Sophos IPS and Application Signature Update

These release notes are for Sophos IPS and Application signature updates.

Version 18.23.58
Released on July 10, 2025

Introduction

The Release Note document for IPS and Application signature Database version 18.23.58 includes support for both, the new and the updated Signatures. The following sections describe the release in detail.

Release Information

Upgrade Applicable on: Version 18.23.57

Fixed issues, listed by ID, description, explanation and Workaround.

Appliance Model Details of Changes Module More Details
All Deployments 6 Applications 49 Application Signatures 5 Application categories Application Filter Click Here for details of changes
XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500 XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450 SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 Any virtual deployment with RAM < 24GB 19 Signatures 17 Vulnerabilities 4 IPS Categories IPS Filter Click Here for details of changes
XG-550, XG-650, XG-750 XGS-5500, XGS-6500 Any virtual deployment with RAM >24GB 26 Signatures 23 Vulnerabilities 7 IPS Categories IPS Filter Click Here for details of changes

Report false positives at support@sophos.com along with the application details.

Upgrade Information

Upgrade type: Automatic

Compatibility Annotations: None

Application Signatures

The Sophos Application Filter controls the application traffic depending on the policy configured, by matching them with the Application Signatures. Application Signatures optimize the detection performance and reduces the false alarms.

The table below provides details of signatures included in this release.

This Application Filter Release include Forty nine (49) Application Signatures are updated for Six (6) Applications.

Fixed issues, listed by ID, description, explanation and Workaround.

Application Name Risk Category
Windows Store 1 General Internet
UltraViewer 1 Remote Access
NLP Cloud 1 Generative AI
Greenhub VPN 5 Proxy and Tunnel
Windows Update 3 Software Update
TOR Proxy 5 Proxy and Tunnel

Terms Explained

Application Name: Name of the Application that can be identified by Sophos Application Filter.

Risk: Describes the level of risk for the application. The levels of risks are described in the table below.

Fixed issues, listed by ID, description, explanation and Workaround.
Risk Level Risk Criteria
1 Very Low
2 Low
3 Medium
4 High
5 Very High

Category: Identifies the category of the Application.

Note: These Application Filtering signatures support prior versions of respective application.

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XGS-87, XGS-87(w), XGS-107, XGS-107(w), XGS-116, XGS-116(w), XGS-126, XGS-126(w), XGS-136, XGS-136(w), XGS-2100, XGS-2300, XGS-3100, XGS-3300, XGS-4300, XGS-4500, XG-86, XG-86(w), XG-106, XG-106(w), XG-115, XG-115(w), XG-125, XG-125(w), XG-135, XG-135(w), XG-210, XG-230, XG-310, XG-330, XG-430, XG-450, SG-105, SG-105(w), SG-115, SG-115(w), SG-125, SG-125(w), SG-135, SG-135(w), SG-210, SG-230, SG-310, SG-330, SG-430, SG-450, SG-550, SG-650 and Any virtual deployment with RAM < 24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Nineteen(19) Signatures to address Seventeen(17) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
FILE-OFFICE Microsoft Excel remote code execution attempt CVE-2025-21362, CVE-2025-49696 file-office 1
FILE-OFFICE Microsoft Office remote code execution attempt CVE-2025-49695 file-office 1
OS-WINDOWS Microsoft Windows Connected Devices Platform service remote code execution attempt CVE-2025-49724 os-windows 1
OS-WINDOWS Microsoft Windows CredSSP elevation of privilege attempt CVE-2025-47987 os-windows 1
OS-WINDOWS Microsoft Windows Graphics Component elevation of privilege attempt CVE-2025-49744 os-windows 1
OS-WINDOWS Microsoft Windows SPNEGO Extended Negotiation remote code execution attempt CVE-2025-47981 os-windows 1
OS-WINDOWS Microsoft Windows Update Service elevation of privilege attempt CVE-2025-48799 os-windows 1
OS-WINDOWS Microsoft Windows Win32k driver escalation of privilege attempt CVE-2025-49727 os-windows 1
OS-WINDOWS Microsoft Windows WMPhoto setUniformTiling CVE-2025-29962 Heap-based Buffer Overflow Vulnerability CVE-2025-29962 os-windows 2
SERVER-MSSQL Microsoft SQL Server memory leak attempt CVE-2025-49718 server-mssql 1
SERVER-WEBAPP Aiohttp Static Routing CVE-2024-23334 Directory Traversal Attempt CVE-2024-23334 server-webapp 2
SERVER-WEBAPP Akamai CloudTest CVE-2025-49493 XML External Entity Injection Vulnerability CVE-2025-49493 server-webapp 3
SERVER-WEBAPP Arcadyan Buffalo directory traversal attempt CVE-2021-20090 server-webapp 1
SERVER-WEBAPP Arcadyan routers path traversal attempt CVE-2021-20090 server-webapp 1
SERVER-WEBAPP GestioIP CVE-2024-48760 File Upload Vulnerability CVE-2024-48760 server-webapp 1
SERVER-WEBAPP Microsoft SharePoint remote code execution attempt CVE-2025-49704 server-webapp 1
SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt CVE-2025-49701 server-webapp 1

IPS Signatures

The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms.

