Sophos IPS and Application Signature Update

These release notes are for Sophos IPS and Application signature updates.

Version 18.23.15
Released on March 20, 2025

Introduction

The Release Note document for IPS and Application signature Database version 18.23.15 includes support for both, the new and the updated Signatures. The following sections describe the release in detail.

Release Information

Upgrade Applicable on: Version 18.23.14

Fixed issues, listed by ID, description, explanation and Workaround.

Appliance Model Details of Changes Module More Details
All Deployments 15 Applications 70 Application Signatures 2 Application categories Application Filter Click Here for details of changes
XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500 XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450 SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 Any virtual deployment with RAM < 24GB 23 Signatures 18 Vulnerabilities 4 IPS Categories IPS Filter Click Here for details of changes
XG-550, XG-650, XG-750 XGS-5500, XGS-6500 Any virtual deployment with RAM >24GB 27 Signatures 22 Vulnerabilities 5 IPS Categories IPS Filter Click Here for details of changes

Report false positives at support@sophos.com along with the application details.

Upgrade Information

Upgrade type: Automatic

Compatibility Annotations: None

Application Signatures

The Sophos Application Filter controls the application traffic depending on the policy configured, by matching them with the Application Signatures. Application Signatures optimize the detection performance and reduces the false alarms.

The table below provides details of signatures included in this release.

This Application Filter Release include Seventy (70) Application Signatures are updated for Fifteen (15) Applications.

Fixed issues, listed by ID, description, explanation and Workaround.

Application Name Risk Category
Cisco GDP 1 Network Services
corerjd 1 Network Services
COSEM 1 Network Services
CSNET-NS 1 Network Services
HP Perf 1 Network Services
HSRP 1 Network Services
HTTPMGT 1 Network Services
Ipfix 1 Network Services
KVM 1 Network Services
Netinfo 1 Network Services
Masqdialer 1 Network Services
MS CRS 1 Network Services
NetScout 1 Network Services
NSSTP 1 Network Services
TOR Proxy 5 Proxy and Tunnel

Terms Explained

Application Name: Name of the Application that can be identified by Sophos Application Filter.

Risk: Describes the level of risk for the application. The levels of risks are described in the table below.

Fixed issues, listed by ID, description, explanation and Workaround.
Risk Level Risk Criteria
1 Very Low
2 Low
3 Medium
4 High
5 Very High

Category: Identifies the category of the Application.

Note: These Application Filtering signatures support prior versions of respective application.

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500, XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450, SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 and Any virtual deployment with RAM < 24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Twenty three(23) Signatures to address Eighteen(18) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
BROWSER-IE Microsoft Internet Explorer Dictionary Object use after free attempt CVE-2013-5056 browser-ie 1
BROWSER-IE Microsoft Internet Explorer HTML frame injection attempt CVE-2004-0719 browser-ie 2
OS-WINDOWS Microsoft Office OLE UtOlePresStmToContentsStm memory corruption attempt CVE-2025-21298 os-windows 1
OS-WINDOWS Microsoft Windows Explorer CFileSysEnum CVE-2024-49082 Directory Traversal CVE-2024-49082 os-windows 3
SERVER-APACHE Apache Tomcat JSP CVE-2024-50379 Compilation Race Condition CVE-2024-50379 server-apache 1
SERVER-WEBAPP Aviatrix Controllers command injection attempt CVE-2024-50603 server-webapp 1
SERVER-WEBAPP HPE Insight Remote Support getDocumentRootElement XML External Entity Injection CVE-2024-53674 server-webapp 1
SERVER-WEBAPP HPE Insight Remote Support processAtatchmentDataStream ,CVE-2024-53676 Directory Traversal CVE-2024-53676 server-webapp 1
SERVER-WEBAPP HP OpenView Network Node Manager ovet_demandpoll.exe format string execution attempt CVE-2010-1550 server-webapp 1
SERVER-WEBAPP Ivanti Endpoint Manager Credential Coercion Vulnerabilities CVE-2024-10811, CVE-2024-13159, CVE-2024-13160, CVE-2024-13161 server-webapp 1
SERVER-WEBAPP Logsign Unified SecOps CVE-2025-1044 Authentication Bypass CVE-2025-1044 server-webapp 1
SERVER-WEBAPP Microsoft Windows MSHTML File Extension Spoofing CVE-2024-43461 Remote Code Execution CVE-2024-43461 server-webapp 2
SERVER-WEBAPP MongoDB CVE-2024-53900 Remote Code Execution Vulnerability CVE-2024-53900 server-webapp 1
SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt CVE-2018-19410 server-webapp 1
SERVER-WEBAPP SimpleHelp SimpleHelp WebDownloadServer CVE-2024-57727 Directory Traversal CVE-2024-57727 server-webapp 2
SERVER-WEBAPP SQuery libpath PHP file include attempt CVE-2006-1688 server-webapp 2
SERVER-WEBAPP Wazuh CVE-2025-24016 Remote Code Execution Vulnerability CVE-2025-24016 server-webapp 2
SERVER-WEBAPP WSO2 Multiple Products SynapseArtifactUploaderAdmin CVE-2024-7074 Directory Traversal CVE-2024-7074 server-webapp 3

