人工智能黑客--黑客如何在网络攻击中使用人工智能

立即阅读
我们利用人工智能进行网站翻译,虽然我们力求准确,但不一定总是 100%精确。感谢您的理解。

MetaDefender Endpoint Security SDK Release Announcement | November 2025

OPSWAT
分享此贴

喜欢离线阅读?

1 - 最新消息?

我们很高兴在本月发布MetaDefender Endpoint Security SDK 的最新更新。通过扩大对更多产品的支持和一些令人兴奋的新功能,准备好为您的端点保护解决方案增添动力。利用与您的产品无缝集成的高级功能构建更强大的防御。为史诗级升级做好准备,让您的安全性更上一层楼。

1.1 Vulnerability Assessment support for SUSE 15.6 & 15.7

ENHANCEMENT, ANALOG PACKAGE, DATA UPDATE NEEDED

We’re excited to announce that our SDK now supports vulnerability assessment for SUSE Linux Enterprise Server versions 15.6 and 15.7. This update brings enhanced detection of CVEs for these latest SUSE releases, ensuring your Linux environments remain secure and compliant. 

Stay protected with the latest vulnerability intelligence!

1.2 Ability to input the expected SHA-256 when installing patches

ENHANCEMENT, ALL PLATFORMS, ENGINE UPDATE NEEDED, CODE CHANGE

We’ve enhanced the InstallFromFiles method to support passing an expected SHA-256 hash for installer verification. 

If the installer’s hash does not match, our SDK will now return a WAAPI_ERROR_HASH_MISMATCH error, preventing potential tampering or corruption. This enhancement ensures greater integrity and security during patch installations. 

This update is live and production-ready across all supported platforms. 

*You will need to make a code change to implement this feature. Please contact the OPSWAT team to assist with this.*

1.3 Last Server Connection Time for CrowdStrike Falcon

NEW FEATURE, ALL PLATFORMS, ENGINE UPDATE NEEDED, CODE CHANGE

Our SDK now supports retrieving the “last connection time to server” attribute from CrowdStrike Falcon agents on Windows, macOS, and Linux. 

This update empowers administrators to monitor when endpoints last communicated with the CrowdStrike Falcon cloud, strengthening visibility and security management. 

By including the assessment_queries field in your request, you can now retrieve the last server connection time as a numeric epoch value.

输入样本:
{
  "input": {
    "signature": <number>,
    "method": 1012,
    "assessment_queries": [
      {
        "data_type": "last_server_connect_time",
        // credentials is only needed to query last_server_connect_time for macOS
        "credentials": {
          "base_url": <string>,
          "client_id": <string>,
          "client_secret": <string>
        }
      }
    ]
  }
}
  
样本结果
{
  "result": {
    "assessment_results": [
      {
        "data_type": "last_server_connect_time",
        "value": <number>,
        "return_code": <number>, // 0 for a successful query
        "message": <string>
      }
      ...
    ]
  }
}
  

This release marks just the first step, plans are already underway to extend this capability to additional EDR products soon.

1.4 Flexible Patch Installation for macOS

ENHANCEMENTMAC, DATA UPDATE NEEDED, CODE CHANGE

We’re excited to announce a significant enhancement in the InstallMissingPatches method of macOS Software Update. This update enables patch installation using any user account on the device, not just the currently active one.

To apply this update, simply ensure your SDK version is updated to the latest release. When calling InstallMissingPatches method on macOS for Software Update, include the optional username and password fields in your request payload to specify the desired user account for patch installation. If these fields are omitted, our SDK will default to using the currently active user as before.

This enhancement adds flexibility and is especially valuable for managed environments, allowing administrators to specify the username and password for patch installation, regardless of which user is logged in. Both standard and admin accounts are supported (with some limitations on Intel-based Macs), making patch management more adaptable and compliant with diverse organizational policies.

*You will need to make a code change to implement this feature. Please contact the OPSWAT team to assist with this*

1.5 Behavior change in the Installer Signature Check feature

增强, MAC, WINDOWS, ENGINE UPDATE NEEDED, CODE CHANGE

Starting November 1, 2025, a behavior change will be applied to the Installer Signature Check feature to enhance security maturity. When the digital signature of an installer is checked during the patching process:

• (no change) If the installer’s digital signature is valid and passes the check, the installer will be verified by the SDK, and the patching process will continue as normal.

• (no change) If the installer’s digital signature is invalid and fails the check, an appropriate error message will be returned, and the installation process will be aborted.

• (NEW) If the installer’s digital signature is missing, an appropriate error message will be returned, and the installation process will also be aborted.

