CVE-2022-23253 Point-to-Point Tunneling Protocol Denial of Service Vulnerability.

CVE-2022-23253 Point-to-Point Tunneling Protocol Denial of Service Vulnerability.

The DDos attack was first reported by the security researcher Alex Chapman of the Cisco Talos security research team. The attacker sends spoofed ping messages to a target device, causing the device to drop its own connections with other devices. In other words, the DDos attack prevents the targeted system from communicating with other systems.

DDoS is also known as DDoS for Denial of Service, Ping of Death, Elevation of Privilege, or Short Term Denial of Service. The DDoS attack is a form of hacking in which a large number of spurious requests are sent from a device or a botnet to a server and thus saturate the server. This makes it difficult for legitimate users to access a server and cause a denial of service.

How to stop DDos attack?

The first way to stop a DDos attack is to stop the attacker. This includes filtering suspicious traffic with an intrusion prevention system (IPS), firewall, or a host-based firewall. The second way to prevent a DDoS attack is to use the right tool for the job. There are tools that can detect attacks and send alerts out.

The third way to prevent DDoS attacks is via detection and blocking. These include application and network-level firewalls, IPS, antivirus software, and Intrusion Prevention Systems
The last option is to reduce the impact of a DDoS attack. This includes filtering connection requests, limiting connections from devices of potential attackers, traffic shaping on servers
Using any combination of these methods will help you prevent DDoS attacks from happening.

DDoS Mitigation Techniques

DDoS attacks can be mitigated using a number of techniques. These include limiting the amount of traffic allowed from one IP address, filtering traffic at layer 4, and filtering traffic at layer 7. Reducing the number of open TCP connections is also a possible mitigation technique. In some cases, DDoS mitigation can be done without any changes to the system or firewall software by creating special packets that are sent in response to the attack.
In order to mitigate a DDoS attack, the following steps should be taken:
1) Establish an emergency contact email and phone number for your organization
2) Implement multiple layers (either hardware or software) between your endpoints and servers
3) Limit the incoming requests per second and/or size of incoming requests
4) Monitor your alerts as they occur

The Attack Works by Spoofing Ping Messages

The attack works by spoofing ping messages. The hacker sends spoofed ping messages to a target device, causing the device to drop its own connections with other devices. In other words, the DDos attack prevents the targeted system from communicating with other systems.

If you have any questions about anything or have any suggestions for posts please leave a comment below!

How to Defend Against DDos?

A typical DDos attack is launched by spoofing the source IP address of the attacking device. This process involves sending spoofed packets to the target’s network and routing them through a compromised device or an infected router close to the target. If a system has no way of knowing which of its neighbors are malicious, it will forward these packets to every other device in its subnet.
The best method for defending against DDOS attacks is to segment your network. For example, if you have a corporate network with 10 different segments, one could be assigned as the DMZ or perimeter network which monitors Internet traffic and prevents devices from accessing external resources like HTTP and SMTP ports.

Discovered By: Shweta Chauhan and Sushmita Choudhary of Cisco Talos Team

The DDos attack was first reported by the security researcher Alex Chapman of the Cisco Talos security research team. The attacker sends spoofed ping messages to a target device, causing the device to drop its own connections with other devices. In other words, the DDos attack prevents the targeted system from communicating with other systems.
This discovery is significant because we are able to identify specific techniques that cyber criminals are using in DDoS attacks. This has important implications for organizations and individuals who are concerned about DDoS attacks or want to know how to avoid them.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe