UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The TPS must block malicious ICMP packets by properly configuring ICMP signatures and rules.


Overview

Finding ID Version Rule ID IA Controls Severity
V-242195 TIPP-IP-000300 SV-242195r710128_rule Medium
Description
Internet Control Message Protocol (ICMP) messages are used to provide feedback about problems in the network. These messages are sent back to the sender to support diagnostics. However, some messages can also provide host information, network topology, and a covert channel that may be exploited by an attacker. Given the prevalence of ICMP traffic on the network, monitoring for malicious ICMP traffic would be cumbersome. Vendors provide signatures and rules which filter for known ICMP traffic exploits.
STIG Date
Trend Micro TippingPoint IDPS Security Technical Implementation Guide 2021-06-09

Details

Check Text ( C-45470r710126_chk )
1. In the Trend Micro SMS, navigate to "Profiles" and "Inspection Profiles" and select the organization's profile.
2. If there is not one configured, select "Default".
3. Click "Search".
4. Under "Filter criteria", select all "Filter categories". Select the "Filter Name" section and type "icmp".

If the following filter names are not set to Block+Notify, this is a finding:

7141: ICMP: Header Incomplete
7145: ICMPv6: Header Incomplete
0087: ICMP: Modem Hangup (+++ATH) Echo Request
0110: TFN: ICMP Flood Command Acknowledgement (General)
0282: ICMP: icmpenum (Timestamp Request)
0283: ICMP: icmpenum (Information Request)
1474: ICMP: Modem Hangup (+++ATH) Echo Reply
3852: NTRootKit: Command and Control Response (ICMP)
5855: ICMP: Malicious Router Discovery Protocol Packet
10043: ICMP: Solaris 10 ICMP Remote DoS
12522: ICMP: Source Quench
12577: ICMP: Destination Unreachable (Fragmentation Needed and DF Bit Set)
13118: ICMP: Windows DirectAccess Server IPv6 Invalid Header Denial-of-Service Vulnerability
13172: ICMP: Active Directory LDAP Winsock Denial-of-Service Vulnerability
13532: IPv6: Microsoft Windows ICMPv6 Prefix Update Denial-of-Service Vulnerability
17049: ICMPv6: FreeBSD rtsold Buffer Overflow Vulnerability
17086: ICMP: Regin Malware Communication Attempt
22646: ICMPv6: FreeBSD SCTP ICMPv6 Denial-of-Service Vulnerability
29732: ICMP: Dnsmasq ICMPv6 Router Advertisement Buffer Overflow Vulnerability
0081: ICMP: Unassigned Type (Type 1)
0081: ICMP: Unassigned Type (Type 1)
ICMPv6 Types 144 through 153
Fix Text (F-45428r710127_fix)
1. In the Trend Micro SMS, navigate to "Profiles" and "Inspection Profiles" and select the organization's profile.
2. If there is not one configured, select "Default".
3. Click "Search".
4. Under "Filter criteria", select all "Filter categories". Select the "Filter Name" section and type "icmp".
5. Click each of the following rules and select:

7141: ICMP: Header Incomplete
7145: ICMPv6: Header Incomplete
0087: ICMP: Modem Hangup (+++ATH) Echo Request
0110: TFN: ICMP Flood Command Acknowledgement (General)
0282: ICMP: icmpenum (Timestamp Request)
0283: ICMP: icmpenum (Information Request)
1474: ICMP: Modem Hangup (+++ATH) Echo Reply
3852: NTRootKit: Command and Control Response (ICMP)
5855: ICMP: Malicious Router Discovery Protocol Packet
10043: ICMP: Solaris 10 ICMP Remote DoS
12522: ICMP: Source Quench
12577: ICMP: Destination Unreachable (Fragmentation Needed and DF Bit Set)
13118: ICMP: Windows DirectAccess Server IPv6 Invalid Header Denial-of-Service Vulnerability
13172: ICMP: Active Directory LDAP Winsock Denial-of-Service Vulnerability
13532: IPv6: Microsoft Windows ICMPv6 Prefix Update Denial-of-Service Vulnerability
17049: ICMPv6: FreeBSD rtsold Buffer Overflow Vulnerability
17086: ICMP: Regin Malware Communication Attempt
22646: ICMPv6: FreeBSD SCTP ICMPv6 Denial-of-Service Vulnerability
29732: ICMP: Dnsmasq ICMPv6 Router Advertisement Buffer Overflow Vulnerability
0081: ICMP: Unassigned Type (Type 1)
0081: ICMP: Unassigned Type (Type 1)
ICMPv6 Types 144 through 153