Sophos IPS and Application Signature Update

These release notes are for Sophos IPS and Application signature updates.

Version 18.23.50
Released on June 19, 2025

Introduction

The Release Note document for IPS and Application signature Database version 18.23.50 includes support for both, the new and the updated Signatures. The following sections describe the release in detail.

Release Information

Upgrade Applicable on: Version 18.23.49

Fixed issues, listed by ID, description, explanation and Workaround.

Appliance Model Details of Changes Module More Details
All Deployments 15 Applications 16 Application Signatures 1 Application category Application Filter Click Here for details of changes
XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500 XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450 SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 Any virtual deployment with RAM < 24GB 11 Signatures 8 Vulnerabilities 3 IPS Categories IPS Filter Click Here for details of changes
XG-550, XG-650, XG-750 XGS-5500, XGS-6500 Any virtual deployment with RAM >24GB 32 Signatures 22 Vulnerabilities 6 IPS Categories IPS Filter Click Here for details of changes

Report false positives at support@sophos.com along with the application details.

Upgrade Information

Upgrade type: Automatic

Compatibility Annotations: None

Application Signatures

The Sophos Application Filter controls the application traffic depending on the policy configured, by matching them with the Application Signatures. Application Signatures optimize the detection performance and reduces the false alarms.

The table below provides details of signatures included in this release.

This Application Filter Release include Sixteen (16) Application Signatures are updated for Fifteen (15) Applications.

Fixed issues, listed by ID, description, explanation and Workaround.

Application Name Risk Category
TransferNow 3 File Transfer
TransferNow File Upload 3 File Transfer
TransferNow File Download 3 File Transfer
Tresorit 3 File Transfer
Tresorit Upload 3 File Transfer
Tresorit Download 3 File Transfer
SwissTransfer 3 File Transfer
SwissTransfer Upload 3 File Transfer
SwissTransfer Download 3 File Transfer
LimeWire Upload 3 File Transfer
LimeWire Download 3 File Transfer
Filemail Upload 3 File Transfer
Filemail Download 3 File Transfer
SendGB Upload 3 File Transfer
SendGB Download 3 File Transfer

Terms Explained

Application Name: Name of the Application that can be identified by Sophos Application Filter.

Risk: Describes the level of risk for the application. The levels of risks are described in the table below.

Fixed issues, listed by ID, description, explanation and Workaround.
Risk Level Risk Criteria
1 Very Low
2 Low
3 Medium
4 High
5 Very High

Category: Identifies the category of the Application.

Note: These Application Filtering signatures support prior versions of respective application.

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500, XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450, SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 and Any virtual deployment with RAM < 24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Eleven(11) Signatures to address Eight(8) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
SERVER-APACHE Apache Parquet Avro CVE-2025-30065 Insecure Deserialization Vulnerability CVE-2025-30065 server-apache 1
SERVER-APACHE Apache ShardingSphere dataSourceConfiguration CVE-2020-1947 Deserialization Attempt Vulnerability CVE-2020-1947 server-apache 3
SERVER-OTHER Ollama ggufPadding CVE-2025-0317 Denial of Service Vulnerability CVE-2025-0317 server-other 5
SERVER-WEBAPP Apache Kafka CVE-2025-27817 Arbitrary File Read and SSRF Vulnerability CVE-2025-27817 server-webapp 3
SERVER-WEBAPP ASUS multiple routers command injection attempt CVE-2023-39780 server-webapp 1
SERVER-WEBAPP Graphana CVE-2025-4123 SSRF Vulnerability CVE-2025-4123 server-webapp 1
SERVER-WEBAPP IBM WebSphere Application Server WASPostParam Cookie CVE-2016-5983 Denial Of Service Attempt CVE-2016-5983 server-webapp 1
SERVER-WEBAPP Yiiframework Yii 2 Arbitrary CVE-2024-58136 Behavior Injection Attempt CVE-2024-4990, CVE-2024-58136, CVE-2025-32432 server-webapp 1

