Release notes for update package 1339-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Wednesday April 14, 2021
MD5 CHECKSUM:    2630850fd08a6b31b2f5cd0e01895f15
SHA1 CHECKSUM:    2085f0647fc1471a8fd476ba0f3ea96693da5ca9
SHA256 CHECKSUM:    cdfe3d4d60b3f17dfd12a4d1cfca6c76ae205e36b3eb5e484102491d622f66b7

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     Information disclosure from SMB server     CVE-2021-28324     Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324
Low     An attempt to exploit an information dislosure vulnerability detected     CVE-2021-28325     Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

SMB Server Header Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324 CVE-2021-28324 SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28324 Suspected Disclosure
Low Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 CVE-2021-28325 SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 Potential Disclosure

Updated detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow CVE-2014-0787 Generic_CS-WellinTech-Kingscada-Kxnetdispose-Stack-Buffer-Overflow Suspected Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High HomeMatic-CCU2-RCE CVE-2018-7297 HTTP_CRL-HomeMatic-CCU2-RCE Suspected Compromise
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow CVE-2018-8210 File-Binary_Microsoft-Windows-Wimgapi-Readintegrityinfo-Heap-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption CVE-2008-3021 File-Binary_Microsoft-Office-Pict-Filter-Map-Structure-Memory-Corruption Potential Compromise
Detection mechanism updated
High Microsoft-Outlook-Out-Of-Bounds-Vulnerability-CVE-2018-8587 CVE-2018-8587 File-Binary_Microsoft-Outlook-Rwz-CVE-2018-8587-Integer-Overflow Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMS2021-04
IPListAmazon WORKSPACES_GATEWAYS us-gov-west-1
SituationSMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Unsupported
SituationSMB-TCP_CHS-SMB3-Negotiate-Chained-Compression-Supported

Updated objects:

TypeNameChanges
IPListAmazon AMAZON ap-south-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-west-2
IPListAmazon AMAZON ap-southeast-1
IPListBotnet IP Address List
IPListNetflix Servers
IPListAmazon WORKSPACES_GATEWAYS
IPListTOR relay nodes IP Address List
IPListAmazon EC2
IPListAkamai Servers
IPListAmazon AMAZON eu-west-1
IPListMalicious Site IP Address List
IPListAmazon AMAZON eu-central-1
IPListAmazon AMAZON us-east-1
IPListAmazon AMAZON ap-southeast-2
IPListAmazon AMAZON ap-northeast-3
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON ap-northeast-1
IPListAmazon AMAZON
IPListCloudflare Servers
IPListGoogle Servers
SituationFile-Name_Shared-Variables

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.