<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FMC/FTD Snort Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517638#M1085732</link>
    <description>&lt;P&gt;Hi Rafael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is by updating the snort rule in the rule update will mitigate the vulnerability since i couldnt find any other resolution officially announce by cisco.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Dec 2021 06:41:01 GMT</pubDate>
    <dc:creator>Akmal Zamin</dc:creator>
    <dc:date>2021-12-13T06:41:01Z</dc:date>
    <item>
      <title>FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517264#M1085712</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;So received this info from&amp;nbsp; and am wondering how I check we have received these on our FMC devices.???&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Cisco Talos has released the following Snort SIDs to detect exploitation attempts targeting CVE-2021-44228: 58722 - 58739 and 300055 - 300057.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;&lt;A href="https://digital.nhs.uk/cyber-alerts/2021/cc-3989" target="_blank" rel="nofollow noopener noreferrer"&gt;Apache Foundation Log4j 2 vulnerability (CVE-2021-44228).&amp;nbsp;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517264#M1085712</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2021-12-11T20:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517302#M1085714</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;in fmc go to Policies&amp;gt;Intrucion&amp;gt;"the policie that you have applied to your devices"&amp;gt;rules, and in the filter put "Apache Log4j"&lt;/P&gt;&lt;P&gt;you will see all the "SID" from&amp;nbsp;&lt;SPAN&gt;58722 to 58739, and in the action you should see "a red x" thats mean "Drop and Generate Events"&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From the range&amp;nbsp;300055 - 300057&lt;/SPAN&gt;&lt;SPAN&gt;im not shure if its rigth or apply to FMC i cannot see any rule in that range maybe is only 2 0 instade of 3...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;30057&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;MALWARE-CNC Win.Trojan.Peronspy outbound system information disclosure&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;30055&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;MALWARE-CNC Win.Trojan.Deventiz CWD system information disclosure via FTP&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also maybe its obvius but you have to have internet acces in order to download the rule Update. i have&lt;/P&gt;&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Running Snort Rule update version:&amp;nbsp; &lt;STRONG&gt;2021-12-11-001-vrt&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;I hope it helps you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 12 Dec 2021 00:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517302#M1085714</guid>
      <dc:creator>RAFAEL LOPEZ</dc:creator>
      <dc:date>2021-12-12T00:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517638#M1085732</link>
      <description>&lt;P&gt;Hi Rafael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is by updating the snort rule in the rule update will mitigate the vulnerability since i couldnt find any other resolution officially announce by cisco.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 06:41:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517638#M1085732</guid>
      <dc:creator>Akmal Zamin</dc:creator>
      <dc:date>2021-12-13T06:41:01Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517658#M1085735</link>
      <description>&lt;P&gt;The Snort rule will block traffic transiting the firewall that matches the vulnerability - if it can be seen. If, for example, the traffic is encapsulated in an undecrypted TLS flow (for example, over https) it won't be seen and thus cannot be blocked.&lt;/P&gt;
&lt;P&gt;Note also that the rule also only applies to traffic &lt;STRONG&gt;through&lt;/STRONG&gt; the firewall. As of the time of this writing, Cisco is still evaluating the firewall software itself as to the impact of the Log4j vulnerability.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 07:07:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517658#M1085735</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-13T07:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517695#M1085736</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the explanation, so best case scenario for now is to only update the snort rule to latest once released since cisco is still evaluating the vulnerability.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 08:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4517695#M1085736</guid>
      <dc:creator>Akmal Zamin</dc:creator>
      <dc:date>2021-12-13T08:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4520404#M1085841</link>
      <description>&lt;P&gt;Hi Rafael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have info on how to make a report on this matter, so this info can be highlighted to the business. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 08:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4520404#M1085841</guid>
      <dc:creator>Frank Osberg</dc:creator>
      <dc:date>2021-12-17T08:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521039#M1085884</link>
