Cisco Talos Update for FireSIGHT Management Center

Date: 2019-10-03

This SRU number: 2019-10-02-001
Previous SRU number: 2019-09-30-001

Applies to:

This SEU number: 2074
Previous SEU: 2073

Applies to:

This is the complete list of rules added in SRU 2019-10-02-001 and SEU 2074.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Cisco Talos policy, Connectivity, Balanced, Security, and Maximum Detection.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.Max.
151686SERVER-WEBAPPSchneider Electric Accutech Manager HTTP URI buffer overflow attemptoffoffoffdrop
351687SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351688SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351689SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351690SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351691SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351692SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351693SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351694SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351695SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351696SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351697SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351698SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351699SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351700SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351701SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351702SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351703SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351704SERVER-WEBAPPCisco Firepower Management Center SQL injection attemptoffoffdropdrop
351705SERVER-WEBAPPCisco Firepower Management Center directory traversal attemptoffoffdropdrop
351706SERVER-WEBAPPCisco Firepower Management Center directory traversal attemptoffoffdropdrop
351707SERVER-WEBAPPCisco Firepower Management Center directory traversal attemptoffoffdropdrop
351708SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351709SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351710SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351711SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
151712INDICATOR-COMPROMISEWin.Trojan.NanoCore DNS request for known malware domain bsbs.duckdns.orgoffoffdropdrop
151714BROWSER-IEMicrosoft Edge prototype JsBuiltInEngineInterfaceExtensionObject use-after-free attemptoffoffdropdrop
151715BROWSER-IEMicrosoft Edge prototype JsBuiltInEngineInterfaceExtensionObject use-after-free attemptoffoffdropdrop
351716SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351717SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351718SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
351719SERVER-WEBAPPCisco Firepower Management Center command injection attemptoffoffdropdrop
151720MALWARE-CNCWin.Trojan.Alreay malicious executable download attemptoffdropdropdrop
151721MALWARE-CNCWin.Trojan.Alreay malicious executable download attemptoffdropdropdrop
151722MALWARE-CNCWin.Trojan.Alreay malicious executable download attemptoffdropdropdrop
151723MALWARE-CNCWin.Trojan.Alreay malicious executable download attemptoffdropdropdrop
151725SERVER-WEBAPPHAProxy H2 Frame heap memory corruption attemptoffoffoffdrop
151726MALWARE-CNCWin.Trojan.Silence variant proxy connection detectedoffdropdropdrop
151727MALWARE-CNCWin.Trojan.Silence variant proxy connection detectedoffdropdropdrop
351728SERVER-WEBAPPCisco WebVPN cross site scripting attemptoffoffdropdrop
351729SERVER-WEBAPPCisco WebVPN cross site scripting attemptoffoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.Max.
151685SERVER-OTHERSymantec AMS Intel handler service overly large size1 dos attemptoffoffoffdrop
351713SERVER-WEBAPPCisco WebVPN denial of service attemptoffoffdropdrop
151724SERVER-OTHERNovell Remote Manager off-by-one denial of service attemptoffoffoffdrop