NAT.SlipStreaming.Security.Bypass
Description
This indicates an attack attempt to exploit a Security Bypass Vulnerability in SIP/H.323 ALG (Application Level Gateway)
The vulnerability is due to a flaw in some ALG implementations that allows an attacker to bypass NAT/firewall with a crafted request. An attack can exploit the vulnerability by enticing a user to visit a crafted webpage. Successful exploitation will lead to remote access of any TCP/UDP service bound on a victim machine.
Affected Products
Any NAT/firewall that supports ALG (Application Level Gateways)
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to NAT/firewall vendor for patch or upgrade
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-03-04 | 18.030 | Sig Added |
2021-02-10 | 17.014 | Sig Added |
2020-11-17 | 16.963 | Default_action:pass:drop |
2020-11-12 | 16.961 |