<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DDOS and &amp;quot;Error processing payload: Payload ID: 1&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142913#M1114172</link>
    <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;thx for your reply!&lt;BR /&gt;Unfortunately, I do not see any noticeable event in the log before and after these messages. Everything looks completely normal - just the usual acl matches and VPN events.&lt;BR /&gt;&lt;BR /&gt;These messages are the only usable information.&lt;BR /&gt;I agree with you that the target was the firewall itself and not a target behind the firewall. Therefore, only the source IP addresses are visible. And yes, the ASA-3-713048 event is related to VPN connections.&lt;BR /&gt;&lt;BR /&gt;I suspect that the ASA is trying to assign the incoming payload packets to an active VPN connection, but cannot find a match.&lt;BR /&gt;Nevertheless, the FW has to process these excessive payload packets, which leads to the DDOS effect.&lt;/P&gt;&lt;P&gt;The Begin of this messages is 10:29:35 and the End at 10:42:20 - In this short time window, 965603 error processing payload messages with 11498 different IP addresses from 186 different networks were received.&lt;BR /&gt;Most of these IP addresses were addresses from CN.&lt;BR /&gt;&lt;BR /&gt;I therefore assume that this was a dedicated targeted attack and not the result of a faulty VPN configuration.&lt;/P&gt;&lt;P&gt;Recently, there have also been an increasing number of brute force attacks on the authentication service of the firewall, which are already known in the community.&lt;/P&gt;&lt;P&gt;However, the type of attack was new to me and I could not find anything about it on the Internet.&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2024 13:40:30 GMT</pubDate>
    <dc:creator>rstockum</dc:creator>
    <dc:date>2024-07-10T13:40:30Z</dc:date>
    <item>
      <title>DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142805#M1114161</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;A few days ago we had a DDOS attack against our ASA 5545 firewall.&lt;BR /&gt;Within a time window of about 15 minutes, almost 1,000,000 connections were established from slightly more than 10,000 Bot-Net IP addresses, which led to a high CPU load on the firewall and overflow of the session tables immediately after the attack began.&lt;BR /&gt;The effect was sporadic connection and call drops over a period of about an hour.&lt;BR /&gt;The FW log file contained 965,603 entries with the following messages:&lt;BR /&gt;&lt;BR /&gt;"%ASA-3-713048: IP = &lt;EM&gt;&amp;lt;different unknown IP addresses&amp;gt;&lt;/EM&gt;, Error processing payload: Payload ID: 1"&lt;/P&gt;&lt;P&gt;Is this a known vulnerability?&lt;BR /&gt;Has anyone had any experience with this?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 11:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142805#M1114161</guid>
      <dc:creator>rstockum</dc:creator>
      <dc:date>2024-07-10T11:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142856#M1114168</link>
      <description>&lt;P&gt;What messages come before and after the "Error processing payload..." message?&lt;/P&gt;
&lt;P&gt;You say the connections were established, were they established to a server / IP behind the firewall?&amp;nbsp; Usually if this was to an IP behind the firewall you would only see allowed or drop logs.&amp;nbsp; So, I would almost think that this is traffic destined for the firewall and possibly AnyConnect / remote access VPN.&lt;/P&gt;
&lt;P&gt;Without more context to the connection it will be difficult to formulate a hypothesis on if it is a vulnerability or something else.&lt;/P&gt;
&lt;P&gt;if this is time-sensitive then I suggest opening a TAC case and request immediate assistance.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 12:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142856#M1114168</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-07-10T12:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142859#M1114169</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;U&gt;&lt;STRONG&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;gt;...Is this a known vulnerability?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;- It depend what you mean by vulnerability as a DDOS attack is always external&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;It is advised to upgrade the ASA to the latest advisory software version , if applicable&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;for solid firewall performance and handling of atttacks ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 12:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142859#M1114169</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-07-10T12:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142913#M1114172</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;thx for your reply!&lt;BR /&gt;Unfortunately, I do not see any noticeable event in the log before and after these messages. Everything looks completely normal - just the usual acl matches and VPN events.&lt;BR /&gt;&lt;BR /&gt;These messages are the only usable information.&lt;BR /&gt;I agree with you that the target was the firewall itself and not a target behind the firewall. Therefore, only the source IP addresses are visible. And yes, the ASA-3-713048 event is related to VPN connections.&lt;BR /&gt;&lt;BR /&gt;I suspect that the ASA is trying to assign the incoming payload packets to an active VPN connection, but cannot find a match.&lt;BR /&gt;Nevertheless, the FW has to process these excessive payload packets, which leads to the DDOS effect.&lt;/P&gt;&lt;P&gt;The Begin of this messages is 10:29:35 and the End at 10:42:20 - In this short time window, 965603 error processing payload messages with 11498 different IP addresses from 186 different networks were received.&lt;BR /&gt;Most of these IP addresses were addresses from CN.&lt;BR /&gt;&lt;BR /&gt;I therefore assume that this was a dedicated targeted attack and not the result of a faulty VPN configuration.&lt;/P&gt;&lt;P&gt;Recently, there have also been an increasing number of brute force attacks on the authentication service of the firewall, which are already known in the community.&lt;/P&gt;&lt;P&gt;However, the type of attack was new to me and I could not find anything about it on the Internet.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 13:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142913#M1114172</guid>
      <dc:creator>rstockum</dc:creator>
      <dc:date>2024-07-10T13:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142921#M1114174</link>
      <description>&lt;P&gt;If the source IPs are from different IPs as you are mentioning, then yes this is not a misconfiguration.&lt;/P&gt;
&lt;P&gt;The unfortunate thing about these types of attacks is that they are very difficult if not impossible to prevent.&amp;nbsp; This being that VPN connections will be coming in from random public IPs and if you block that...well then no one can connect anyway.&lt;/P&gt;
&lt;P&gt;What you can do is tighten up which countries can connect to the VPN by blocking country IP address space in a control plane ACL.&amp;nbsp; So for example, if you are not expecting users to connect via VPN from Russia, China, Korea, etc. you can create a control plane ACL containing these IP address spaces and block them.&amp;nbsp; This will not prevent a DDoS but i can limit the attack surface.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 14:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5142921#M1114174</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-07-10T14:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143100#M1114187</link>
      <description>&lt;P&gt;try capture traffic and see it source destination protocol ID&amp;nbsp;&lt;BR /&gt;if you can share capture here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 21:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143100#M1114187</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-10T21:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143301#M1114197</link>
      <description>&lt;P&gt;Hi Marius,&lt;BR /&gt;Yes, that's exactly what I do! I have defined a CPLANE ACL for the bad geolocations and also shunned all these IP addresses.&lt;BR /&gt;The strange thing is that the attack stopped by itself after about 15 minutes, without my intervention.&lt;BR /&gt;Thanks you!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 05:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143301#M1114197</guid>
      <dc:creator>rstockum</dc:creator>
      <dc:date>2024-07-11T05:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: DDOS and "Error processing payload: Payload ID: 1"</title>
      <link>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143305#M1114198</link>
      <description>&lt;P&gt;Hi - So far there have been no further attacks of this kind.&lt;BR /&gt;But if they happen again and there is enough time, I will capture the traffic to get detailed information.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 05:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ddos-and-quot-error-processing-payload-payload-id-1-quot/m-p/5143305#M1114198</guid>
      <dc:creator>rstockum</dc:creator>
      <dc:date>2024-07-11T05:34:42Z</dc:date>
    </item>
  </channel>
</rss>

