WebLogic)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Release Date: April 06, 2021
      - Note: This filter is being unshipped because the underlying ZDI Candidate case was closed.
      
Top of the Page
Premium
Internal
Partner
Rating:
Category:
Configure; Troubleshoot; Deploy
Solution Id:
TP000289041
Feedback
Did this article help you?

Thank you for your feedback!


*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.