Talos Rules 2023-08-17
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the malware-cnc, malware-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-16-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300662 <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt
* 1:300663 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:300664 <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt
* 1:62250 <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt
* 1:62253 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62254 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62255 <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt
* 1:62256 <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt
* 1:62259 <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt
* 1:62260 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62261 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt
* 1:62262 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 1:62263 <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt
* 3:62266 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62267 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62268 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62269 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62270 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62271 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62272 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62273 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62274 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62275 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62276 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62277 <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt
* 3:62278 <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt
* 3:62279 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62280 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62281 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt
* 3:62282 <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt

Modified Rules:

* 1:31006 <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection


2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)

2023-08-17 13:39:56 UTC

Snort Subscriber Rules Update

Date: 2023-08-17

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62250 <-> DISABLED <-> SERVER-WEBAPP WordPress Limit Login Attempts plugin cross site scripting attempt (server-webapp.rules)
 * 1:62251 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62252 <-> DISABLED <-> MALWARE-OTHER Andr.Trojan.Bahamut variant download attempt (malware-other.rules)
 * 1:62253 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62254 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62255 <-> ENABLED <-> MALWARE-CNC Win.Malware.Lazarus variant outbound connection attempt (malware-cnc.rules)
 * 1:62256 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62257 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62258 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server directory traversal attempt (server-webapp.rules)
 * 1:62259 <-> DISABLED <-> SERVER-WEBAPP Adobe ColdFusion Application Server command injection attempt (server-webapp.rules)
 * 1:62260 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62261 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted filetype access attempt (policy-other.rules)
 * 1:62262 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62263 <-> DISABLED <-> POLICY-OTHER Ivanti Endpoint Manager Mobile restricted endpoint access attempt (policy-other.rules)
 * 1:62264 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 1:62265 <-> DISABLED <-> POLICY-OTHER HTML Sanitizer cross site scripting attempt (policy-other.rules)
 * 3:62277 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62276 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62281 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62282 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62266 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62267 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62268 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62269 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62270 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62271 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62272 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62273 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62274 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)
 * 3:62278 <-> ENABLED <-> SERVER-WEBAPP Cisco Duo Device Health Application directory traversal attempt (server-webapp.rules)
 * 3:62279 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62280 <-> ENABLED <-> SERVER-WEBAPP Cisco Expressway and TelePresence VCS command injection attempt (server-webapp.rules)
 * 3:62275 <-> ENABLED <-> SERVER-WEBAPP Cisco Unified Communications Manager SQL injection attempt (server-webapp.rules)

Modified Rules:


 * 1:31006 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Nethief initial outbound connection (malware-cnc.rules)