• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers detail bug that could paralyze snort intrusion detection system

Researchers Detail Bug That Could Paralyze Snort Intrusion Detection System

You are here: Home / General Cyber Security News / Researchers Detail Bug That Could Paralyze Snort Intrusion Detection System
April 20, 2022

Aspects have emerged about a now-patched security vulnerability in the Snort intrusion detection and avoidance process that could induce a denial-of-assistance (DoS) problem and render it powerless in opposition to malicious website traffic.

Tracked as CVE-2022-20685, the vulnerability is rated 7.5 for severity and resides in the Modbus preprocessor of the Snort detection engine. It influences all open up-resource Snort venture releases before than 2.9.19 as nicely as variation 3.1.11..

Maintained by Cisco, Snort is an open up-source intrusion detection process (IDS) and intrusion avoidance system (IPS) that presents real-time network website traffic assessment to spot potential indications of malicious activity based mostly on predefined principles.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

“The vulnerability, CVE-2022-20685, is an integer-overflow issue that can lead to the Snort Modbus OT preprocessor to enter an infinite though loop,” Uri Katz, a security researcher with Claroty, explained in a report posted previous 7 days. “A successful exploit keeps Snort from processing new packets and generating alerts.”

Particularly, the shortcoming relates to how Snort procedures Modbus packets — an industrial facts communications protocol used in supervisory command and data acquisition (SCADA) networks — main to a scenario in which an attacker can mail a specially crafted packet to an impacted system.

“A effective exploit could allow for the attacker to lead to the Snort process to dangle, causing targeted traffic inspection to end,” Cisco mentioned in an advisory released previously this January addressing the flaw.

CyberSecurity

In other text, exploitation of the issue could permit an unauthenticated, distant attacker to create a denial-of-assistance (DoS) situation on affected gadgets, successfully hindering Snort’s ability to detect attacks and make it feasible to run malicious packets on the network.

“Successful exploits of vulnerabilities in network assessment resources these kinds of as Snort can have devastating impacts on business and OT networks,” Katz stated.

“Network evaluation instruments are an beneath-researched region that warrants more assessment and interest, specially as OT networks are significantly being centrally managed by IT network assessment acquainted with Snort and other identical resources.”

Uncovered this post attention-grabbing? Observe THN on Facebook, Twitter  and LinkedIn to examine much more exclusive written content we article.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «[ebook] the ultimate security for management presentation template [eBook] The Ultimate Security for Management Presentation Template
Next Post: Millions of Lenovo laptops thought to be vulnerable to newly discovered UEFI malware attacks millions of lenovo laptops thought to be vulnerable to newly»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz

Copyright © TheCyberSecurity.News, All Rights Reserved.