* Talos combines our security experts from TRAC, SecApps, and VRT teams.
This SRU number: 2017-05-17-001
Previous SRU number: 2017-05-16-001
Applies to:
This SEU number: 1672
Previous SEU: 1671
Applies to:
This is the complete list of rules added in SRU 2017-05-17-001 and SEU 1672.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 42916 | MALWARE-CNC | Win.Trojan.Eternalblue variant echo request | off | drop | drop |
1 | 42917 | MALWARE-CNC | Win.Trojan.Eternalblue variant echo response | off | drop | drop |
1 | 42920 | SERVER-WEBAPP | LogRhythm Network Monitor JSON configuration API command injection attempt | off | off | drop |
1 | 42921 | BROWSER-PLUGINS | Schneider Electric SoMachine HVAC ActiveX information disclosure clsid access attempt | off | off | off |
1 | 42922 | BROWSER-PLUGINS | Schneider Electric SoMachine HVAC ActiveX information disclosure clsid access attempt | off | off | off |
3 | 42923 | SERVER-WEBAPP | Cisco Prime Collaboration ScriptMgr authentication bypass attempt | off | off | drop |
3 | 42924 | POLICY-OTHER | Cisco Prime Collaboration potentially unauthorized log file access detected | off | off | off |
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 42918 | FILE-IDENTIFY | ISO file attachment detected | off | off | off |
1 | 42919 | FILE-IDENTIFY | ISO file attachment with executable detected | off | off | off |
Updated rules can be found at this link.