Stormshield SNS protections for Zimbra (CVE-2025-25064)

The vulnerability tracked as CVE-2025-25064 impacts the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4. It allows an attacker to inject arbitrary SQL queries.

Stormhield Network Security (SNS) appliance protects you from that attack, thanks to existing IPS signatures. To work efficiently on HTTPS traffic, it must be decrypted.

IDName
http:client:data:17SQL injection Prevention – POST : suspicious SELECT statement in data
http:client:data:18SQL injection Prevention – POST : suspicious UPDATE statement in data
http:client:data:19SQL injection Prevention – POST : suspicious DROP statement in data
http:client:data:20SQL injection Prevention – POST : suspicious CREATE statement in data
http:client:data:21SQL injection Prevention – POST : possible version probing in data
http:client:data:22SQL injection Prevention – POST : suspicious OR statement in data
http:client:data:23SQL injection Prevention – POST : suspicious UNION statement in data
http:client:data:24SQL injection Prevention – POST : suspicious EXEC statement in data
http:client:data:25SQL injection Prevention – POST : suspicious OPENROWSET statement in data
http:client:data:26SQL injection Prevention – POST : suspicious OPENQUERY statement in data
http:client:data:27SQL injection Prevention – POST : suspicious HAVING statement in data
http:client:data:29SQL injection Prevention – POST : suspicious INSERT statement in data
http:client:data:33SQL injection Prevention – POST : suspicious DECLARE statement in data
http:client:data:34SQL injection Prevention – POST : suspicious CAST statement in data
http:client:data:95SQL injection Prevention – GET : suspicious SELECT statement in URL
http:client:data:96SQL injection Prevention – GET : suspicious UPDATE statement in URL
http:client:data:97SQL injection Prevention – GET : suspicious DROP statement in URL
http:client:data:98SQL injection Prevention – GET : suspicious CREATE statement in URL
http:client:data:99SQL injection Prevention – GET : possible database version probing
http:client:data:100SQL injection Prevention – GET : suspicious OR statement in URL
http:client:data:101SQL injection Prevention – GET : suspicious UNION statement in URL
http:client:data:102SQL injection Prevention – GET : suspicious EXEC statement in URL
http:client:data:103SQL injection Prevention – GET : suspicious OPENROWSET statement in URL
http:client:data:104SQL injection Prevention – GET : suspicious OPENQUERY statement in URL
http:client:data:105SQL injection Prevention – GET : suspicious combination of ‘OR’ or ‘AND’ statements in URL
http:client:data:126SQL injection Prevention – GET : suspicious shutdown statement in URL
http:client:data:163SQL injection Prevention – GET : suspicious INSERT statement in URL
http:client:data:183SQL injection Prevention – GET : suspicious DECLARE statement in URL
http:client:data:184SQL injection Prevention – GET : suspicious CAST statement in URL
http:client:data:342SQL injection Prevention – GET : suspicious SQL keywords in URL
http:client:data:432SQL injection Prevention – GET : suspicious parameter in an URL parameter