CIG.Circular
Description
This indicates detection of possible threats based on information obtained from CIG Circulars.
Affected Products
This covers CIG Circular:
41
43
44
51
52
53
55
56
60
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
If required, the signature's action can be set to "Block".
Please use Anti-Virus software to scan and clean the infected computer.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |