Talos Rules 2023-11-14
Talos is aware of vulnerabilities affecting products from Microsoft Corporation.

Microsoft Vulnerability CVE-2023-36033: A coding deficiency exists in Microsoft Windows DWM Core Library that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62632 through 62633, Snort 3: GID 1, SID 300753.

Microsoft Vulnerability CVE-2023-36036: A coding deficiency exists in Microsoft Windows Cloud Files Mini Filter Driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62630 through 62631, Snort 3: GID 1, SID 300752.

Microsoft Vulnerability CVE-2023-36394: A coding deficiency exists in Microsoft Windows Search Service that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62641 through 62642, Snort 3: GID 1, SID 300757.

Microsoft Vulnerability CVE-2023-36399: A coding deficiency exists in Microsoft Windows Storage that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62627 through 62628, Snort 3: GID 1, SID 300751.

Microsoft Vulnerability CVE-2023-36413: A coding deficiency exists in Microsoft Office that may lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62643 through 62644, Snort 3: GID 1, SID 300758.

Talos also has added and modified multiple rules in the file-office, malware-cnc, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091900.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091700.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091601.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091600.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 3:62645 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt (server-webapp.rules)
 * 3:62646 <-> ENABLED <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt (server-webapp.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:13:22 UTC

Snort Subscriber Rules Update

Date: 2023-11-14

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:62635 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62642 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62624 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62640 <-> ENABLED <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt (server-webapp.rules)
 * 1:62634 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62626 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt (os-windows.rules)
 * 1:62625 <-> DISABLED <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt (server-oracle.rules)
 * 1:62647 <-> ENABLED <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt (malware-cnc.rules)
 * 1:62630 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)
 * 1:62636 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62627 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62643 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62632 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62637 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62644 <-> DISABLED <-> FILE-OFFICE Microsoft Office security feature bypass attempt (file-office.rules)
 * 1:62638 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62641 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt (os-windows.rules)
 * 1:62639 <-> DISABLED <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt (server-webapp.rules)
 * 1:62633 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt (os-windows.rules)
 * 1:62628 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt (os-windows.rules)
 * 1:62629 <-> ENABLED <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt (server-webapp.rules)
 * 1:62631 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt (os-windows.rules)

Modified Rules:


 * 1:62555 <-> DISABLED <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt (server-webapp.rules)

2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.0.3.4.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.0.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.1.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.3.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.4.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.5.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:50 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.9.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt


2023-11-14 19:18:51 UTC

Snort Subscriber Rules Update

Date: 2023-11-13-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:300750 <-> SERVER-ORACLE Oracle Advanced Outbound Telephony cross site scripting attempt
* 1:300751 <-> OS-WINDOWS Microsoft Windows Storage elevation of privilege attempt
* 1:300752 <-> OS-WINDOWS Microsoft Windows Cloud Files Mini Filter driver elevation of privilege attempt
* 1:300753 <-> OS-WINDOWS Microsoft Windows Desktop Window Manager escalation of privilege attempt
* 1:300754 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300755 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300756 <-> SERVER-WEBAPP Apache JSPWiki UserPreferences.jsp cross-site request forgery attempt
* 1:300757 <-> OS-WINDOWS Microsoft Windows Search service elevation of privilege attempt
* 1:300758 <-> FILE-OFFICE Microsoft Office security feature bypass attempt
* 1:62626 <-> OS-WINDOWS Microsoft Windows Pragmatic General Multicast denial of service attempt
* 1:62629 <-> SERVER-WEBAPP Atlassian Confluence authentication bypass attempt
* 1:62640 <-> SERVER-WEBAPP F5 BIG-IP AJP authentication bypass attempt
* 3:62645 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1855 attack attempt
* 3:62646 <-> SERVER-WEBAPP TRUFFLEHUNTER TALOS-2023-1854 attack attempt
* 1:62647 <-> MALWARE-CNC Win.Backdoor.SugarGhost variant outbound communication attempt

Modified Rules:

* 1:62555 <-> SERVER-WEBAPP Progress WS_FTP Server insecure deserialization attempt