IPS Signature V7-IPS-1.0.360

Release time:2025-07-10
HomeSupportSecuritySignature Database ServicesSoftware DownloadSignature Database Services
Download
Title Size Downloads
V7-IPS-1.0.360.dat 16.27 MB

Version number
V7-IPS-1.0.360

MD5 number
89dfc32227f0e30f0d6e6694591444e6

Update time
2025-07-09

Update attack list

Key new rules:
------------------------------

55759  CVE-2025-32023_Redis_HyperLogLog_Remote_Code_Execution_Vulnerability[2]
---- Category: Vulnerability
---- Description: Redis is an open-source database written in ANSI C, supported by the network, based on memory and persistent logs,
---- key-value storage databases, and provides APIs in multiple languages. When Redis processes hyperloglog operations, because the input is not strictly validated,
---- an attacker can construct malicious data to cause an integer overflow during index accumulation, bypassing bounds checking,
---- and eventually triggering out-of-bounds writes to heap memory, which may lead to remote code execution.

55789  CVE-2025-32813_Infoblox_NETMRI_saml_id_Command_Injection_Vulnerability[2]
---- Category: Vulnerability
---- Description: Infoblox NetMRI is an enterprise-level solution for network automation and management.
---- A command injection vulnerability has been reported in Infoblox NETMRI. The vulnerability is due to insufficient validation of the saml_id parameter.
---- Remote unauthenticated attackers can exploit this vulnerability by sending a specific HTTP request.
---- Successful exploitation would allow an attacker to execute remote code and gain control of the server.

55806  CVE-2025-7081_Belkin_F9K1122_formSetWanStatic_Command_Injection_Vulnerability[2]
---- Category: Vulnerability
---- Description: A command injection vulnerability has been reported in Belkin F9K1122. The vulnerability is due to improper validation of requests send by users to the formSetWanStatic interface.
---- A remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could allow attackers to execute arbitrary command in the context of system.

Note
[1] Indicates that this change is incorporated into all security products
[2] Indicates that this change is only incorporated into the full series of F5000, T5000, T9000, M9000, F1030 and above F series products
[3] The device memory is greater than 2GB. After loading the IPS rules library file of this version, 25451 predefined rules can be generated in "Intrusion Prevention System"
[4] The device memory is less than or equal to 2GB. After loading the IPS rules library file of this version, 3286 predefined rules can be generated in "Intrusion Prevention System"


 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网