Release Notes

Version5.11.0
Release date14 Oct 2025
ScopeFocused on new functionalities, enhancements and bug fixes

Before upgrading MetaDefender ICAP Server to v5.10.0 or newer from v5.6.0 or earlier, make sure you review the Release Notes and the following Documentation:

  1. PostgreSQL Database Deployment Options
  2. Installation
  3. Upgrade to MetaDefender ICAP Server v5.7.0 or newer

New Features, Improvements and Enhancements

Details
Select MetaDefender Core Server Profiles Based on File AttributesTo prevent large files or files containing multiple objects from causing performance bottlenecks and affecting the system performance, users can now dedicate specific scan servers to handle such scan requests. Users can specify the file attribute: file size, file type, or both.
Dynamic Load BalancingIntroduces a new load balancing mode to address the limitations of Round Robin when MetaDefender Core instances differ in hardware capacity or workload complexity. Scan requests are prioritized and distributed to the least busy MetaDefender Core instance based on the scan queue information.
integration with BeyondTrust's Password SafeA new option to increase the security for Active Directory configuration. MetaDefender ICAP Server can be integrated with BeyondTrust's Password Safe (Privileged Access Management) for automated credential management. This enables automated credential management for secure access. See Integration with Privileged Access Management Manager
Security Enhancements

Upgraded third-party libraries for improved security:

  • Qt v6.9.1
  • Angular v19
  • Angular library ag-grid-angular v34.0.0

Rate limiting for the Test Email feature in Email Notification

Usability Improvements
  • Support password strength meter
  • Unified login screen experience
  • Default maxstdio value set to 8192 on Windows
  • For SOAP/JSON file in multi-part form uploads of the Content encode feature, the file size limit will be calculated based on the SOAP/JSON file instead of the total size content.
  • Enhancement for SOAP node selector: Now supports XPath syntax for selecting the node

Bug Fixes

Details
Minor FixesResolved various UI cosmetics issues and minor fixes

Known Limitations

Details
Proxy ConfigurationCurrently, HTTPS proxy configuration is not supported.
SAML Directory (SSO Integration) Limitations

In v5.5.0, users cannot create a new SAML directory via the web UI.

  • Workaround: Use REST API to create the SAML directory
  • Impact: Existing SAML directories remain unaffected after upgrading to v5.5.0
  • Resolution: Fixed in v5.5.1 and newer
Stability Issues on Red Hat/CentOS (Kernel Version 372)

MetaDefender ICAP Server v5.1.0 or newer may encounter stability issues on Red Hat/CentOS systems running kernel version 372.

Solution: Upgrade to kernel version 425, where Red Hat has resolved this issue.

MetaDefender ICAP Server's NGINX Web Server Fails to Start with Weak Cipher Suites for HTTPS

From v5.1.0, OpenSSL 1.x has been replaced with OpenSSL 3.x — across the product and its dependencies — to enhance security and address vulnerabilities.

As part of this upgrade, NGINX's OpenSSL 3.x in MetaDefender ICAP Server now enforces stricter cipher policies and rejects all weak cipher suites. The web server now only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based are also not accepted).

As a result, if you have already configured MetaDefender ICAP Server for HTTPS using a weak SSL cipher with your certificate, the server will not start due to the enforced security policies in NGINX's OpenSSL 3.x.

no_proxy ConfigurationStarting with MetaDefender ICAP Server v5.1.0, the no_proxy setting must support CIDR for IP addresses. For more details, see No Proxy configuration.
TLS Connectivity to MetaDefender Core on Debian

On Debian OS, MetaDefender ICAP Server v5.1.0 requires the two following commands to enable TLS communication with MetaDefender Core:

sudo mkdir -p /etc/pki/tls/certs/

sudo ln -s /etc/ssl/certs/ca-certificates.crt /etc/pki/tls/certs/ca-bundle.crt

Resolution: Upgrade to MetaDefender ICAP Server v5.1.1, where the issue is resolved.

TLS 1.3 Not Supported on Windows Server 2012TLS 1.3 is not supported on Windows Server 2012 due to limitations with Schannel SSP. Reference
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard