DESCRIPTION NAME:

CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request)

 CONFIDENCE LEVEL: HIGH
 SEVERITY INBOUND:
 SEVERITY OUTBOUND:
Informational
Low
Medium
High

  OVERVIEW

CVE Exploit: CVE-2016-2776

  TECHNICAL DETAILS

Attack Phase: Point of Entry or Lateral Movement

Protocol: DNS

Risk Type: OTHERS
(Note: OTHERS can be network connections related to hacking attempts, exploits, connections done by grayware, or suspicious traffic.)

Threat Type: Suspicious Behavior

Confidence Level: High

Severity: Medium(Outbound)

DDI Default Rule Status: Enable

Event Class: Exploit

Event Sub Class: Generic

Behavior Indicator: Exploit

APT Related: NO

  SOLUTION

Network Content Inspection Pattern Version: 1.14201.00
Network Content Inspection Pattern Release Date: 16 Jun 2020
Network Content Correlation Pattern Version: 1.12635.00
Network Content Correlation Pattern Release Date: 03 Nov 2016


Did this description help? Tell us how we did.