VAR-201709-0657

Vulnerability from variot - Updated: 2025-04-20 23:34

A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127. Vendors have confirmed this vulnerability Bug ID CSCvf51127 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This may aid in further attacks

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0657",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.2.5"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.2.4"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.2.2"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "cisco",
        "version": "2.1.2"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.2.0"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1.7"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1.6"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1.9"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "2.1.0"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "2.2.3"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "2.1.8"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "cisco",
        "version": "2.1.4"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.1"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.10"
      },
      {
        "model": "meeting server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0.15"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.3"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.1.5"
      },
      {
        "model": "meeting server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.0.16"
      },
      {
        "model": "meeting server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.1.11"
      },
      {
        "model": "meeting server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.2.6"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.15"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.3"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.2"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.1"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1"
      },
      {
        "model": "meeting server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "meeting server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.2.6"
      },
      {
        "model": "meeting server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.1.11"
      },
      {
        "model": "meeting server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "2.0.16"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "100821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:meeting_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "100821"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-12249",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-12249",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-102752",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.3,
            "id": "CVE-2017-12249",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-12249",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-12249",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201709-561",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-102752",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability in the Traversal Using Relay NAT (TURN) server included with Cisco Meeting Server (CMS) could allow an authenticated, remote attacker to gain unauthenticated or unauthorized access to components of or sensitive information in an affected system. The vulnerability is due to an incorrect default configuration of the TURN server, which could expose internal interfaces and ports on the external interface of an affected system. An attacker could exploit this vulnerability by using a TURN server to perform an unauthorized connection to a Call Bridge, a Web Bridge, or a database cluster in an affected system, depending on the deployment model and CMS services in use. A successful exploit could allow the attacker to gain unauthenticated access to a Call Bridge or database cluster in an affected system or gain unauthorized access to sensitive meeting information in an affected system. To exploit this vulnerability, the attacker must have valid credentials for the TURN server of the affected system. This vulnerability affects Cisco Meeting Server (CMS) deployments that are running a CMS Software release prior to Release 2.0.16, 2.1.11, or 2.2.6. Cisco Bug IDs: CSCvf51127. Vendors have confirmed this vulnerability Bug ID CSCvf51127 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This may aid in further attacks",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "BID",
        "id": "100821"
      },
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-12249",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "100821",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1039357",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-102752",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "db": "BID",
        "id": "100821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "id": "VAR-201709-0657",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-20T23:34:18.466000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20170913-cmsturn",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170913-cmsturn"
      },
      {
        "title": "Cisco Meeting Server Traversal Using Relay NAT Server security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74857"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-16",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-668",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170913-cmsturn"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/100821"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1039357"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12249"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12249"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "db": "BID",
        "id": "100821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "db": "BID",
        "id": "100821"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "date": "2017-09-13T00:00:00",
        "db": "BID",
        "id": "100821"
      },
      {
        "date": "2017-10-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "date": "2017-09-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "date": "2017-09-13T22:29:00.207000",
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-102752"
      },
      {
        "date": "2017-09-13T00:00:00",
        "db": "BID",
        "id": "100821"
      },
      {
        "date": "2017-10-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-12249"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Meeting Server Built in  TURN Server configuration vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-008305"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "configuration error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-561"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…