<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Snort rules triggering on incorrect OS version in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803922#M1099092</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Snort actually uses a process called network discovery in order to identity operating systems and apps used &lt;SPAN data-dobid="hdw"&gt;throughout &lt;/SPAN&gt;the network. It does this by using 'signatures' (part of the VDB package) that are applied to traffic that it 'sees'. Thus this is a passive way of discovering hosts. It's just its best guess.&lt;/P&gt;
&lt;P&gt;You know that the source and destination are not win7 or 2008R2 because you can logon to that resource and manually check the OS version and all the details.&lt;/P&gt;
&lt;P&gt;Snort has to means of doing that.&lt;/P&gt;
&lt;P&gt;You can go to Analysis &amp;gt; Hosts &amp;gt; Hosts &amp;gt; Table View and search for your specific IPs and check that Snort thinks of them.&lt;/P&gt;
&lt;P&gt;If needed you can manually edit the operating system for those particular hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If OS fingerprinting is wrong, it's normal for that IPS signature to have an Impact 1 attached, because the system considers the host to have the protocol running and the respective vulnerability mapped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Mar 2023 13:41:31 GMT</pubDate>
    <dc:creator>Octavian Szolga</dc:creator>
    <dc:date>2023-03-29T13:41:31Z</dc:date>
    <item>
      <title>Snort rules triggering on incorrect OS version</title>
      <link>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803907#M1099090</link>
      <description>&lt;P&gt;Our Firepower Threat Defense SNORT engine is triggering rules that don't match the actual traffic.&lt;/P&gt;&lt;P&gt;For example, rule&amp;nbsp;&lt;SPAN class=""&gt;1:16540:18 references CVE-2010-0477 which has the description:&amp;nbsp;&lt;SPAN&gt;The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly handle (1) SMBv1 and (2) SMBv2 response packets, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted packet that causes the client to read the entirety of the response, and then improperly interact with the Winsock Kernel (WSK), aka "SMB Client Message Size Vulnerability."&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;However, the source device is Windows 10 and the destination is Windows Server 2019.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Can anyone tell me why this is happening?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Firepower says it is an Impact 1 event, but it is not an affected OS version.&lt;BR /&gt;&lt;BR /&gt;Even the Microsoft Security bulletin does not include these OS as affected versions.&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-020?redirectedfrom=MSDN" target="_blank"&gt;https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2010/ms10-020?redirectedfrom=MSDN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Any help will be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 13:12:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803907#M1099090</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-03-29T13:12:17Z</dc:date>
    </item>
    <item>
      <title>Re: Snort rules triggering on incorrect OS version</title>
      <link>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803922#M1099092</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Snort actually uses a process called network discovery in order to identity operating systems and apps used &lt;SPAN data-dobid="hdw"&gt;throughout &lt;/SPAN&gt;the network. It does this by using 'signatures' (part of the VDB package) that are applied to traffic that it 'sees'. Thus this is a passive way of discovering hosts. It's just its best guess.&lt;/P&gt;
&lt;P&gt;You know that the source and destination are not win7 or 2008R2 because you can logon to that resource and manually check the OS version and all the details.&lt;/P&gt;
&lt;P&gt;Snort has to means of doing that.&lt;/P&gt;
&lt;P&gt;You can go to Analysis &amp;gt; Hosts &amp;gt; Hosts &amp;gt; Table View and search for your specific IPs and check that Snort thinks of them.&lt;/P&gt;
&lt;P&gt;If needed you can manually edit the operating system for those particular hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If OS fingerprinting is wrong, it's normal for that IPS signature to have an Impact 1 attached, because the system considers the host to have the protocol running and the respective vulnerability mapped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 13:41:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803922#M1099092</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2023-03-29T13:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Snort rules triggering on incorrect OS version</title>
      <link>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803938#M1099094</link>
      <description>&lt;P&gt;Octavian,&lt;/P&gt;&lt;P&gt;This is EXTREMELY helpful. Thank you!&lt;BR /&gt;&lt;BR /&gt;I guess this is why we would use NMAP scan as an initial remediation for a Snort Rule trigger.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 13:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/snort-rules-triggering-on-incorrect-os-version/m-p/4803938#M1099094</guid>
      <dc:creator>DannyDulin</dc:creator>
      <dc:date>2023-03-29T13:48:55Z</dc:date>
    </item>
  </channel>
</rss>

