Intrusion Prevention



This indicates an attempt to exploit a Single Flow vulnerability.
The vulnerability allows users to send customized Layer 7 application traffic. With this capability, we can use 'singleflow' in combination with the Security component to configure both the fragmentation size and the MTU limit.

Affected Products

There is no vulnerability associated with this signature.


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Monitor the traffic from that network for any suspicious activity.