description-logoDescription

This indicates detection of possible threats based on information obtained from CIG Circulars.

affected-products-logoAffected Products

This covers CIG Circular:
41
43
44
51
52
53
55
56
60

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

If required, the signature's action can be set to "Block".
Please use Anti-Virus software to scan and clean the infected computer.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)