Sophos IPS and Application Signature Update

These release notes are for Sophos IPS and Application signature updates.

Version 18.22.34
Released on August 21, 2024

Introduction

The Release Note document for IPS and Application signature Database version 18.22.34 includes support for both, the new and the updated Signatures. The following sections describe the release in detail.

Release Information

Upgrade Applicable on: Version 18.22.33

Fixed issues, listed by ID, description, explanation and Workaround.

Appliance Model Details of Changes Module More Details
All Deployments 13 Applications 61 Application Signatures 7 Application categories Application Filter Click Here for details of changes
XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500 XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450 SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 Any virtual deployment with RAM < 24GB 15 Signatures 11 Vulnerabilities 3 IPS Categories IPS Filter Click Here for details of changes
XG-550, XG-650, XG-750 XGS-5500, XGS-6500 Any virtual deployment with RAM >24GB 29 Signatures 17 Vulnerabilities 4 IPS Categories IPS Filter Click Here for details of changes

Report false positives at support@sophos.com along with the application details.

Upgrade Information

Upgrade type: Automatic

Compatibility Annotations: None

Application Signatures

The Sophos Application Filter controls the application traffic depending on the policy configured, by matching them with the Application Signatures. Application Signatures optimize the detection performance and reduces the false alarms.

The table below provides details of signatures included in this release.

This Application Filter Release include Sixty one (61) Application Signatures are updated for Thirteen (13) Applications.

Fixed issues, listed by ID, description, explanation and Workaround.

Application Name Risk Category
Club Cooee Messenger 3 Instant Messenger
Evernote 2 General Internet
Restart Communications Option 1 Industrial Control System
WebEx 3 Conferencing
Webex Teams 1 Conferencing
Mail-ru Messenger 4 Instant Messenger
HTTP Audio Streaming 1 Streaming Media
HTTP Video Streaming 1 Streaming Media
Ultrasurf Proxy 5 Proxy and Tunnel
QQ Remote Access 3 Remote Access
Eroom Website 4 General Internet
Zoho Meeting Conferencing 2 Conferencing
TOR Proxy 5 Proxy and Tunnel

Terms Explained

Application Name: Name of the Application that can be identified by Sophos Application Filter.

Risk: Describes the level of risk for the application. The levels of risks are described in the table below.

Fixed issues, listed by ID, description, explanation and Workaround.
Risk Level Risk Criteria
1 Very Low
2 Low
3 Medium
4 High
5 Very High

Category: Identifies the category of the Application.

Note: These Application Filtering signatures support prior versions of respective application.

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500, XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450, SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 and Any virtual deployment with RAM < 24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Fifteen(15) Signatures to address Eleven(11) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
BROWSER-CHROME Google Chrome CVE-2021-21206 Use-After-Free vulnerability CVE-2021-21206 browser-chrome 1
SERVER-APACHE Apache CloudStack SAML CVE-2024-41107 Authentication Bypass CVE-2024-41107 server-apache 3
SERVER-APACHE Apache HTTP Server CVE-2024-38472 SSRF Vulnerability CVE-2024-38472 server-apache 2
SERVER-WEBAPP Adobe Commerce and Magento _createFromArray CVE-2024-34102 XML External Entity Injection CVE-2024-34102 server-webapp 1
SERVER-WEBAPP Calibre CVE-2024-6782 Remote Code Execution Vulnerability CVE-2024-6782 server-webapp 1
SERVER-WEBAPP Parse Server LiteralizeRegexPart CVE-2024-39309 SQL Injection CVE-2024-39309 server-webapp 1
SERVER-WEBAPP Progress MOVEit Transfer CVE-2024-5806 SFTP Authentication Bypass CVE-2024-5806 server-webapp 2
SERVER-WEBAPP ServiceNow CVE-2024-4879 Jelly Template Injection Vulnerability CVE-2024-4879 server-webapp 1
SERVER-WEBAPP SEW-EURODRIVE MOVITOOLS MotionStudio CheckProjectBaseFormat CVE-2024-1167 XML External Entity Injection CVE-2024-1167 server-webapp 2
SERVER-WEBAPP SEW-EURODRIVE MOVITOOLS MotionStudio CheckProjectBaseFormat CVE-2024-1167 XML External Entity Injection CVE-2024-1167 server-webapp 5
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2048 attack attempt CVE-2024-39299 server-webapp 1

