Release notes for update package 1340-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday April 20, 2021
MD5 CHECKSUM:    99e66e9a99f27c20cac21a6c54abbfd9
SHA1 CHECKSUM:    271b6702b40b8b0c3894390b7aae0434d04343e1
SHA256 CHECKSUM:    7c7488cbb8742387244e52149d1fda43f87617e2835a2eb3cd15979eefdd346d

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Wordpress AIT CSV Import/Export plugin detected     No CVE/CAN Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE
High     An attempt to exploit a vulnerability in Wordpress Drag And Drop Plugin detected     CVE-2020-12800     Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE
High     An attempt to exploit a vulnerability in WordPress Simple File List Plugin detected     No CVE/CAN Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE
High     An attempt to exploit a vulnerability in Zivif Cameras detected     CVE-2017-17105     Zivif-Camera-iptest.cgi-Blind-RCE
High     An attempt to exploit a vulnerability in VMware vCenter Server detected     CVE-2021-21972     VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972
High     An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected     CVE-2021-25297     Nagios-XI-Configwizards-Switch-Command-Injection
High     An attempt to exploit a vulnerability in Apache Software Foundation Druid detected     CVE-2021-26919     Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution
High     An attempt to exploit a vulnerability in ZenTao Pro detected     CVE-2020-7361     ZenTao-Pro-Remote-Code-Execution
High     An attempt to exploit a vulnerability in VMWare Cloud Foundation detected     CVE-2021-21975     VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE No CVE/CAN HTTP_CS-Wordpress-AIT-CSV-Import-Export-Unauthenticated-RCE Suspected Compromise
High Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE CVE-2020-12800 HTTP_CS-Wordpress-Drag-And-Drop-Multi-File-Uploader-RCE Suspected Compromise
High Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE No CVE/CAN HTTP_CS-Wordpress-Simple-File-List-Plugin-Unauthenticated-RCE Suspected Compromise
High Zivif-Camera-iptest.cgi-Blind-RCE CVE-2017-17105 HTTP_CS-Zivif-Camera-iptest.cgi-Blind-RCE Suspected Compromise
High VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972 CVE-2021-21972 HTTP_CS-VMware-Vcenter-Server-Remote-Code-Execution-CVE-2021-21972 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Nagios-XI-Configwizards-Switch-Command-Injection CVE-2021-25297 HTTP_CRL-Nagios-XI-Configwizards-Switch-Command-Injection Suspected Compromise
High Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution CVE-2021-26919 HTTP_CRL-Apache-Druid-JDBC-Connection-Properties-Remote-Code-Execution Suspected Compromise
High ZenTao-Pro-Remote-Code-Execution CVE-2020-7361 HTTP_CRL-ZenTao-Pro-Remote-Code-Execution Suspected Compromise
High VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery CVE-2021-21975 HTTP_CRL-VMware-Vrealize-Operations-Manager-API-Server-Side-Request-Forgery Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write CVE-2021-27065 HTTP_CS-Microsoft-Exchange-CVE-2021-27065-Arbitrary-File-Write Suspected Compromise
Detection mechanism updated

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High VMware-View-Planner-Logupload-Directory-Traversal CVE-2021-21978 HTTP_CRL-VMware-View-Planner-Logupload-Directory-Traversal Suspected Compromise
Fingerprint regexp changed

SMB Server Header Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Low Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 CVE-2021-28325 SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 Potential Disclosure
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryZivif Camera
CategoryZenTao Pro
CategoryWordPress Simple File List Plugin
CategoryWordpress Drag And Drop Plugin
CategoryWordpress AIT CSV Import Export plugin
CategoryVMWare vRealize Operations Manager
SituationSystem_Stop-Inspection
SituationHTTP2_Max-Frame-Size-Exceeded
SituationFTP-Validation-Succeeded
Situation ContextHTTP Host

Updated objects:

