OS-WINDOWS -- Snort has detected traffic targeting vulnerabilities in a Windows-based operating system. This does not include browser traffic or other software on the OS, but attacks against the OS itself. (such as?)
OS-WINDOWS Microsoft Windows LSASS denial of service attempt
This rule looks for Denial Of Service attack attempts against vulnerable versions of Windows.
This rule alerts on initial exploit traffic attempting to send malformed network requests with fragmented "Client Hello" packets that will force a reboot of Windows11+ & Windows Server 2022+ Operating Systems.
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File
MITRE::ATT&CK Framework::Enterprise::Impact::Endpoint Denial of Service::Application or System Exploitation
Denial of Service
Denial of Service attacks aim to make a server or program unresponsive for users. These attacks may be volume-based, to overwhelm the system, or they may use certain logical flaws in the software to cut the service off from the users. The attack may come from one or multiple sources. These attacks do not usually lead to a remote code execution. Volume based attacks are best handled using a firewall application.
CVE-2024-38148 |
Loading description
|