Deep CDR Support for Image Files

OPSWAT Deep Content Disarm and Reconstruction (Deep CDR) is an advanced threat prevention technology defeating any file-based attacks used for Advanced Persistent Threats (APT’s), Ransomware, Zero-day attacks, etc. It sanitizes and reconstructs over 100 common file types, ensuring each file is completely usable with safe content. Supported file types include PDF, Microsoft Office, HTML, and many image files. Language/region specific file formats like JTD and HWP files are also supported.

Highlighted malicious Image files neutralized by Deep CDR

File TypeDeep CDR FeatureThreat DetectedReference Sample
JPGRemove ICC profileCVE-2007-2788
JPGRemove ICC profileCVE-2018-8475
JPGRemove metadataCVE-2019-8942
JPGRemove metadataTrojan.PHP.Agent.GA View
JPGFile reconstructionSteganography in image View
BMPFile reconstructionAdware, Trojan.JS.Agent.FDL View
BMPFile reconstructionSteganography in image View
PNGRemove metadataCVE-2019-8942
PNGFile reconstructionTrojan.JS.Redirector View
PNGFile reconstructionSteganography in image View
GIFFile reconstructionSteganography in image View
GIFRemove metadataCVE-2019-8942
TIFFFile reconstructionSteganography in image View
TIFFRemove metadataCVE-2019-8942
SVGRemove macroHtml.Exploit.SVG-1 View
SVGRemove CDATA, remove injection, process embedded image, process imageExecute Code, XSS attack View
EMFSanitize recordCVE-2016-0169 View
WDPFile reconstructionSteganography in image View
WDPRemove metadataCVE-2019-8942
DICOMFile reconstructionCVE-2019-11687 View
WEBPRemove metadataCVE-2019-8942
WEBPFile reconstructionSteganography in image View
JPXRemove metadataCVE-2019-8942
JPXFile reconstructionSteganography in image View