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XG-550, XG-650, XG-750, XGS-5500, XGS-6500 and Any virtual deployment with RAM >24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Twenty seven(27) Signatures to address Twenty two(22) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
BROWSER-IE Microsoft Internet Explorer Dictionary Object use after free attempt CVE-2013-5056 browser-ie 1
BROWSER-IE Microsoft Internet Explorer HTML frame injection attempt CVE-2004-0719 browser-ie 2
OS-WINDOWS Microsoft Office OLE UtOlePresStmToContentsStm memory corruption attempt CVE-2025-21298 os-windows 1
OS-WINDOWS Microsoft Windows Explorer CFileSysEnum CVE-2024-49082 Directory Traversal CVE-2024-49082 os-windows 3
SERVER-APACHE Apache Tomcat JSP CVE-2024-50379 Compilation Race Condition CVE-2024-50379 server-apache 1
SERVER-OTHER CloudMe Sync Client stack buffer overflow attempt CVE-2018-6892 server-other 1
SERVER-OTHER HP Database Archiving Software GIOP parsing buffer overflow attempt CVE-2011-4164 server-other 2
SERVER-WEBAPP Aviatrix Controllers command injection attempt CVE-2024-50603 server-webapp 1
SERVER-WEBAPP HPE Insight Remote Support getDocumentRootElement XML External Entity Injection CVE-2024-53674 server-webapp 1
SERVER-WEBAPP HPE Insight Remote Support processAtatchmentDataStream ,CVE-2024-53676 Directory Traversal CVE-2024-53676 server-webapp 1
SERVER-WEBAPP HP OpenView Network Node Manager ovet_demandpoll.exe format string execution attempt CVE-2010-1550 server-webapp 1
SERVER-WEBAPP Ivanti Endpoint Manager Credential Coercion Vulnerabilities CVE-2024-10811, CVE-2024-13159, CVE-2024-13160, CVE-2024-13161 server-webapp 1
SERVER-WEBAPP Logsign Unified SecOps CVE-2025-1044 Authentication Bypass CVE-2025-1044 server-webapp 1
SERVER-WEBAPP Microsoft Windows MSHTML File Extension Spoofing CVE-2024-43461 Remote Code Execution CVE-2024-43461 server-webapp 2
SERVER-WEBAPP MongoDB CVE-2024-53900 Remote Code Execution Vulnerability CVE-2024-53900 server-webapp 1
SERVER-WEBAPP Paessler PRTG Network Monitor local file inclusion attempt CVE-2018-19410 server-webapp 1
SERVER-WEBAPP Palo Alto Networks Expedition regionsDiscovery.php CVE-2025-0107 Insecure Deserialization CVE-2025-0107 server-webapp 2
SERVER-WEBAPP SimpleHelp SimpleHelp WebDownloadServer CVE-2024-57727 Directory Traversal CVE-2024-57727 server-webapp 2
SERVER-WEBAPP SQuery libpath PHP file include attempt CVE-2006-1688 server-webapp 2
SERVER-WEBAPP Squid Proxy ESI Response Processing esi_assign CVE-2024-45802 Denial of Service CVE-2024-45802 server-webapp 2
SERVER-WEBAPP Wazuh CVE-2025-24016 Remote Code Execution Vulnerability CVE-2025-24016 server-webapp 2
SERVER-WEBAPP WSO2 Multiple Products SynapseArtifactUploaderAdmin CVE-2024-7074 Directory Traversal CVE-2024-7074 server-webapp 3

Terms Explained

Name: Name of the Signature.

CVE-ID: CVE Identification Number - Common Vulnerabilities and Exposures (CVE) provides reference of CVE Identifiers for publicly known information security vulnerabilities.

Category: Class type according to threat.

Severity: Degree of severity - The levels of severity are described in the table below:

Fixed issues, listed by ID, description, explanation and Workaround.
Severity Level Severity Criteria
1 Critical
2 Major
3 Moderate
4 Minor
5 Warning
Important Notice

Sophos Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Sophos Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document. Sophos Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice.

RESTRICTED RIGHTS

©1997 - 2025 Sophos Ltd. All rights reserved.
All rights reserved. Sophos, Sophos logo are trademark of Sophos Technologies Pvt. Ltd.

Corporate Headquarters

Sophos Technologies Pvt. Ltd.
Registered in England and Wales No. 2096520,
The Pentagon, Abingdon Science Park,
Abingdon, OX14 3YP, UK
Web site:
www.sophos.com

© 1997-2025 Sophos Ltd. All Rights Reserved.
Legal
Privacy
Cookies