Cloud One Workload Security and Deep Security Updates
- * indicates a new version of an existing rule
Deep Packet Inspection Rules:
SSL/TLS Server
1010258 - Microsoft Windows Transport Layer Security Denial of Service Vulnerability (CVE-2020-1118) - Server
Web Application Common
1000552* - Generic Cross Site Scripting(XSS) Prevention
Web Application PHP Based
1010247 - PHP 'simplestring_addn' Function Out Of Bounds Write Vulnerability (CVE-2016-6296)
1010250 - PHP 'spl_ptr_heap_insert' Function Use After Free Vulnerability (CVE-2015-4116)
Web Client Common
1010261 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-24) - 1
1010262 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-24) - 2
1010263 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-24) - 3
1010239 - Microsoft Media Foundation Information Disclosure Vulnerability (CVE-2020-0939)
1010259 - Microsoft Windows Graphics Components Remote Code Execution Vulnerability (CVE-2020-1153)
Web Client Internet Explorer/Edge
1010254 - Microsoft Internet Explorer JScript Remote Code Execution Vulnerability (CVE-2020-1062)
1010257 - Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability (CVE-2020-1035)
1010256 - Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability (CVE-2020-1058)
1010255 - Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability (CVE-2020-1060)
Web Server Common
1010235 - Cisco Data Center Network Manager 'createLanFabric' Command Injection Vulnerability (CVE-2019-15978)
1010243 - Cisco Data Center Network Manager 'importTS' Command Injection Vulnerability (CVE-2019-15979)
Web Server HTTPS
1004351* - Detected Malicious HTTP Requests
ZeroMQ Message Transport Protocol (ZMTP)
1010265 - SaltStack Salt Authorization Weakness Vulnerability (CVE-2020-11651)
1010267 - SaltStack Salt Directory Traversal Vulnerability (CVE-2020-11652)
Integrity Monitoring Rules:
1010266 - SaltStack Vulnerabilities Exploitation Detected
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Jenkins Remoting
1010233* - Jenkins JRMP Java Library Deserialization Remote Code Execution Vulnerability (CVE-2016-0788)
Oracle E-Business Suite Web Interface
1010251 - Oracle E-Business Suite Human Resources SQL Injection Vulnerability (CVE-2020-2882 and CVE-2020-2956)
Telnet Server
1010241 - netkit telnetd Buffer Overflow Vulnerability (CVE-2020-10188)
Web Application Common
1010219* - Centreon formMibs.php Command Injection Vulnerability (CVE-2019-15298)
Web Application PHP Based
1010245* - PHP 'ext/snmp/snmp.c' Use After Free Vulnerability (CVE-2016-6295)
1010234* - PHP 'get_headers()' NULL Byte Injection Vulnerability (CVE-2020-7066)
1010236 - PHP 'php_wddx_process_data' Function Illegal Memory Access Vulnerability (CVE-2016-7129)
1010246 - PHP WDDX Deserialization Use After Free Vulnerability (CVE-2016-3141)
Web Server Common
1010169 - Cisco Data Center Network Manager REST API Authentication Bypass Vulnerability (CVE-2019-15975)
1010173 - Cisco Data Center Network Manager REST API SQL Injection Vulnerability (CVE-2019-15984)
Web Server Oracle
1010223* - Oracle WebLogic Java Messaging Service Unspecified Vulnerability (CVE-2016-0638)
1010242 - Oracle WebLogic Server Insecure Deserialization Vulnerability (CVE-2020-2798)
1010253 - Oracle WebLogic Server T3 Protocol Deserialization Of Untrusted Data Vulnerability (CVE-2020-2883)
1010168* - Oracle WebLogic Server Untrusted Data Deserialization Vulnerability (CVE-2020-2555)
Web Server SharePoint
1010238* - Microsoft Office SharePoint Cross Site Scripting Vulnerability (CVE-2020-0693)
Integrity Monitoring Rules:
1002776* - Microsoft Windows - Startup Programs Modified (ATT&CK T1112, T1060)
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
HP System Management Homepage
1010221* - HPE System Management Homepage Remote Denial of Service Vulnerability (CVE-2017-12545)
Jenkins Remoting
1010233 - Jenkins JRMP Java Library Deserialization Remote Code Execution Vulnerability (CVE-2016-0788)
Memcached
1010237 - Memcached 'try_read_command_binary' Stack Buffer Overflow Vulnerability (CVE-2020-10931)
Redis Server
1010231* - Redis Cron Remote Code Execution Vulnerability
Web Application Common
1010219 - Centreon formMibs.php Command Injection Vulnerability (CVE-2019-15298)
1005933* - Identified Directory Traversal Sequence In Uri Query Parameter
1010225* - Liferay Portal Untrusted Deserialization Vulnerability (CVE-2020-7961)
1010217* - rConfig 'commands.inc.php' SQL Injection Vulnerability (CVE-2020-10220)
Web Application PHP Based
1010245 - PHP 'ext/snmp/snmp.c' Use After Free Vulnerability (CVE-2016-6295)
1010234 - PHP 'get_headers()' NULL Byte Injection Vulnerability (CVE-2020-7066)
Web Client Common
1010182* - Google Chrome Type Confusion Vulnerability (CVE-2020-6418)
