Cisco Talos Update for FireSIGHT Management Center

Date: 2020-05-07

This SRU number: 2020-05-06-001
Previous SRU number: 2020-05-04-001

Applies to:

This SEU number: 2162
Previous SEU: 2161

Applies to:

This is the complete list of rules added in SRU 2020-05-06-001 and SEU 2162.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Cisco Talos policy, Connectivity, Balanced, Security, and Maximum Detection.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.Max.
153844BROWSER-CHROMEGoogle Chromium ImageCapture use after free attemptoffoffdropdrop
153845BROWSER-CHROMEGoogle Chromium ImageCapture use after free attemptoffoffdropdrop
153846MALWARE-OTHERWin.Trojan.Ursnif malicious outbound connection attempt - gravity generated detectionoffdropdropdrop
153848MALWARE-OTHERWin.Packed.Clipbanker-7764305-0 download attemptoffoffoffdrop
153849MALWARE-OTHERWin.Packed.Clipbanker-7764305-0 download attemptoffoffoffdrop
353851SERVER-WEBAPPCisco ASA and FTD directory traversal attemptoffdropdropdrop
153852MALWARE-OTHERWin.Packed.Razy-7767366-0 download attemptoffoffoffdrop
153853MALWARE-OTHERWin.Packed.Razy-7767366-0 download attemptoffoffoffdrop
153854MALWARE-OTHERWin.Packed.Zusy-7759444-0 download attemptoffoffdropdrop
153855MALWARE-OTHERWin.Packed.Zusy-7759444-0 download attemptoffoffdropdrop
153856MALWARE-CNCEmbedded.Exploit.Hoaxcalls variant outbound connectionoffdropdropdrop
153857SERVER-WEBAPPGrandstream UCM6202 series SQL injection attemptoffdropdropdrop
153858SERVER-WEBAPPGrandstream UCM6202 series SQL injection attemptoffdropdropdrop
153859SERVER-WEBAPPGrandstream UCM6202 series SQL injection attemptoffdropdropdrop
153860SERVER-WEBAPPCenturylink router unauthenticated administrator account disable attemptoffdropdropdrop
153861MALWARE-CNCWin.Trojan.Astaroth outbound beaconoffdropdropdrop
153862SERVER-WEBAPPD-Link DIR-859 UPnP subscribe command injection attemptoffoffdropdrop
153863SERVER-WEBAPPD-Link DIR-859 UPnP subscribe command injection attemptoffoffdropdrop
353864POLICY-OTHERCisco Firepower User Agent Service default MySQL credentials detectedoffoffoffoff
153866SERVER-WEBAPPMicrosoft SharePoint TypeConverter remote code execution attemptoffdropdropdrop
353867PROTOCOL-DNSCisco ASA and FTD IPv6 DNS request stack buffer overflow attemptoffoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.Max.
353847PROTOCOL-OTHERCisco ASA and FTD malformed OSPF denial of service attemptoffoffdropdrop
353850SERVER-WEBAPPCisco ASA and FTD memory disclosure attemptoffoffdropdrop
153865SERVER-OTHERMemcached read command denial of service attemptoffoffoffdrop
353868SERVER-OTHERCisco ASA and FTD MGCP denial of service attemptoffoffdropdrop
353869SERVER-OTHERCisco ASA and FTD MGCP denial of service attemptoffoffdropdrop
353870SERVER-OTHERCisco ASA and FTD MGCP denial of service attemptoffoffdropdrop
353871SERVER-OTHERCisco ASA and FTD MGCP denial of service attemptoffoffdropdrop