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XG-550, XG-650, XG-750, XGS-5500, XGS-6500 and Any virtual deployment with RAM >24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Thirty two(32) Signatures to address Twenty two(22) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
FILE-OTHER Apple macOS CoreAudio mRemappingArray CVE-2025-31200 Memory Corruption Vulnerability CVE-2025-31200 file-other 2
MALWARE-CNC Win.InfoStealer.Stealc variant outbound connection attempt malware-cnc 1
MALWARE-CNC Win.InfoStealer.Vidar variant outbound connection attempt malware-cnc 1
MALWARE-CNC Win.Trojan.BPFDoor variant inbound connection attempt malware-cnc 1
OS-OTHER Apple multiple products memory corruption attempt CVE-2020-3837, CVE-2021-30900 os-other 1
OS-OTHER Cisco Nexus OS software command injection attempt CVE-2011-2569 os-other 1
OS-OTHER Intel x64 side-channel analysis information leak attempt CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 os-other 1
OS-OTHER TRUFFLEHUNTER TALOS-2021-1262 attack attempt os-other 1
OS-OTHER TRUFFLEHUNTER TALOS-2021-1309 attack attempt os-other 1
OS-OTHER TRUFFLEHUNTER TALOS-2024-2006 attack attempt os-other 1
OS-OTHER TRUFFLEHUNTER TALOS-2024-2065 attack attempt os-other 1
OS-OTHER TRUFFLEHUNTER TALOS-2024-2081 attack attempt os-other 1
SERVER-APACHE Apache Parquet Avro CVE-2025-30065 Insecure Deserialization Vulnerability CVE-2025-30065 server-apache 1
SERVER-APACHE Apache ShardingSphere dataSourceConfiguration CVE-2020-1947 Deserialization Attempt Vulnerability CVE-2020-1947 server-apache 3
SERVER-OTHER BentoML runner server CVE-2025-32375 Remote Code Execution Vulnerability CVE-2025-31200 server-other 1
SERVER-OTHER Coder code-server proxy CVE-2025-47269 Unintended Proxy Vulnerability CVE-2025-47269 server-other 2
SERVER-OTHER Ollama ggufPadding CVE-2025-0317 Denial of Service Vulnerability CVE-2025-0317 server-other 5
SERVER-WEBAPP Apache Kafka CVE-2025-27817 Arbitrary File Read and SSRF Vulnerability CVE-2025-27817 server-webapp 3
SERVER-WEBAPP ASUS multiple routers command injection attempt CVE-2023-39780 server-webapp 1
SERVER-WEBAPP Graphana CVE-2025-4123 SSRF Vulnerability CVE-2025-4123 server-webapp 1
SERVER-WEBAPP IBM WebSphere Application Server WASPostParam Cookie CVE-2016-5983 Denial Of Service Attempt CVE-2016-5983 server-webapp 1
SERVER-WEBAPP Yiiframework Yii 2 Arbitrary CVE-2024-58136 Behavior Injection Attempt CVE-2024-4990, CVE-2024-58136, CVE-2025-32432 server-webapp 1

Terms Explained

Name: Name of the Signature.

CVE-ID: CVE Identification Number - Common Vulnerabilities and Exposures (CVE) provides reference of CVE Identifiers for publicly known information security vulnerabilities.

Category: Class type according to threat.

Severity: Degree of severity - The levels of severity are described in the table below:

Fixed issues, listed by ID, description, explanation and Workaround.
Severity Level Severity Criteria
1 Critical
2 Major
3 Moderate
4 Minor
5 Warning
Important Notice

Sophos Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Sophos Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document. Sophos Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice.

RESTRICTED RIGHTS

©1997 - 2025 Sophos Ltd. All rights reserved.
All rights reserved. Sophos, Sophos logo are trademark of Sophos Technologies Pvt. Ltd.

Corporate Headquarters

Sophos Technologies Pvt. Ltd.
Registered in England and Wales No. 2096520,
The Pentagon, Abingdon Science Park,
Abingdon, OX14 3YP, UK
Web site:
www.sophos.com

© 1997-2025 Sophos Ltd. All Rights Reserved.
Legal
Privacy
Cookies