<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/utm-firewall/f/network-protection-firewall-nat-qos-ips/134115/snort-denial-of-service-vulnerability-cve-2022-20685</link><description>Is Sophos aware of and working on this? 
 https://claroty.com/2022/04/14/blog-research-blinding-snort-breaking-the-modbus-ot-preprocessor/ 
 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494485?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 14:05:06 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:d8baeccf-2f21-48a2-b524-19a1c6aad238</guid><dc:creator>SG-1</dc:creator><description>&lt;p&gt;Thank you! Publicly here in the Sophos Community the info should be useful for the time being.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494482?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 13:12:07 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:5982aef3-ed44-49da-a5e2-7fa46c07f113</guid><dc:creator>RichBaldry</dc:creator><description>&lt;p&gt;Yes this is on our radar and we are working on a patch for the current snort engine. In the meantime, the risk of this being used by an external attacker is virtually eliminated by blocking inbound TCP connections on TCP port 502.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494468?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 11:56:40 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:14f50a29-eb47-4d70-97bb-dd37a3a3dcd1</guid><dc:creator>LuCar Toni</dc:creator><description>&lt;p&gt;You should create a Support Case to get this answer.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494447?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 08:55:46 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:4ce5d003-a075-4a94-8489-7aea97805f64</guid><dc:creator>SG-1</dc:creator><description>&lt;p&gt;Thanks for the info! Unfortunately the Snort site doesn&amp;#39;t have details on the two IDs. I&amp;#39;m afraid that the Snort software itself needs to be updated by/on Sophos though. I currently see Snort Version 2.9.17.1 on a 9.710-1 Sophos UTM. I found &lt;a href="/utm-firewall/b/blog/posts/upcoming-ips-engine-update---early-access-opportunity"&gt;this interesting link&lt;/a&gt; which states that the Snort engine can be delivered by Sophos via the pattern updates. That&amp;#39;s why I tried to ask &lt;a href="/members/richbaldry"&gt;RichBaldry&lt;/a&gt; here.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494423?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 01:49:47 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:ef6c5da0-193b-46fe-9b51-cb511962d717</guid><dc:creator>Amodin</dc:creator><description>&lt;p&gt;Well I tried to reply to this topic, but my reply was actually being moderated and labeled as &amp;#39;spam&amp;#39;.&lt;/p&gt;
&lt;p&gt;At any rate, let&amp;#39;s see if this works - IPS rules has two listings for it.&amp;nbsp;&lt;a href="https://lists.astaro.com/ASGV9-IPS-rules.html"&gt;Astaro IPS Rules&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item><item><title>RE: Snort Denial of Service Vulnerability CVE-2022-20685</title><link>https://community.sophos.com/thread/494421?ContentTypeID=1</link><pubDate>Thu, 28 Apr 2022 01:46:35 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:f1ede10c-92a9-44fe-b344-4728f2cd9422</guid><dc:creator>Amodin</dc:creator><description>&lt;p&gt;Under 58906, 58907 on the ID.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://lists.astaro.com/ASGV9-IPS-rules.html"&gt;Astaro IPS Rules&lt;/a&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>