Applicable to: XG-550, XG-650, XG-750, XGS-5500, XGS-6500 and Any virtual deployment with RAM >24GB

The table below provides details of Signatures included in this release.

This IPS Release includes Twenty six(26) Signatures to address Twenty three(23) Vulnerabilities.

Fixed issues, listed by ID, description, explanation and Workaround.

Name CVE-ID Category Severity
BROWSER-CHROME Google Chrome CVE-2025-6554 Type confusion Vulnerability CVE-2025-6554 browser-chrome 2
FILE-OFFICE Microsoft Excel remote code execution attempt CVE-2025-21362, CVE-2025-49696 file-office 1
FILE-OFFICE Microsoft Office remote code execution attempt CVE-2025-49695 file-office 1
MALWARE-CNC Win.Trojan.FakeKeys variant CNC outbound connection malware-cnc 1
OS-WINDOWS Microsoft Windows Connected Devices Platform service remote code execution attempt CVE-2025-49724 os-windows 1
OS-WINDOWS Microsoft Windows CredSSP elevation of privilege attempt CVE-2025-47987 os-windows 1
OS-WINDOWS Microsoft Windows Graphics Component elevation of privilege attempt CVE-2025-49744 os-windows 1
OS-WINDOWS Microsoft Windows SPNEGO Extended Negotiation remote code execution attempt CVE-2025-47981 os-windows 1
OS-WINDOWS Microsoft Windows Update Service elevation of privilege attempt CVE-2025-48799 os-windows 1
OS-WINDOWS Microsoft Windows Win32k driver escalation of privilege attempt CVE-2025-49727 os-windows 1
OS-WINDOWS Microsoft Windows WMPhoto setUniformTiling CVE-2025-29962 Heap-based Buffer Overflow Vulnerability CVE-2025-29962 os-windows 2
SERVER-MSSQL Microsoft SQL Server memory leak attempt CVE-2025-49718 server-mssql 1
SERVER-OTHER D-Link hedwig.cgi directory traversal attempt CVE-2024-0769 server-other 1
SERVER-WEBAPP Aiohttp Static Routing CVE-2024-23334 Directory Traversal Attempt CVE-2024-23334 server-webapp 2
SERVER-WEBAPP Akamai CloudTest CVE-2025-49493 XML External Entity Injection Vulnerability CVE-2025-49493 server-webapp 3
SERVER-WEBAPP Arcadyan Buffalo directory traversal attempt CVE-2021-20090 server-webapp 1
SERVER-WEBAPP Arcadyan routers path traversal attempt CVE-2021-20090 server-webapp 1
SERVER-WEBAPP GestioIP CVE-2024-48760 File Upload Vulnerability CVE-2024-48760 server-webapp 1
SERVER-WEBAPP Microsoft SharePoint remote code execution attempt CVE-2025-49704 server-webapp 1
SERVER-WEBAPP Microsoft SharePoint Server remote code execution attempt CVE-2025-49701 server-webapp 1
SERVER-WEBAPP SonicWall SMA100 Importlogo CVE-2025-32821 Directory Traversal Vulnerability CVE-2025-32821 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2025-2205 attack attempt CVE-2025-46410 server-webapp 1
SERVER-WEBAPP TRUFFLEHUNTER TALOS-2025-2206 attack attempt CVE-2025-53084 server-webapp 1

Terms Explained

Name: Name of the Signature.

CVE-ID: CVE Identification Number - Common Vulnerabilities and Exposures (CVE) provides reference of CVE Identifiers for publicly known information security vulnerabilities.

Category: Class type according to threat.

Severity: Degree of severity - The levels of severity are described in the table below:

Fixed issues, listed by ID, description, explanation and Workaround.
Severity Level Severity Criteria
1 Critical
2 Major
3 Moderate
4 Minor
5 Warning
Important Notice

Sophos Technologies Pvt. Ltd. has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of any kind, expressed or implied. Users must take full responsibility for their application of any products. Sophos Technologies Pvt. Ltd. assumes no responsibility for any errors that may appear in this document. Sophos Technologies Pvt. Ltd. reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice.

RESTRICTED RIGHTS

©1997 - 2025 Sophos Ltd. All rights reserved.
All rights reserved. Sophos, Sophos logo are trademark of Sophos Technologies Pvt. Ltd.

Corporate Headquarters

Sophos Technologies Pvt. Ltd.
Registered in England and Wales No. 2096520,
The Pentagon, Abingdon Science Park,
Abingdon, OX14 3YP, UK
Web site:
www.sophos.com

© 1997-2025 Sophos Ltd. All Rights Reserved.
Legal
Privacy
Cookies