This Critical Patch resolves the following issue(s):
The vulnerability CVE-2023-3823 affects Deep Discovery Inspector 6.5
Solution
This critical patch resolves the vulnerability.
Procedure
Install at least one of the following hotfixes or patches before installing this critical patch:
The vulnerability CVE-2023-3824 affects Deep Discovery Inspector 6.5
Solution
This critical patch resolves the vulnerability.
Procedure
Install at least one of the following hotfixes or patches before installing this critical patch:
There are no files included in this Critical Patch release.
To download or view electronic versions of the documentation set for this product, go to http://docs.trendmicro.com
To access the Online Help, go to http://docs.trendmicro.com
1. Deep Discovery Inspector 6.5 GM Build 1129 - English - Linux - x64
2. Deep Discovery Inspector 6.5 GM Patch Build 1145 - English - Linux - x64
No post-installation steps are required.
NOTE: Trend Micro recommends updating the scan engine and virus pattern files immediately after installing the product.
There are no known issues for this Critical Patch release.
The system may sometimes display the "500 Internal Server Error" error message when users try to access the Administration > System Settings > Network Interface screen in the web console.
Solution
This Hotfix resolves this issue.
This Hotfix removes weak ciphers in Deep Discovery Inspector to comply with the inclusion requirements for the Spanish National Cryptologic Center (CCN) STIC Products and Services Catalogue (CPSTIC).
The "Top 20 Threats detected by Virtual Analyzer" section in summary reports displays threats that were not actually detected by Virtual Analyzer.
Solution
This hotfix resolves this issue.
After resolving issue 1, the "Top 20 Threats detected by Virtual Analyzer" section in summary reports becomes the same as the "Top 10 Threats detected exclusively by Virtual Analyzer" section.
The only distinction between both sections is the number of records displayed—20 versus 10. The actual threats listed are the same.
Solution
Remove the "Top 10 Threats detected exclusively by Virtual Analyzer" from summary reports.
The following vulnerabilities affect Deep Discovery Inspector:
Solution
This hotfix updates the OpenSSL version included with Deep Discovery Inspector to fix the vulnerabilities.
The Dashboard widget "Malicious Scanned Network Traffic" displays traffic from the detection logs with the severity level set to "informational".
Solution
This hotfix resolves this issue.
When processing detection logs, an unexpected error might cause Deep Discovery Inspector to stop sending detection logs to the Threat Investigation Center.
Solution
This hotfix resolves the error and allows Deep Discovery Inspector to continue sending logs to the Threat Investigation Center.
When navigating to the Top Affected Hosts screen and clicking an affected host in the table, if the Monitored Network Group name contains a backslash ( \ ), the Host Details page does not display any information.
Solution
This hotfix resolves this issue.
Deep Discovery Inspector is sometimes unable to sync Network Groups from Deep Discovery Director.
Solution
This hotfix resolves the issue.