DDI RULE 2253
June 17, 2020
DESCRIPTION NAME:
CVE-2016-2776 DNS ISC BIND TSIG EXPLOIT - DNS (Request)
CONFIDENCE LEVEL:
SEVERITY INBOUND:
SEVERITY OUTBOUND:
Informational
Low
Medium
High
OVERVIEW
CVE Exploit: CVE-2016-2776
TECHNICAL DETAILS
Attack Phase: Point of Entry or Lateral Movement
Protocol: DNS
Risk Type: OTHERS
(Note: OTHERS can be network connections related to hacking attempts, exploits, connections done by grayware, or suspicious traffic.)
Threat Type: Suspicious Behavior
Confidence Level: High
Severity: Medium(Outbound)
DDI Default Rule Status: Enable
Event Class: Exploit
Event Sub Class: Generic
Behavior Indicator: Exploit
APT Related: NO
SOLUTION
Network Content Inspection Pattern Version: 1.14201.00
Network Content Inspection Pattern Release Date: 16 Jun 2020
Network Content Correlation Pattern Version: 1.12635.00
Network Content Correlation Pattern Release Date: 03 Nov 2016
Did this description help? Tell us how we did.