Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-04-04

This SRU number: 2017-04-03-002
Previous SRU number: 2017-03-30-001

Applies to:

This SEU number: 1645
Previous SEU: 1640

Applies to:

This is the complete list of rules added in SRU 2017-04-03-002 and SEU 1645.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142117BROWSER-IEMicrosoft Internet Explorer Typed Array use after free attemptoffoffdrop
142118BROWSER-IEMicrosoft Internet Explorer Typed Array use after free attemptoffoffdrop
142119SERVER-WEBAPPpfSense openvpn_wizard PHP code injection attemptoffoffdrop
142122BROWSER-PLUGINSInvensys Wonderware Archestra ActiveX clsid access attemptoffoffdrop
142123BROWSER-PLUGINSInvensys Wonderware Archestra ActiveX clsid access attemptoffoffdrop
142124BROWSER-PLUGINSInvensys Wonderware Archestra ActiveX clsid access attemptoffoffdrop
142125BROWSER-PLUGINSInvensys Wonderware Archestra ActiveX clsid access attemptoffoffdrop
142126MALWARE-CNCWin.Trojan.Acronym variant outbound connection attemptoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142115DELETEDMALWARE-TOOLS TESTING RULE
142116DELETEDMALWARE-TOOLS TESTING RULE
142120SERVER-WEBAPPDahua IP Camera username and password disclosure attemptoffoffoff
142121SERVER-WEBAPPDahua IP Camera username and password disclosure attemptoffoffoff
142127PROTOCOL-SCADAEaton Network Pi3Web DOS attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.