TypeNameChanges
IPListÅland
IPListBulgaria
IPListMauritius
IPListIceland
IPListIndia
IPListBurkina Faso
IPListGuinea-Bissau
IPListCyprus
IPListFrance
IPListAmazon API_GATEWAY eu-central-1
IPListSint Maarten
IPListSouth Korea
IPListCosta Rica
IPListBelgium
IPListTanzania
IPListLebanon
IPListBotswana
IPListTurkey
IPListHeard Island and McDonald Islands
IPListLiberia
IPListMongolia
IPListRéunion
IPListSlovakia
IPListUkraine
IPListKenya
IPListBotnet IP Address List
IPListGuernsey
IPListUnited States
IPListLithuania
IPListGermany
IPListEstonia
IPListCameroon
IPListAmazon API_GATEWAY ap-east-1
IPListBouvet Island
IPListCanada
IPListSt Kitts and Nevis
IPListBarbados
IPListBolivia
IPListTOR relay nodes IP Address List
IPListSouth Africa
IPListU.S. Virgin Islands
IPListEast Timor
IPListSaint Martin
IPListCambodia
IPListCayman Islands
IPListArgentina
IPListPoland
IPListPapua New Guinea
IPListJapan
IPListMexico
IPListPortugal
IPListUganda
IPListParaguay
IPListMayotte
IPListPeru
IPListTunisia
IPListLatvia
IPListLuxembourg
IPListVenezuela
IPListHonduras
IPListIndonesia
IPListUnited Arab Emirates
IPListSpain
IPListPuerto Rico
IPListGuadeloupe
IPListNigeria
IPListThailand
IPListMalicious Site IP Address List
IPListAmazon API_GATEWAY ap-northeast-1
IPListItaly
IPListEcuador
IPListSudan
IPListSouth Georgia and the South Sandwich Islands
IPListBrazil
IPListDominica
IPListAlbania
IPListMicrosoft Intune IP Address List
IPListEgypt
IPListPanama
IPListIsrael
IPListRussia
IPListChile
IPListAustria
IPListAntarctica
IPListHungary
IPListGreece
IPListHaiti
IPListSerbia
IPListGeorgia
IPListPakistan
IPListAngola
IPListKyrgyzstan
IPListFinland
IPListDominican Republic
IPListSaint Lucia
IPListIran
IPListNiger
IPListCocos [Keeling] Islands
IPListBahamas
IPListBonaire, Sint Eustatius, and Saba
IPListSwitzerland
IPListBangladesh
IPListBelarus
IPListOman
IPListKuwait
IPListSlovenia
IPListChristmas Island
IPListFrench Southern Territories
IPListKazakhstan
IPListMartinique
IPListRomania
IPListJamaica
IPListTOR exit nodes IP Address List
IPListHong Kong
IPListCroatia
IPListKosovo
IPListDR Congo
IPListSaint Vincent and the Grenadines
IPListIraq
IPListSweden
IPListFrench Guiana
IPListUnited Kingdom
IPListSingapore
IPListGhana
IPListJordan
IPListIreland
IPListNepal
IPListVietnam
IPListJersey
IPListChina
IPListZimbabwe
IPListNetherlands
IPListBenin
IPListBosnia and Herzegovina
IPListTaiwan
IPListNamibia
IPListAustralia
IPListZambia
IPListBritish Virgin Islands
IPListSaint Barthélemy
IPListArmenia
IPListCentral African Republic
IPListFaroe Islands
IPListMontenegro
IPListQatar
IPListDenmark
IPListAmazon API_GATEWAY
IPListColombia
IPListAntigua and Barbuda
IPListNorway
IPListUruguay
IPListGuam
IPListNew Zealand
IPListMalaysia
IPListMoldova
IPListCzechia
IPListBrunei
IPListAmazon API_GATEWAY ap-northeast-3
IPListAfghanistan
IPListPalestine
IPListPhilippines
IPListSan Marino
IPListSeychelles
IPListAmerican Samoa
IPListSaudi Arabia
IPListNorthern Mariana Islands
IPListLiechtenstein
SituationHTTP_CSU-Shared-Variables
Situation Context GroupHTTP

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.