      <description>&lt;P&gt;Hi the easy way that i know is,&lt;/P&gt;&lt;P&gt;if you can see the event under the tab of "analysis" for example&amp;nbsp;on&amp;nbsp;Analisis&amp;gt;Intrusion&amp;gt;events&amp;gt;&amp;nbsp; if you see any triggered ips firm you can click on the button "Report designer" and customise your report or you can play with the field of the filter serch, for example the field called "message" on the ips events&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also this is a vulnerability and it will be used by an exploit or ransomware or so, for example conty is a ransomware that are using this vulnerability and as ransomware you will see in malware events, or file policies, and as the Leyend Marvin say if it is encrypted and you cannot unencript the trafic it will never trigger an event in the FMC(and you need a proper configuration of filepolicy and also malware protection license).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also some version of FTD are vulnerables and other cisco devices so please take a look on this security advisor from Cisco&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and a little meme for smile :3&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RAFAELLOPEZ_0-1639851991199.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/139827iA80D1C82028B9C58/image-size/medium?v=v2&amp;amp;px=400" role="button" title="RAFAELLOPEZ_0-1639851991199.jpeg" alt="RAFAELLOPEZ_0-1639851991199.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RAFAELLOPEZ_1-1639852119669.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/139828i3A969C724DCDB40C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="RAFAELLOPEZ_1-1639852119669.jpeg" alt="RAFAELLOPEZ_1-1639852119669.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Sat, 18 Dec 2021 18:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521039#M1085884</guid>
      <dc:creator>RAFAEL LOPEZ</dc:creator>
      <dc:date>2021-12-18T18:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521049#M1085885</link>
      <description>&lt;P&gt;Hi Rafael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for a great reply here..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So just to get one thing clarified.... You wrote :&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;also this is a vulnerability and it will be used by an exploit or ransomware or so, for example conty is a ransomware that are using this vulnerability and as ransomware you will see in malware events, or file policies, and as the Leyend Marvin say if it is encrypted and you cannot unencrypt&amp;nbsp;the traffic&amp;nbsp;it will never trigger an event in the FMC(and you need a proper configuration of filepolicy and also malware protection license).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will this mean that traffic will not be detected by the FTD/FMC?? The reason why I am asking is that we can see that our FMC/FTD are not detecting any of the CVE for log4j, even do that snort2 is fully updated and should prevent this. But our MS Sentinel is telling us that we are been hit by it.... The IP we can see that are been used are also been noticed on github :&amp;nbsp;&lt;A title="Log4j IP Block List" href="https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Sample%20Data/Feeds/Log4j_IOC_List.csv" target="_self"&gt;Log4j IP Block List&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But my FMC just see these event as legal :&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC-log4j.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/139830i765855315B010486/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC-log4j.png" alt="FMC-log4j.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Can this be because it encrypted or, are we looking to something else here?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The IP are blocked now, but I would expect that our IPS and snort2 would block this? My FTD are running with AMP, Malware licens etc. so that should be OK. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So are we looking at FTD/FMC doing it wrong, or is this wrong info in Sentinel? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Frank&lt;/P&gt;</description>
      <pubDate>Sat, 18 Dec 2021 20:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521049#M1085885</guid>
      <dc:creator>Frank Osberg</dc:creator>
      <dc:date>2021-12-18T20:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521315#M1085905</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/165434"&gt;@Frank Osberg&lt;/a&gt; do your ACP Security Intelligence settings include the TALOS IP blacklist items?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 01:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521315#M1085905</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T01:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521431#M1085916</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where in my ACP should I see this? I have some in Security Intelligence today, but this might be missing&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-12-20 08_26_39-Clipboard.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/139872iDC80F2B86C5C3C03/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-12-20 08_26_39-Clipboard.png" alt="2021-12-20 08_26_39-Clipboard.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my Object section:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-12-20 08_28_10-Window.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/139873i9D6E6456272835A8/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-12-20 08_28_10-Window.png" alt="2021-12-20 08_28_10-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But is there missing something here?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 07:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521431#M1085916</guid>
      <dc:creator>Frank Osberg</dc:creator>
      <dc:date>2021-12-20T07:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: FMC/FTD Snort Question</title>
      <link>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521564#M1085926</link>
      <description>&lt;P&gt;You would not see the blocks as intrusion events as I had noted unless the traffic is unencrypted (or decrypted and resigned via SSL policy). But if the SI categories you show are in your ACP you should get IP blocks as a result.&lt;/P&gt;
&lt;P&gt;If a specific set of addresses seems to be missed then I would suggest raising a TAC case and they can refer it to TALOS.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 12:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fmc-ftd-snort-question/m-p/4521564#M1085926</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T12:26:56Z</dc:date>
    </item>
  </channel>
</rss>