1010244 - Microsoft Remote Desktop Connection Manager Information Disclosure Vulnerability (CVE-2020-0765)
1010224 - Microsoft Windows Media Foundation Remote Code Execution Vulnerability (CVE-2019-1430)
Web Server Miscellaneous
1009942* - GNOME 'libsoup' HTTP Chunked Encoding Remote Code Execution Vulnerability (CVE-2017-2885)
Web Server Oracle
1010223* - Oracle WebLogic Java Messaging Service Unspecified Vulnerability (CVE-2016-0638)
Web Server SharePoint
1010238 - Microsoft Office SharePoint Cross Site Scripting Vulnerability (CVE-2020-0693)
1010227* - Microsoft SharePoint Scorecards Deserialization Of Untrusted Data Remote Code Execution Vulnerability (CVE-2020-0931)
1010228* - Microsoft SharePoint TypeConverter Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2020-0932)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1005468* - Web Application - Wordpress - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
Redis Server
1010231* - Redis Cron Remote Code Execution Vulnerability
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1010214 - Identified Trend Micro ApexOne Backup Folder Access
HP System Management Homepage
1010221 - HPE System Management Homepage Remote Denial of Service Vulnerability (CVE-2017-12545)
Microsoft Office
1010230 - Microsoft Excel Remote Code Execution Vulnerability (CVE-2020-0906)
Redis Server
1010231 - Redis Cron Remote Code Execution Vulnerability
1009967* - Redis Unauthenticated Code Execution Vulnerability
Web Application Common
1010225 - Liferay Portal Untrusted Deserialization Vulnerability (CVE-2020-7961)
Web Client Common
1010226 - Microsoft Windows JET Database Engine Remote Code Execution Vulnerability (CVE-2020-0953)
Web Server Common
1010080* - Identified Usage Of FreeSWITCH Event Socket Interface
Web Server Oracle
1010223 - Oracle WebLogic Java Messaging Service Unspecified Vulnerability (CVE-2016-0638)
Web Server SharePoint
1010227 - Microsoft SharePoint Scorecards Deserialization Of Untrusted Data Remote Code Execution Vulnerability (CVE-2020-0931)
1010228 - Microsoft SharePoint TypeConverter Deserialization of Untrusted Data Remote Code Execution Vulnerability (CVE-2020-0932)
Integrity Monitoring Rules:
1003168* - Unix - Open Port Monitor
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
HP Intelligent Management Center Dbman
1010213* - HPE Intelligent Management Center 'dbman' RestartDB Command Injection Vulnerability (CVE-2017-5816)
Redis Server
1009954* - Redis Stack Buffer Overflow Vulnerability (CVE-2018-11218)
Solr Service
1010203* - Apache Solr VelocityResponseWriter Remote Code Execution Vulnerability (CVE-2019-17558)
Suspicious Client Ransomware Activity
1007581* - Ransomware Lectool
Web Application Common
1010196* - Identified Suspicious .NET Serialized Object
1010210 - Sonatype Nexus Repository Manager Default Credentials Vulnerability (CVE-2019-9629)
1010217 - rConfig 'commands.inc.php' SQL Injection Vulnerability (CVE-2020-10220)
1010215* - rConfig Network Device Configuration Tool AjaxAddTemplate.php Command Injection Vulnerability (CVE-2020-10221)
Web Client Common
1010207* - Microsoft Windows Multiple Type1 Font Parsing Remote Code Execution Vulnerabilities (CVE-2020-1020 and CVE-2020-0938)
Web Client Internet Explorer/Edge
1010220 - Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability (CVE-2020-0968)
Web Server Common
1010162* - Cisco Data Center Network Manager Directory Traversal Vulnerability (CVE-2019-15980)
Web Server Miscellaneous
1008843* - FasterXML Jackson JSON Library Deserializer Multiple Remote Code Execution Vulnerabilities
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
HP Intelligent Management Center Dbman
1010213 - HPE Intelligent Management Center 'dbman' RestartDB Command Injection Vulnerability (CVE-2017-5816)
Mail Server Common
1010001* - Dovecot And Pigeonhole Remote Code Execution Vulnerability (CVE-2019-11500)
NTP Server Linux
1008320* - Network Time Protocol Daemon 'peer_xmit' Mode Denial Of Service Vulnerability (CVE-2017-6464)
Solr Service
1010203 - Apache Solr VelocityResponseWriter Remote Code Execution Vulnerability (CVE-2019-17558)
Web Application Common
1010183* - Microsoft Exchange Validation Key Remote Code Execution Vulnerability (CVE-2020-0688)
1010215 - rConfig Network Device Configuration Tool AjaxAddTemplate.php Command Injection Vulnerability (CVE-2020-10221)
Web Server Common
1010162 - Cisco Data Center Network Manager Directory Traversal Vulnerability (CVE-2019-15980)
Web Server Squid
1010177* - Squid Proxy HTTP Request Processing Buffer Overflow Vulnerability (CVE-2020-8450)
Windows Services RPC Server DCERPC
1003766* - Local Security Authority Subsystem Service Integer Overflow Vulnerability
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services - Client
