Talos Rules 2023-04-20
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the malware-backdoor, malware-cnc, malware-other, malware-tools, os-other, protocol-snmp and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 3:43431 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43430 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43425 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43424 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43429 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43426 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43428 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43427 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)
 * 3:43432 <-> ENABLED <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt (protocol-snmp.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 3:50335 <-> ENABLED <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt (server-webapp.rules)

2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61632 <-> ENABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (snort3-server-webapp.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (snort3-malware-cnc.rules)

Modified Rules:



2023-04-20 19:10:56 UTC

Snort Subscriber Rules Update

Date: 2023-04-20

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:61635 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61641 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61637 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61639 <-> ENABLED <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt (malware-cnc.rules)
 * 1:61632 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)
 * 1:61648 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61646 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61633 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61649 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61650 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61653 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61636 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61647 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61643 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61642 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61638 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61640 <-> DISABLED <-> MALWARE-TOOLS Chrome infostealer download attempt (malware-tools.rules)
 * 1:61652 <-> ENABLED <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt (malware-backdoor.rules)
 * 1:61634 <-> DISABLED <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt (os-other.rules)
 * 1:61644 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)
 * 1:61651 <-> DISABLED <-> SERVER-OTHER Apache Commons Text string interpolation remote code execution attempt (server-other.rules)
 * 1:61645 <-> DISABLED <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt (malware-other.rules)

Modified Rules:


 * 1:60581 <-> DISABLED <-> SERVER-WEBAPP GitLab project import command injection attempt (server-webapp.rules)

2023-04-20 19:13:50 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:50 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:50 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:50 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:50 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt


2023-04-20 19:13:51 UTC

Snort Subscriber Rules Update

Date: 2023-04-20-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300501 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300502 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300503 <-> OS-OTHER Apple macOS and iOS IOSurfaceAccelerator out-of-bounds write attempt
* 1:300504 <-> MALWARE-TOOLS Chrome infostealer download attempt
* 1:300505 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300506 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300507 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300508 <-> MALWARE-OTHER Linux.Trojan.SysUpdate variant download attempt
* 1:300509 <-> MALWARE-BACKDOOR Win.Backdoor.Chollima file download attempt
* 1:61632 <-> SERVER-WEBAPP GitLab project import command injection attempt
* 1:61639 <-> MALWARE-CNC Win.Trojan.SysUpdate variant beaconing attempt

Modified Rules:

* 3:43424 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43425 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43426 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43427 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43428 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43429 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43430 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43431 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:43432 <-> PROTOCOL-SNMP Cisco IOS SNMP OID parsing stack buffer overflow attempt
* 3:50335 <-> SERVER-WEBAPP Cisco Industrial Network Director remote code execution attempt
* 1:60581 <-> SERVER-WEBAPP GitLab project import command injection attempt