Intrusion Prevention



This indicates detection of a malicious file access through HTTP.
Without sufficient validation, a malicious file can cause remote code execution or denial-of-service condition in the context of the affect system.

Affected Products



System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Use AntiVirus software to scan and clean the system.
Monitor the traffic from that network for any suspicious activity.
Apply the most recent upgrade or patch for all relevant softwares.