Talos Rules 2026-03-05
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2026-03-05 13:29:08 UTC

Snort Subscriber Rules Update

Date: 2026-03-05

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2092000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66060 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66061 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66062 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66063 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66064 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66065 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66066 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66067 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66068 <-> DISABLED <-> SERVER-WEBAPP Artica Proxy remote code execution attempt (server-webapp.rules)
 * 1:66069 <-> DISABLED <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:66070 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66071 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66072 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66073 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66074 <-> DISABLED <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt (server-webapp.rules)
 * 3:66075 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66076 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66077 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66078 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66079 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66080 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66081 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt (server-webapp.rules)
 * 3:66082 <-> ENABLED <-> SERVER-WEBAPP GWT serialization policy file request detected (server-webapp.rules)
 * 3:66083 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt (server-webapp.rules)

Modified Rules:


 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-03-05 13:29:08 UTC

Snort Subscriber Rules Update

Date: 2026-03-05

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091801.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66070 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66063 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66066 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66060 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66071 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66072 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66061 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66064 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66067 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66068 <-> DISABLED <-> SERVER-WEBAPP Artica Proxy remote code execution attempt (server-webapp.rules)
 * 1:66069 <-> DISABLED <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:66065 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66062 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66074 <-> DISABLED <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:66073 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 3:66081 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt (server-webapp.rules)
 * 3:66080 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66083 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt (server-webapp.rules)
 * 3:66075 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66078 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66079 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66077 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66076 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66082 <-> ENABLED <-> SERVER-WEBAPP GWT serialization policy file request detected (server-webapp.rules)

Modified Rules:


 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-03-05 13:29:08 UTC

Snort Subscriber Rules Update

Date: 2026-03-05

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 2091701.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:66060 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66067 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66072 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66066 <-> DISABLED <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt (file-flash.rules)
 * 1:66062 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66073 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66063 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66071 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66061 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt (server-webapp.rules)
 * 1:66065 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66074 <-> DISABLED <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:66069 <-> DISABLED <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:66070 <-> DISABLED <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt (server-webapp.rules)
 * 1:66064 <-> DISABLED <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt (server-webapp.rules)
 * 1:66068 <-> DISABLED <-> SERVER-WEBAPP Artica Proxy remote code execution attempt (server-webapp.rules)
 * 3:66083 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt (server-webapp.rules)
 * 3:66079 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66075 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66081 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt (server-webapp.rules)
 * 3:66080 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt (server-webapp.rules)
 * 3:66078 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66076 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)
 * 3:66082 <-> ENABLED <-> SERVER-WEBAPP GWT serialization policy file request detected (server-webapp.rules)
 * 3:66077 <-> ENABLED <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt (server-webapp.rules)

Modified Rules:


 * 1:59017 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)
 * 1:59016 <-> DISABLED <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt (server-webapp.rules)

2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.2.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.5.1.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.6.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.3.7.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.7.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.9.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.11.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.15.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.18.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.20.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:51 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.21.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:52 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.35.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:52 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.44.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:52 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.1.47.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt


2026-03-05 13:31:52 UTC

Snort Subscriber Rules Update

Date: 2026-03-04-001

This is the complete list of rules modified and added in the Cisco Talos Certified rule pack for Snort version 3.11.0.0.

The format of the file is:

gid:sid <-> Message

New Rules:

* 1:301438 <-> SERVER-WEBAPP Tenda AC21 Router SetIpMacBind memory corruption attempt
* 1:301439 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301440 <-> SERVER-WEBAPP Tenda AC21 Router SetSysTimeCfg memory corruption attempt
* 1:301441 <-> FILE-FLASH Adobe Flash Player loaderInfo.bytes memory corruption attempt
* 1:66068 <-> SERVER-WEBAPP Artica Proxy remote code execution attempt
* 1:66069 <-> SERVER-WEBAPP WordPress FlexQR code generator arbitrary PHP file upload attempt
* 1:66070 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66071 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66072 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66073 <-> SERVER-WEBAPP Genexis PLATINUM command injection attempt
* 1:66074 <-> SERVER-WEBAPP WordPress Front End Users arbitrary PHP file upload attempt
* 3:66075 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66076 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66077 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66078 <-> SERVER-WEBAPP Cisco Firewall Management Center serialized file upload attempt
* 3:66079 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66080 <-> SERVER-WEBAPP Cisco Firewall Management Center directory traversal attempt
* 3:66081 <-> SERVER-WEBAPP Cisco Firewall Management Center SQL injection attempt
* 3:66082 <-> SERVER-WEBAPP GWT serialization policy file request detected
* 3:66083 <-> SERVER-WEBAPP Cisco Firewall Management Center arbitrary Java object deserialization attempt

Modified Rules:

* 1:59016 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 1:59017 <-> SERVER-WEBAPP Hewlett Packard Enterprise Intelligent Management Center Java expression language injection attempt
* 3:21354 <-> PROTOCOL-DNS query
* 3:21355 <-> PROTOCOL-DNS cache poisoning attempt - mismatched txid
* 3:24973 <-> NETBIOS SMB Trans2 FIND_FIRST2 response file name length overflow attempt
* 3:31361 <-> SERVER-OTHER OpenSSL DTLSv1.0 handshake fragment buffer overrun attempt
* 3:41548 <-> SERVER-OTHER F5 BIG-IP TLS session ticket implementation uninitialized memory disclosure attempt
* 3:59880 <-> SERVER-OTHER OpenSSL SRP heap buffer overflow attempt