RELEASE DATE: | Friday November 15, 2019 |
MD5 CHECKSUM: | a7f4e59eca64149b4e70c17eaadb36b9 |
SHA1 CHECKSUM: | 4f0fbb4acdd33a0fe350f2fe2cd2346cc197b3fb |
SHA256 CHECKSUM: | 00b644b2c58242af45612cb018682c1b2307b5dc9449c8a2e0760b5e799ca121 |
- Forcepoint NGFW Security Management Center: | 5.10.1.10027 |
- Forcepoint NGFW: | 5.5.1.9848 |
Risk level | Description | Reference | Vulnerability |
High | An attempt to exploit a vulnerability in wolfSSL detected | CVE-2019-11873 | Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow |
High | An attempt to exploit a vulnerability in Net-SNMP detected | No CVE/CAN | Net-SNMP-Write-Access-SNMP-EXTEND-MIB-Arbitrary-Code-Execution |
High | An attempt to exploit a vulnerability in rConfig Network Device Configuration Tool detected | CVE-2019-16663 | rConfig-Search.crud.php-Command-Injection |
High | An attempt to exploit a vulnerability in PHP detected | CVE-2019-11043 | PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow |
High | Trickbot C2 traffic was detected | No CVE/CAN | TrickBot-C2-Traffic |
High | An attempt to exploit a vulnerability in YouPHPTube Encoder detected | CVE-2019-5127 | YouPHPTube-Encoder-Getimage.php-Command-Injection |
High | Suspicious user-agent WinHTTP loader was detected | No CVE/CAN | Suspicious-User-Agent-WinHTTP-Loader |
High | An attempt to exploit a vulnerability in Netgear DGN1000 detected | No CVE/CAN | NetGear-DGN1000-Remote-Command-Execution |
High | An attempt to exploit a vulnerability in JAWS detected | No CVE/CAN | JAWS-Command-Execution |
High | An attempt to exploit a vulnerability in Xymon detected | CVE-2016-2056 | Xymon-Useradm-Command-Execution |
High | An attempt to exploit a vulnerability in Belkin Wemo detected | No CVE/CAN | Belkin-Wemo-UPnP-Remote-Code-Execution |
High | An attempt to exploit a vulnerability in WiKID 2FA Enterprise Server detected | CVE-2019-17117 | WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection |
High | An attempt to exploit a vulnerability in Oracle WebLogic Server detected | CVE-2019-2888 | Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection |
High | An attempt to exploit a vulnerability in Microsoft Windows detected | CVE-2019-1311 | Microsoft-Windows-Imaging-API-Use-After-Free |
High | Suspicious executable download was detected | No CVE/CAN | Suspicious-Executable-Download |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection | CVE-2019-2888 | Generic_CS-Oracle-WebLogic-Ejbtaglibdescriptor-External-Entity-Injection | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | rConfig-Search.crud.php-Command-Injection | CVE-2019-16663 | HTTP_CSU-rConfig-Search.crud.php-Command-Injection | Suspected Compromise |
High | PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow | CVE-2019-11043 | HTTP_CSU-PHP-FPM-Init_request_info-Path_Info-Buffer-Underflow | Suspected Compromise |
High | TrickBot-C2-Traffic | No CVE/CAN | HTTP_CSU-TrickBot-C2-Traffic | Botnet |
High | YouPHPTube-Encoder-Getimage.php-Command-Injection | CVE-2019-5127 | HTTP_CSU-YouPHPTube-Encoder-Getimage.php-Command-Injection | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Suspicious-User-Agent-WinHTTP-Loader | No CVE/CAN | HTTP_CSH-Suspicious-User-Agent-WinHTTP-Loader | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | NetGear-DGN1000-Remote-Command-Execution | No CVE/CAN | HTTP_CRL-NetGear-DGN1000-Remote-Command-Execution | Suspected Compromise |
High | JAWS-Command-Execution | No CVE/CAN | HTTP_CRL-JAWS-Command-Execution | Suspected Compromise |
High | Xymon-Useradm-Command-Execution | CVE-2016-2056 | HTTP_CSU-Xymon-Useradm-Command-Execution | Suspected Compromise |
High | Belkin-Wemo-UPnP-Remote-Code-Execution | No CVE/CAN | HTTP_CSU-Belkin-Wemo-UPnP-Remote-Code-Execution | Suspected Compromise |
High | WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection | CVE-2019-17117 | HTTP_CRL-WIKID-2fa-Enterprise-Server-Processpref.jsp-SQL-Injection | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow | CVE-2019-11873 | TLS_CS-Wolfssl-Dopresharedkeys-Psk-Identity-Buffer-Overflow | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Microsoft-Windows-Imaging-API-Use-After-Free | CVE-2019-1311 | File-Binary_Microsoft-Windows-Imaging-API-Use-After-Free | Suspected Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type |
High | Suspicious-Executable-Download | No CVE/CAN | File-Exe_Suspicious-Executable-Download | Potential Compromise |
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
High | MySQL-And-MariaDB-Incorrect-Cast-Policy-Bypass-Vulnerability | CVE-2012-2122 | Analyzer_MySQL-Brute-Force | Suspected Compromise |
|
|
High | Oracle-Mysql-Server-Innodb-Memcached-Plugin-Resource-Exhaustion | CVE-2013-1570 | Analyzer_MySQL-InnoDB-Memcached-Plugin-Resource-Exhaustion | Potential Compromise |
|
|
Moderate | Microsoft-Windows-LSASS-Recursive-Stack-Overflow | CVE-2009-1928 | Analyzer_Microsoft-Windows-LSASS-Recursive-Stack-Overflow | Potential Denial of Service |
|
|
High | Microsoft-Windows-Remote-Procedure-Call-Vulnerability | CVE-2013-3175 | Analyzer_Microsoft-Windows-Remote-Procedure-Call-Vulnerability | Suspected Compromise |
|
|
High | Apache-Httpd-Range-Header-Field-Memory-Exhaustion | CVE-2011-3192 | Analyzer_Apache-httpd-Range-Header-Field-Memory-Exhaustion | Suspected Compromise |
|
|
High | Isc-Bind-Recursive-Resolver-Resource-Consumption-Denial-Of-Service | CVE-2014-8500 | Analyzer_ISC-Bind-Denial-of-Service | Potential Denial of Service |
|
|
High | LOIC-DoS-Tool | No CVE/CAN | Analyzer_LOIC-HTTP-Denial-Of-Service | Denial of Service |
|
Risk | Vulnerability/Situation | References | Related Fingerprint | Situation Type | Change Description | |
High | Microsoft-VBScript-RCE-CVE-2018-8174 | CVE-2018-8174 | File-Text_Microsoft-VBScript-RCE-CVE-2018-8174-2 | Suspected Compromise |
|
|
Low | Generic-Shared-Variables | No CVE/CAN | File-Text_Shared-Variables | System Inspections |
|
Type | Name |
Category | YouPHPTube Encoder |
Category | Xymon |
Category | JAWS |
Category | Belkin Wemo |
Situation | Analyzer_Microsoft-Windows-HTTP2-Ping-Flood-Denial-of-Service |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Protocol-Violations |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Potential-Probe |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Potential-Disclosure |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Potential-Denial-of-Service |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Potential-Botnet |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Other-Suspicious-Traffic |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Suspected-Probe |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Suspected-Disclosure |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Suspected-Denial-of-Service |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Suspected-Botnet |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Suspected-Attack-Related-Anomalies |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Spyware-Malware-and-Adware |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Successful-Attacks |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Probe |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Disclosure |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Denial-of-Service |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Botnet |
Situation | File-RIFF_Synthetic-Test-Fingeprint-Attack-Related-Anomalies |
Type | Name | Changes | ||
Application | Forcepoint Test Application: Web Mail |
|
||
