Release Notes
Version | 5.10.0 |
---|---|
Release date | 07 Aug 2025 |
Scope | Focused on new functionalities, enhancements and bug fixes |
Before upgrading MetaDefender ICAP Server to v5.10.0 or newer from v5.6.0 or earlier, make sure you review the Release Notes and the following Documentation:
New Features, Improvements and Enhancements
Details | |
---|---|
Webhook Scanning Out of BETA | Starting from version 5.10.0, the webhook callback is no longer in BETA, and is recommended to enable when connecting MetaDefender ICAP Server with MetaDefender Core. This will significantly reduce the loading constraints on MetaDefender Core compared to the default polling mechanism. |
New Operating System Support | To expand our platform compatibility, this release introduces the official support for:
|
User Management via My OPSWAT Central Management API Endpoints | MetaDefender ICAP Server now supports local user management through REST APIs provided by My OPSWAT Central Management. When integrated, administrators can automate user account provisioning and role assignments across distributed environments, enabling better alignment with centralized identity and access management practices. This support is available starting from MetaDefender ICAP Server v5.10.0 and My OPSWAT Central Management version v10.1.2507. Refer to the official My OPSWAT Central Management documentation for more details. |
Email Notification Continuous Enhancement | This release adds extended settings for email notifications, including:
For more information, see the Email Notification page. |
CIS Level 2 Support for Linux | MetaDefender ICAP Server now supports CIS Level 2 system hardening benchmarks for Linux operating systems. For more details, refer to CIS Level 2 Guidelines |
Security Enhancements | Upgraded third-party libraries for improved security:
|
Usability Improvements |
|
Bug Fixes
Details | |
---|---|
Minor Fixes | Resolved various UI cosmetics issues and minor fixes |
Known Limitations
Details | |
---|---|
Proxy Configuration | Currently, HTTPS proxy configuration is not supported. |
SAML Directory (SSO Integration) Limitations | In v5.5.0, users cannot create a new SAML directory via the web UI.
|
Stability Issues on Red Hat/CentOS (Kernel Version 372) | MetaDefender ICAP Server v5.1.0 or newer may encounter stability issues on Red Hat/CentOS systems running kernel version 372. Solution: Upgrade to kernel version 425, where Red Hat has resolved this issue. |
MetaDefender ICAP Server's NGINX Web Server Fails to Start with Weak Cipher Suites for HTTPS | From v5.1.0, OpenSSL 1.x has been replaced with OpenSSL 3.x — across the product and its dependencies — to enhance security and address vulnerabilities. As part of this upgrade, NGINX's OpenSSL 3.x in MetaDefender ICAP Server now enforces stricter cipher policies and rejects all weak cipher suites. The web server now only accepts "HIGH" encryption cipher suites https://www.openssl.org/docs/man1.1.1/man1/ciphers.html (MD5 and SHA1 hashing based are also not accepted). As a result, if you have already configured MetaDefender ICAP Server for HTTPS using a weak SSL cipher with your certificate, the server will not start due to the enforced security policies in NGINX's OpenSSL 3.x. |
no_proxy Configuration | Starting with MetaDefender ICAP Server v5.1.0, the no_proxy setting must support CIDR for IP addresses.
For more details, see No Proxy configuration. |
TLS Connectivity to MetaDefender Core on Debian | On Debian OS, MetaDefender ICAP Server v5.1.0 requires the two following commands to enable TLS communication with MetaDefender Core:
Resolution: Upgrade to MetaDefender ICAP Server v5.1.1, where the issue is resolved. |
TLS 1.3 Not Supported on Windows Server 2012 | TLS 1.3 is not supported on Windows Server 2012 due to limitations with Schannel SSP. Reference |