小贴士如果因数字签名缺失或无效而出现错误,可使用 InstallFromFiles 方法的 skip_signature_check 标志绕过安装程序签名检查功能。

2 - 即将发生的变化

2.1 New Software Categories for Compliance

NEW FEATURE, ALL PLATFORMS, ENGINE UPDATE NEEDED, CODE CHANGE

We are pleased to announce that our Q1-2026 release will introduce three new software categories: Vulnerability Management, Artificial Intelligence, and Gaming. 

All new categories will include comprehensive support methods such as version detection, running state, installation directories, and more.

Stay tuned for further details as we approach the release date.

*You will need to make a code change to implement this feature. Please contact the OPSWAT team to assist with this.*

2.2 Support for the Windows 10 Extended Security Updates (ESU) program

需要增强窗口数据更新

After October 14, 2025, Microsoft will no longer provide security patches, feature updates, or technical support for Windows 10. Windows 10 systems will still function, but become progressively vulnerable to security threats and software compatibility issues.

因此,微软推出了Windows 10 扩展安全更新(ESU)计划,让客户可以选择为加入该计划的 PC 接收安全更新。

为了扩展对 Windows 10 的支持并确保 MDES SDK 与 Windows 10 的未来更新保持兼容,我们决定通过 Windows 10扩展安全更新 (ESU) 计划继续支持 Windows 10。该支持将适用于运行 Windows 10(版本 22H2,已安装KB5046613 或更高版本的更新)且已订阅 ESU 的设备。

2.3 Support for Patching Multiple App Instances on macOS

ENHANCEMENT, MAC, ENGINE UPDATE NEEDED, CODE CHANGE

We are pleased to inform you that our team is actively investigating ways to improve patching support on macOS. 

In a future release, our SDK will support patching multiple instances of applications, even when they are renamed or installed outside the standard Applications folder.

This enhancement ensures that after patching, only the latest version remains, eliminating unpatched or vulnerable duplicates across all locations.

2.5 Detect Per-User Applications for All Users

NEW FEATURE, ALL PLATFORMS, ENGINE UPDATE NEEDED, CODE CHANGE

We are enhancing our SDK to enable detection of per-user applications across Windows, macOS, and Linux platforms. By the end of 2025, a new flag, detect_all_users_products, will be introduced to the DetectProducts method.

By default, this field is false and detection is limited to only applications installed for the active user and those available to all users (system-wide). When detect_all_users_products is set to true, this field enables detection of all applications installed on the device, including those specific to other user accounts.

On Windows, when detect_all_users_products is enabled, the output will include a new installed_for_users field for each detected product. This field lists all users (by SID and username) who have the product installed in per-user mode.

This enhancement provides a comprehensive view of software inventory across all user profiles on a device.

*You will need to make a code change to implement this feature. Please contact the OPSWAT team to assist with this.*

3 - 要求采取的行动

3.1 CVE-2025-0131

漏洞窗口

Palo Alto Networks GlobalProtect™ 应用程序在 Windows 设备上使用的OPSWAT MetaDefender Endpoint Security SDK 中存在一个不正确的权限管理漏洞,允许本地验证的非管理员 Windows 用户将其权限升级到 NT AUTHORITY/SYSTEM。但是,执行需要本地用户同时成功利用竞赛条件,这使得该漏洞很难被利用。

To address CVE-2025-0131, please upgrade your MDES SDK to version 4.3.4451 or later.

3.3 终止对 macOS 上使用旧引擎的 AppRemover 软件包的支持

支持结束,Mac

由于我们对 macOS 上的 AppRemover 模块进行了重构,以提供更优化、更精简的体验,因此在My OPSWAT 门户上维护了 MacOS 上 AppRemover 模块的两个软件包:AppRemover OSX 和 AppRemover OSX V2。 

Starting January 1, 2026, the OSX package will be removed. We recommend upgrading to AppRemover OSX V2 to ensure your system receives all new updates and comprehensive technical support for the AppRemover module.

3.4 Windows 7 和 Windows 8 支持终止

支持终止,窗口

After careful consideration, support for Windows 7 and Windows 8 (server versions included) will be removed from the SDK beginning January 1st 2027 (one year later than previous planned).

为确保 MDES SDK 的安全性、兼容性和最佳性能,我们建议将端点升级到受支持的 Microsoft 操作系统。

4 - 详细的 SDK 信息

这只是冰山一角!您可以在我们的支持图表中查看所有支持的应用程序:

5 - 联系方式

您是客户并对此列表有疑问吗?请通过opswat联系我们值得信赖的支持团队opswat

通过OPSWAT 了解最新信息!

立即注册,即可收到公司的最新动态、 故事、活动信息等。