Application | Forcepoint Test Application: Updates |
|
||
Application | Forcepoint Test Application: Tunneling |
|
||
Application | Forcepoint Test Application: Travel and Expense |
|
||
Application | Forcepoint Test Application: Storage |
|
||
Application | Forcepoint Test Application: Statistics |
|
||
Application | Forcepoint Test Application: Social Networking |
|
||
Application | Forcepoint Test Application: Remote control |
|
||
Application | Forcepoint Test Application: Reference |
|
||
Application | Forcepoint Test Application: Anonymizers/Proxies |
|
||
Application | Forcepoint Test Application: Photo/Video Sharing |
|
||
Application | Forcepoint Test Application: P2P |
|
||
Application | Forcepoint Test Application: Orienteering |
|
||
Application | Forcepoint Test Application: OPC Historical Data Access |
|
||
Application | Forcepoint Test Application: OPC Data Access |
|
||
Application | Forcepoint Test Application: OPC Auxiliary |
|
||
Application | Forcepoint Test Application: OPC Alarms and Events |
|
||
Application | Forcepoint Test Application: Office |
|
||
Application | Forcepoint Test Application: Miscellaneous |
|
||
Application | Forcepoint Test Application: Media |
|
||
Application | Forcepoint Test Application: Marketing |
|
||
Application | Forcepoint Test Application: Mail |
|
||
Application | Forcepoint Test Application: Infrastructure Services |
|
||
Application | Forcepoint Test Application: HR |
|
||
Application | Forcepoint Test Application: Hosting |
|
||
Application | Forcepoint Test Application: Health |
|
||
Application | Forcepoint Test Application: Finance |
|
||
Application | Forcepoint Test Application: File Sharing |
|
||
Application | Forcepoint Test Application: ERP/CRM |
|
||
Application | Forcepoint Test Application: Games |
|
||
Application | Forcepoint Test Application: Discussion Forum |
|
||
Application | Forcepoint Test Application: Chat |
|
||
Application | Forcepoint Test Application: Basic Internet Services |
|
||
Situation | Analyzer_ScadaBR-Brute-Force-Attack |
|
||
Situation | File-Text_RDS.Dataspace-ActiveX-Control-Remote-Code-Execution |
|
||
Situation | Analyzer_FTP-Brute-Force |
|
||
Situation | Analyzer_RealNetworks-RTSP-Helix-Dual-Long-URI |
|
||
Situation | Analyzer_Nessus-Vulnerability-Scanner-Usage |
|
||
Situation | Analyzer_DirectConnect-Client-To-Client-Handshake-DDoS |
|
||
Situation | Analyzer_Kerberos-Brute-Force |
|
||
Situation | Analyzer_TOR-Handshake-Traffic |
|
||
Situation | Analyzer_Samba-DNS-Reply-Flag-DoS |
|
||
Situation | Analyzer_OpenSSL-DTLS-Recursion-Denial-Of-Service-CVE-2014-0221 |
|
||
Situation | Analyzer_SMB-Brute-Force-Attack |
|
||
Situation | Analyzer_Microsoft-Remote-Desktop-Brute-Force |
|
||
Situation | Analyzer_Microsoft-Windows-iSCSI-Target-CVE-2014-0255-Denial-Of-Service |
|
||
Situation | Analyzer_Apache-Http-Server-Mod_status-Heap-Buffer-Overflow |
|
||
Situation | Analyzer_FTP-Multiple-Empty-Transfers |
|
||
Situation | Analyzer_TCP-SYN-Port-Scan-Or-DoS |
|
||
Situation | Analyzer_ISC-Bind-RPZ-Query-Denial-of-Service |
|
||
IPList | Microsoft Azure datacenter UKWEST | |||
IPList | Microsoft Azure datacenter | |||
IPList | Microsoft Azure datacenter USCENTRAL | |||
IPList | TOR relay nodes IP Address List | |||
IPList | Amazon EC2 | |||
IPList | Amazon AMAZON | |||
IPList | Microsoft Azure datacenter USEAST2 | |||
IPList | Amazon GLOBALACCELERATOR |
1. | Ensure that the SHA256 checksum of the update package are correct. |
2. | Open Admin Tools in the SMC GUI client. |
3. | Right-click on the Updates folder and select "Import Update Packages". |
4. | Right-click on the imported package and select Activate. |
5. | Reinstall the system policy to take the changes into use. Custom policies may require manual updating. |