Inscrivez-vous maintenant pour un meilleur devis personnalisé!

IE Zero Day -Managed Services Protection

May, 05, 2014 Hi-network.com

As of May 1, 2014, we can confirm Cisco customers have been targets of this attack. For the latest coverage information and additional details see our new post on the VRT blog.

Protecting company critical assets is a continuing challenge under normal threat conditions. The disclosure of zero-day exploits only makes the job of IT security engineers that much harder. When a new zero-day vulnerability was announced on April 26, 2014 for Microsoft Internet Explorer, corporate security organizations sprang into action assessing the potential risk and exposure, drafting remediation plans, and launching change packages to protect corporate assets.

Some companies however, rely on Managed Security Services to protect those same IT assets. As a Cisco Managed Security services customer, the action was taken to deploy updated IPS signatures to detect and protect the companies critical IT assets. In more detail, the IPS Signature team, as a member of the Microsoft Active Protections Program (MAPP), developed and released Cisco IPS signature 4256/0 in update S791 and Snort rules 30794 & 30803 were available in the ruleset dated 4-28-2014. The Cisco Managed Security team, including Managed Threat Defense, received the update as soon as it became available April 28th. Generally, Cisco Managed Security customers have new IPS signature packs applied during regularly scheduled maintenance windows. In the event of a zero-day, the managed security team reached out to customers proactively to advise them of the exploit and immediately were able to apply signature pack updates to detect and protect customer networks.

While corporate security organizations must still assess ongoing risks and direct overall remediations to protect corporate data, Cisco can take the actions to provide security visibility into the targeted attacks, increase protection with fresh signatures, and reduce risk profile for the corporate InfoSec program.

For more detail on the vulnerability, please see Martin Lee's blog post.

More details about this exploit and mitigation information can be found on the following links:

  • Cisco IPS Signature S791
  • Snort Ruleset
  • Cisco IPS Sub-Signature 4256-1
  • Cisco IntelliShield Alert 33961

For additional information about Cisco Managed Security solutions please refer to the following links and contact your Cisco Services sales representative:

  • Cisco Managed Services
  • Cisco News Room for Managed Threat Defense Announcement

tag-icon Tags chauds: Les adresses ip TRAC Snort intellishield Cisco Managed Services infosec Managed Security Services VRT Managed Threat Defense

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.