1010201 - Microsoft Windows LNK Remote Code Execution Vulnerability Over SMB (CVE-2020-0729)
Microsoft Host Integration Server SnaBase Service
1004683* - Microsoft Host Integration Server snabase.exe Memory Access Error
Microsoft Office
1010208 - Microsoft Office Excel Linked List Corruption Vulnerability (CVE-2011-0979)
1010209 - Microsoft Office Excel Remote Code Execution Vulnerability (CVE-2011-0980)
Web Application Common
1010196 - Identified Suspicious .NET Serialized Object
1010183* - Microsoft Exchange Validation Key Remote Code Execution Vulnerability (CVE-2020-0688)
1010199* - Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability (CVE-2020-0618)
Web Client Common
1010193* - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-13)
1010211 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-13) - 1
1010182* - Google Chrome Type Confusion Vulnerability (CVE-2020-6418)
1010200 - Microsoft Windows LNK Remote Code Execution Vulnerability Over WebDAV (CVE-2020-0729)
Web Server Common
1010097* - CMS Made Simple (CMSMS) Remote Code Execution Vulnerability (CVE-2019-9692)
1010178* - Cisco Data Center Network Manager Directory Traversal Vulnerability (CVE-2019-15981)
Web Server Squid
1010177 - Squid Proxy HTTP Request Processing Buffer Overflow Vulnerability (CVE-2020-8450)
Integrity Monitoring Rules:
1007210* - TMTR-0018: Suspicious Files Detected In User Profile Directory
1010138* - Trend Micro Apex One And OfficeScan Directory Traversal Vulnerability (CVE-2019-9489)
1003020* - Trend Micro Deep Security Manager
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update. - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1010164 - Identified Possible Ransomware File Extension Create Activity Over Network Share
1010192* - Microsoft Windows SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796)
SolarWinds Dameware Mini Remote Control
1010174* - SolarWinds DameWare Mini Remote Control Remote Code Execution Vulnerability (CVE-2019-3980)
Trend Micro OfficeScan
1010181* - Trend Micro Apex One And OfficeScan Server Directory Traversal Vulnerability (CVE-2020-8599)
1010191* - Trend Micro Apex One And OfficeScan Server Migration Tool Remote Code Execution Vulnerability (CVE-2020-8467)
1010179* - Trend Micro Multiple Products Arbitrary File Delete Vulnerability (CVE-2020-8470)
1010202* - Trend Micro Worry-Free Business Security Directory Traversal Vulnerability (CVE-2020-8600)
Web Application Common
1007609* - ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714)
1010183* - Microsoft Exchange Validation Key Remote Code Execution Vulnerability (CVE-2020-0688)
1010199* - Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability (CVE-2020-0618)
1010194* - WordPress 'GDPR Cookie Consent Plugin' Stored Cross-Site Scripting Vulnerability
Web Client Common
1010205 - Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2020-0738)
1010207 - Microsoft Windows Multiple Type1 Font Parsing Remote Code Execution Vulnerabilities
Web Server Common
1010097 - CMS Made Simple (CMSMS) Remote Code Execution Vulnerability (CVE-2019-9692)
1010082* - CMS Made Simple Authenticated RCE Via Object Injection Vulnerability (CVE-2019-9055)
1010178 - Cisco Data Center Network Manager Directory Traversal Vulnerability (CVE-2019-15981)
1010172* - WordPress InfiniteWP And Time Capsule Plugin Client Authentication Bypass Vulnerability (CVE-2020-8771)
ZohoCorp ManageEngine Desktop Central
1010197* - Zoho ManageEngine Desktop Central Remote Code Execution Vulnerability (CVE-2020-10189)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1002831* - Unix - Syslog - * indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1007596* - Identified Possible Ransomware File Extension Rename Activity Over Network Share
1010192* - Microsoft Windows SMBv3 Remote Code Execution Vulnerability (CVE-2020-0796)
DCERPC Services - Client
1007913* - Identified Possible Ransomware File Extension Rename Activity Over Network Share - Client
Trend Micro OfficeScan
1010181 - Trend Micro Apex One And OfficeScan Server Directory Traversal Vulnerability (CVE-2020-8599)
1010191 - Trend Micro Apex One And OfficeScan Server Migration Tool Remote Code Execution Vulnerability (CVE-2020-8467)
1010179 - Trend Micro Multiple Products Arbitrary File Delete Vulnerability (CVE-2020-8470)
1010202 - Trend Micro Worry-Free Business Security Directory Traversal Vulnerability (CVE-2020-8600)
Web Application Common
1010199 - Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability (CVE-2020-0618)
Web Client Common
1010193 - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB20-13)
Web Server Common
1010082 - CMS Made Simple Authenticated RCE Via Object Injection Vulnerability (CVE-2019-9055)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1002831* - Unix - Syslog