<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic High Vulnerabilities UDP 53 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4946735#M1105336</link>
    <description>&lt;P&gt;Dear Expert&lt;/P&gt;&lt;P&gt;i have cisco FTD 2120, and on my firewall Tenable scan found "Firewall UDP Packet Source Port 53 Ruleset Bypass"&lt;/P&gt;&lt;P&gt;But when i check on connection event from outside to inside, and inside to outside, UDP Port 53 and 1025 already blocked,&lt;/P&gt;&lt;P&gt;but on tenable scan still found ICMP request still given to unknown internet IP, can you please advice me, what is policy i need to set for this vulnerabilities&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yusran&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 09:18:17 GMT</pubDate>
    <dc:creator>Lemineral</dc:creator>
    <dc:date>2023-10-24T09:18:17Z</dc:date>
    <item>
      <title>High Vulnerabilities UDP 53</title>
      <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4946735#M1105336</link>
      <description>&lt;P&gt;Dear Expert&lt;/P&gt;&lt;P&gt;i have cisco FTD 2120, and on my firewall Tenable scan found "Firewall UDP Packet Source Port 53 Ruleset Bypass"&lt;/P&gt;&lt;P&gt;But when i check on connection event from outside to inside, and inside to outside, UDP Port 53 and 1025 already blocked,&lt;/P&gt;&lt;P&gt;but on tenable scan still found ICMP request still given to unknown internet IP, can you please advice me, what is policy i need to set for this vulnerabilities&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yusran&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 09:18:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4946735#M1105336</guid>
      <dc:creator>Lemineral</dc:creator>
      <dc:date>2023-10-24T09:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: High Vulnerabilities UDP 53</title>
      <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4946913#M1105337</link>
      <description>&lt;P&gt;Is your ACP rule using application (DNS) or port+protocol (udp/53)?&lt;/P&gt;
&lt;P&gt;If it is using DNS application, several packets will be allowed through to allow the firewall to determine the actual application in use. that can sometimes result in false positives from scanning engines like Tenable Nessus.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 13:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4946913#M1105337</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-10-24T13:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: High Vulnerabilities UDP 53</title>
      <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4948130#M1105367</link>
      <description>&lt;P&gt;Hello Marvin&lt;/P&gt;&lt;P&gt;Many thanks for your replay, on my ACP im not using DNS or Port (UDP/53) as specified,&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you help me, how to make ICMP request block from unknown ip internet on my cisco firewall&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 01:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4948130#M1105367</guid>
      <dc:creator>Lemineral</dc:creator>
      <dc:date>2023-10-26T01:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: High Vulnerabilities UDP 53</title>
      <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4949003#M1105379</link>
      <description>&lt;P&gt;To block ICMP use a platform policy setting in FMC. Platform Policy &amp;gt; ICMP Access &amp;gt; Add block for new port object ICMP-Any on your outside interface. Save and deploy.&lt;/P&gt;
&lt;P&gt;For FDM-managed devices, use a flexconfig object.&lt;/P&gt;
&lt;P&gt;Reference:&lt;A href="https://community.cisco.com/t5/network-security/block-icmp-to-ftd-device-interface-ip-in-fdm/td-p/4152340" target="_blank"&gt;https://community.cisco.com/t5/network-security/block-icmp-to-ftd-device-interface-ip-in-fdm/td-p/4152340&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 15:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4949003#M1105379</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-10-26T15:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: High Vulnerabilities UDP 53</title>
      <link>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4949334#M1105391</link>
      <description>&lt;P&gt;Dear Marvin&lt;/P&gt;&lt;P&gt;thanks for your help, i got it&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 01:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/high-vulnerabilities-udp-53/m-p/4949334#M1105391</guid>
      <dc:creator>Lemineral</dc:creator>
      <dc:date>2023-10-27T01:32:26Z</dc:date>
    </item>
  </channel>
</rss>

