Signature
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"SERVER-WEBAPP Cisco IOS HTTP server denial of service attempt"; flow:to_server,established; content:"?/"; http_uri; pcre:"/\w*?\?\/$/U"; metadata:policy max-detect-ips drop, service http; reference:bugtraq,10014; reference:bugtraq,1838; reference:url,www.cisco.com/en/US/products/hw/routers/ps295/products_security_notice09186a008020ce3f.html; classtype:attempted-dos; sid:30342; rev:2;)
MITRE ATT&CK Technique
"Resource Exhaustion (T1499)" "Service Stop (T1489)" " Exploit Public-Facing Application (T1190)" "Data Destruction (T1485)"
Recommendations/Investigative actions
Ensure that you are using the latest version of Cisco IOS that includes security patches and updates. Keep the firmware of Cisco routers up-to-date with the latest vendor-released patches. Authorize the connection. If the connection was approved - archive and baseline the rule. If not - check the connection, If there are internet IP's involved check if there are more alerts that this IP is involved, block the IP's in the FW and investigate the relevant IP address.
Relations to other alerts