Release notes for update package 1261-5242

Important notice regarding low end appliances

The update package 1258 introduced changes to all DFA files. This change requires a heightened amount of memory during a policy install or policy refresh on the NGFW engine. On appliances with only 2 GB memory (N110, N115 and FW-315) this may lead to the memory running out during a policy install or policy refresh, resulting in a failed policy upload with errno 137. In rare circumstances, also appliances with 4 GB memory (e.g. N330, N325) may experience the same problem if they are operating near their performance limits concerning concurrent connections and / or have large VPN configuration.

If the previous active dynamic update package is below 1258, activating update package 1258 or any more recent update package may trigger the issue.

For more information and mitigation steps, see knowledge base article 18570.

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Wednesday July 08, 2020
MD5 CHECKSUM:    e14ebd4002d06fd7e3a1d63820d15d53
SHA1 CHECKSUM:    8d4a11aa6d72659ef03708c45d6b0cc7a6a8d812
SHA256 CHECKSUM:    304f6f4ff193ce659292a2103e3734d712926e0c6ecc3517cd6e8474355b49c6

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    5.10.1.10027
- Forcepoint NGFW:    5.5.1.9848

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit an F5 Networks Big-IP TMUI Remote Code Execution vulnerability detected.     CVE-2020-5902     F5-Networks-Big-IP-TMUI-Remote-Code-Execution-CVE-2020-5902
High     An attempt to exploit a vulnerability in HP Intelligent Management Center detected     No CVE/CAN HPE-IMC-Devgroupselect-Expression-Language-Injection
High     An attempt to exploit a vulnerability in Cisco Systems Data Center Network Manager detected     CVE-2019-15981     Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal
High     An attempt to exploit a vulnerability in Telerik UI     CVE-2019-18935     Telerik-UI-Insecure-Deserialization-CVE-2019-18935
High     An attempt to exploit a vulnerability in Nitro PDF Nitro Pro detected     CVE-2020-6092     Nitro-Pro-PDF-Pattern-Object-Integer-Overflow

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High F5-Networks-Big-IP-TMUI-Remote-Code-Execution-CVE-2020-5902 CVE-2020-5902 HTTP_CRL-F5-Networks-Big-IP-TMUI-Remote-Code-Execution-CVE-2020-5902 Suspected Compromise
High HPE-IMC-Devgroupselect-Expression-Language-Injection No CVE/CAN HTTP_CRL-HPE-IMC-Devgroupselect-Expression-Language-Injection Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Telerik-UI-Insecure-Deserialization-CVE-2019-18935 CVE-2019-18935 File-Text_Telerik-UI-Insecure-Deserialization-CVE-2019-18935 Suspected Compromise

PDF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Nitro-Pro-PDF-Pattern-Object-Integer-Overflow CVE-2020-6092 File-PDF_Nitro-Pro-PDF-Pattern-Object-Integer-Overflow Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal CVE-2019-15981 File-TextId_Cisco-Data-Center-Network-Manager-Readconfigfileasxml-Directory-Traversal Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High rConfig-Compliancepolicies.PHP-SQL-Injection CVE-2020-10546 HTTP_CRL-rConfig-Compliancepolicies-Snippets.PHP-SQL-Injection Suspected Compromise
Fingerprint regexp changed
Low Generic-Shared-Variables No CVE/CAN HTTP_CRL-Shared-Variables System Inspections
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High VBScript-In-Insecure-Frameworks No CVE/CAN File-Text_VBScript-In-Bo-Bbs Potential Compromise
Fingerprint regexp changed
High File-Text_Suspicious_Inline_Iframe_Element No CVE/CAN File-Text_Suspicious_Inline_Iframe_Element-1 Suspected Attack Related Anomalies
Fingerprint regexp changed
High JavaScript-ShellCode-Generation No CVE/CAN File-Text_JavaScript-ShellCode-Generation Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
FilterWeb Application Events
FilterAction Negated Allow or Permit and Inspection Facility
FilterEvasive Application Events
FilterEvasive Attacks
FilterProtocol Events
FilterHigh Risk Web Events
FilterMalicious Files
FilterHigh Risk User Events
FilterVulnerabilities without CVE

Updated objects:

TypeNameChanges
FilterLocal Evasive Attacks
FilterMalicious Internal Source
FilterLocal Action Negated Allow or Permit and Inspection Facility
FilterTop attacks by web host item filter
FilterLocal Evasive Application Events
FilterLocal High Risk User Events
FilterLocal Malicious Files
FilterLocal Protocol Events
FilterLocal Web Application Events
FilterLocal High Risk Web Events
FilterHigh or Critical Attacks
FilterLocal Excluding CVE
Report TemplateApplication and Web Security
SituationFile-Text_JavaScript-Function-Obfuscation
Fingerprint regexp changed
SituationFile-Text_Iframe-Src-From-IP-Address
Fingerprint regexp changed

ACTIVATING THE UPDATE PACKAGE

  1. Ensure that the SHA256 checksum of the update package are correct.
  2. Open Admin Tools in the SMC GUI client.
  3. Right-click on the Updates folder and select "Import Update Packages".
  4. Right-click on the imported package and select Activate.
  5. Reinstall the system policy to take the changes into use. Custom policies may require manual updating.

DISCLAIMER AND COPYRIGHT

The information in this document is provided only for educational purposes and for the convenience of Forcepoint customers. The information contained herein is subject to change without notice, and is provided "AS IS" without guarantee or warranty as to the accuracy or applicability of the information to any specific situation, circumstance, or system configuration - use at your own risk. Forcepoint does not warrant or endorse any third-party products described herein.

Forcepoint™ is a trademark of Forcepoint, LLC. SureView®, ThreatSeeker®, Triton®, Sidewinder®, and Stonesoft® are registered trademarks of Forcepoint, LLC. Raytheon® is a registered trademark of Raytheon Company. All other trademarks and registered trademarks are the property of their respective owners.

Copyright © 2000-2020 Forcepoint LLC. All rights reserved.