Release notes for update package 1335-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday April 01, 2021
MD5 CHECKSUM:    7be5d038bfbb317fc569b583bc63be74
SHA1 CHECKSUM:    c9f36f5a2dd05ddcac040bacb1e36b7c17fed359
SHA256 CHECKSUM:    f96340f70bc07c862a516f1546be44bc804f73aeec3dfaa66be0b31330d56b76

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    5.5.1.9848

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected     CVE-2021-26295     Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization CVE-2021-26295 HTTP_CRL-Apache-Ofbiz-CVE-2021-26295-Insecure-Deserialization Suspected Compromise

Updated detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect CVE-2011-3415 HTTP_CSU-Microsoft-ASP.NET-Forms-Authentication-Insecure-Redirect Suspected Compromise
Detection mechanism updated

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow CVE-2014-9205 HTTP_CSH-Microsys-PROMOTIC-Pmbase64decode-Buffer-Overflow Potential Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High HTTP-TWiki-Rev-Parameter-Command-Execution CVE-2005-2877 HTTP_CRL-TWiki-Rev-Parameter-Command-Execution Potential Compromise
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609 CVE-2019-0609 File-Text_Microsoft_Edge_Use_After_Free_Vulnerability_CVE-2019-0609 Suspected Compromise
Detection mechanism updated

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service CVE-2014-5266 File-TextId_Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service Suspected Compromise
Name: HTTP_CS-Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service->File-TextId_Drupal-Core-Xml-RPC-Endpoint-Xmlrpc.php-Tags-Denial-Of-Service
Description has changed
Category tag group HTTP Correlation Dependency Group removed
Category tag group TCP Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Context has changed from HTTP Client Stream to Identified Text File Stream

LIST OF OTHER CHANGES:

Updated objects:

TypeNameChanges
IPListAmazon DYNAMODB ap-southeast-3
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure service for LogicAppsManagement
IPListMicrosoft Azure service for CognitiveServicesManagement
IPListMicrosoft Azure service for AzureFrontDoor_Frontend
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure datacenter for uaenorth
IPListMicrosoft Azure datacenter for uaecentral
IPListMicrosoft Azure datacenter for australiacentral
IPListAmazon AMAZON ap-southeast-1
IPListBotnet IP Address List
IPListAmazon DYNAMODB
IPListMicrosoft Azure datacenter for southeastasia
IPListMicrosoft Azure datacenter for centralus
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centraluseuap
IPListMicrosoft Azure datacenter for koreasouth
IPListAmazon AMAZON eu-west-1
IPListMalicious Site IP Address List
IPListMicrosoft Azure datacenter for uksouth
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus
IPListAmazon AMAZON sa-east-1
IPListMicrosoft Azure datacenter for westus
IPListTOR exit nodes IP Address List
IPListAmazon DYNAMODB us-west-2
IPListMicrosoft Azure datacenter for westcentralus
IPListAmazon AMAZON
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for eastasia
IPListMicrosoft Azure datacenter for brazilsouth
IPListMicrosoft Azure datacenter for westus2
SituationE-Mail_Message-Id-Random
Category tag situation Other Suspicious Traffic added
Category tag group Anomalies added
Category tag situation Possibly Unwanted Content removed
SituationSMTP_Mail-From-User-Random
Category tag situation Other Suspicious Traffic added
Category tag group Anomalies added
Category tag situation Possibly Unwanted Content removed
SituationFLASH File
Category tag situation Other Suspicious Traffic added
Category tag situation Content Identification removed
TLSProfileDefault Update service TLS Profile

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.