Intrusion Prevention

CIG.Circular

Description

This indicates detection of possible threats based on information obtained from CIG Circulars.

Affected Products

This covers CIG Circular:
41
43
44
51
52
53
55
56
60

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

If required, the signature's action can be set to "Block".
Please use Anti-Virus software to scan and clean the infected computer.