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XG-550, XG-650, XG-750, XGS-5500, XGS-6500 and Any virtual deployment with RAM >24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Twenty nine(29) Signatures to address Seventeen(17) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
BROWSER-CHROME Google Chrome CVE-2021-21206 Use-After-Free vulnerability CVE-2021-21206 browser-chrome 1
BROWSER-IE Microsoft Edge CVE-2017-11909 JsSetCurrentContext Out Of Bounds Read Attempt CVE-2017-11909 browser-ie 2
SERVER-APACHE Apache CloudStack SAML CVE-2024-41107 Authentication Bypass CVE-2024-41107 server-apache 3
SERVER-APACHE Apache HTTP Server CVE-2024-38472 SSRF Vulnerability CVE-2024-38472 server-apache 2
SERVER-WEBAPP Adobe Commerce and Magento _createFromArray CVE-2024-34102 XML External Entity Injection CVE-2024-34102 server-webapp 1
SERVER-WEBAPP Calibre CVE-2024-6782 Remote Code Execution Vulnerability CVE-2024-6782 server-webapp 1
SERVER-WEBAPP Parse Server LiteralizeRegexPart CVE-2024-39309 SQL Injection CVE-2024-39309 server-webapp 1
SERVER-WEBAPP Progress MOVEit Transfer CVE-2024-5806 SFTP Authentication Bypass CVE-2024-5806 server-webapp 2
SERVER-WEBAPP ServiceNow CVE-2024-4879 Jelly Template Injection Vulnerability CVE-2024-4879 server-webapp 1
SERVER-WEBAPP SEW-EURODRIVE MOVITOOLS MotionStudio CheckProjectBaseFormat CVE-2024-1167 XML External Entity Injection CVE-2024-1167 server-webapp 2
SERVER-WEBAPP SEW-EURODRIVE MOVITOOLS MotionStudio CheckProjectBaseFormat CVE-2024-1167 XML External Entity Injection CVE-2024-1167 server-webapp 5
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2028 attack attempt CVE-2024-21797, CVE-2024-39781, CVE-2024-39782, CVE-2024-39783 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2040 attack attempt CVE-2024-39359 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2041 attack attempt CVE-2024-36493, CVE-2024-39603 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2043 attack attempt CVE-2024-39757 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2045 attack attempt CVE-2024-36272 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2024-2048 attack attempt CVE-2024-39299 server-webapp 1

Terms Explained

Name: Name of the Signature.

CVE-ID: CVE Identification Number - Common Vulnerabilities and Exposures (CVE) provides reference of CVE Identifiers for publicly known information security vulnerabilities.

Category: Class type according to threat.

Severity: Degree of severity - The levels of severity are described in the table below:

Fixed issues, listed by ID, description, explanation and Workaround.
Severity Level Severity Criteria
1 Critical
2 Major
3 Moderate
4 Minor
5 Warning
Important Notice

Sophos Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Sophos Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document. Sophos Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice.

RESTRICTED RIGHTS

©1997 - 2025 Sophos Ltd. All rights reserved.
All rights reserved. Sophos, Sophos logo are trademark of Sophos Technologies Pvt. Ltd.

Corporate Headquarters

Sophos Technologies Pvt. Ltd.
Registered in England and Wales No. 2096520,
The Pentagon, Abingdon Science Park,
Abingdon, OX14 3YP, UK
Web site:
www.sophos.com

© 1997-2025 Sophos Ltd. All Rights Reserved.
Legal
Privacy
Cookies