The Log Correlation Engine (LCE) uses the third-party Libxml2 library for some XML parsing routines. A vulnerability was found and patched in Libxml2 recently. Tenable has not evaluated this vulnerability beyond acknowledging that user-supplied XML input can be parsed by LCE. As such, the developer team upgraded the library as a precaution without further testing (that is "possibly affected" for mature vulnerability databases!). <doge>Very speed, less risk</doge>! CVE-2015-8035 - Libxml2 contains an infinite loop condition in the xz_decomp() function in xzlib.c that is triggered when handling xz compressed XML content. This may allow a context-dependent attacker to exhaust available system resources. Please note that Tenable strongly recommends that LCE be installed on a subnet that is not Internet addressable.