""ET EXPLOIT Cisco IOS XE Web Server Implant Check (CVE-2023-20198) M3""

SID: 2049103

Revision: 1

Class Type: trojan-activity

Metadata: attack_target Networking_Equipment, created_at 2023_11_07, cve CVE_2023_20198, deployment Perimeter, deployment SSLDecrypt, confidence High, signature_severity Major, updated_at 2023_11_07

Reference:

  • cve

  • 2023-20198

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: any

Destination Network: [$HOME_NET,$HTTP_SERVERS]

Destination Port: any

Flow: established,to_server

Contents:

  • Value: "POST"

  • Value: "|2f|webui|2f|logoutconfirm|2e|html|3f|menu|3d|1"

Within:

PCRE:

Special Options:

  • http_method

  • http_uri

  • fast_pattern

source