Release notes for update package 1345-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Wednesday May 05, 2021
MD5 CHECKSUM:    033c37d37b6d949db60904545e084ed2
SHA1 CHECKSUM:    575147dbea440f56d6aee729fbb2237711704a85
SHA256 CHECKSUM:    5feadc72d1edfe758d85c5a77b0abcbcac56deb1cd33bba55d9aeb7438c404bc

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Nagios Enterprises Nagios XI detected     CVE-2020-35578     Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection
High     A cryptocoin miner     No CVE/CAN Coinminer-Trojan-Traffic
High     An attempt to exploit a vulnerability in WordPress Project WordPress detected     CVE-2021-29447     Wordpress-Core-External-Entity-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection CVE-2020-35578 HTTP_CS-Nagios-XI-Monitoringplugins-Do_Upload-Command-Injection Suspected Compromise

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Coinminer-Trojan-Traffic No CVE/CAN Generic_CS-Coinminer-Trojan-Traffic Potential Compromise

RIFF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Core-External-Entity-Injection CVE-2021-29447 File-RIFF_Wordpress-Core-External-Entity-Injection Suspected Compromise

Updated detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow No CVE/CAN Generic_CS-Novell-File-Reporter-Vol-Tag-Stack-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload CVE-2014-5005 Generic_CS-Manageengine-Desktop-Central-Statusupdate-Arbitrary-File-Upload Suspected Compromise
Fingerprint regexp changed
High IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal CVE-2015-1941 Generic_CS-IBM-Tivoli-Storage-Manager-Fastback-Server-Opcode-1329-Directory-Traversal Suspected Compromise
Fingerprint regexp changed
High Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization CVE-2017-15089 Generic_CS-Red-Hat-Jboss-Data-Grid-Hotrod-Client-Insecure-Deserialization Potential Compromise
Fingerprint regexp changed
High Zimbra-Collaboration-Server-Local-File-Inclusion CVE-2013-7091 Generic_CS-Zimbra-Collaboration-Server-Local-File-Inclusion Suspected Compromise
Fingerprint regexp changed
High Unitrends-UEB-bpserverd-Authentication-Bypass CVE-2017-12477 Generic_CS-Unitrends-UEB-bpserverd-Authentication-Bypass Suspected Compromise
Fingerprint regexp changed

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure CVE-2020-13953 HTTP_CSU_Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure Suspected Disclosure
Fingerprint regexp changed
High Php-Suspicious-Include-Parameter No CVE/CAN HTTP_CSU-Php-Suspicious-External-Parameter-Reference Potential Compromise
Fingerprint regexp changed
High Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure CVE-2018-14912 HTTP_URI-Cgit-Path-Parameter-Directory-Traversal-Information-Disclosure Suspected Compromise
Fingerprint regexp changed
High Tandberg-Video-Server-Directory-Traversal CVE-2009-4511 HTTP_CSU-Tandberg-Directory-Traversal-File-Disclosure Suspected Disclosure
Fingerprint regexp changed
High PHP-Remote-File-Inclusion No CVE/CAN HTTP_CSU-PHP-Remote-File-Inclusion Potential Compromise
Fingerprint regexp changed
High Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS CVE-2011-0419 HTTP_CSU-Apache-Apr-Apr_Fnmatch-Stack-Overflow-DOS Suspected Compromise
Fingerprint regexp changed
High HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass CVE-2017-5791 HTTP_CSU-HPE-Intelligent-Management-Center-Urlaccesscontroller-Authentication-Bypass Suspected Compromise
Fingerprint regexp changed
High Oracle-Secure-Backup-Command-Injection CVE-2008-5448 HTTP_CSU-Oracle-Secure-Backup-Command-Injection Suspected Compromise
Fingerprint regexp changed
High Apache-Struts-Wildcard-Matching-OGNL-Code-Execution CVE-2013-2134 HTTP_CSU-Apache-Struts-Suspicious-OGNL-Expression Suspected Compromise
Fingerprint regexp changed
High Navigate-CMS-Unauthenticated-Remote-Code-Execution CVE-2018-17553 HTTP_CSU-Navigate-CMS-Unauthenticated-Remote-Code-Execution Suspected Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure CVE-2013-5397 HTTP_CRL-IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure Suspected Compromise
Fingerprint regexp changed
High Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal CVE-2020-16245 HTTP_CRL-Advantech-Iview-Devicetreetable-exportInventoryTable-Directory-Traversal Suspected Compromise
Fingerprint regexp changed

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Apache-Axis-Soap-Array-Exhaustion CVE-2004-1815 File-TextId_Apache-Axis-Soap-Array-Exhaustion Potential Compromise
Name: Generic_CS-Apache-Axis-Soap-Array-Exhaustion->File-TextId_Apache-Axis-Soap-Array-Exhaustion
Description has changed
Category tag group TCP Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Context has changed from TCP Client Stream Unknown to Identified Text File Stream

LIST OF OTHER CHANGES:

New objects:

TypeName
SituationTCP_Option-Unsupported

Updated objects:

TypeNameChanges
IPListBulgaria
IPListMauritius
IPListIceland
IPListIndia
IPListGuinea-Bissau
IPListCyprus
IPListFrance
IPListSouth Korea
IPListAmazon AMAZON ap-south-1
IPListCosta Rica
IPListBelgium
IPListNiue
IPListTanzania
IPListLebanon
IPListTurkey
IPListAmazon AMAZON ap-southeast-1
IPListSlovakia
IPListUkraine
IPListKenya
IPListMorocco
IPListBotnet IP Address List
IPListUnited States
IPListLithuania
IPListBelize
IPListGermany
IPListEstonia
IPListCameroon
IPListBouvet Island
IPListCanada
IPListSt Kitts and Nevis
IPListNetflix Servers
IPListBarbados
IPListBolivia
IPListTOR relay nodes IP Address List
IPListSouth Africa
IPListEast Timor
IPListWhatsapp
IPListSaint Martin
IPListCambodia
IPListSaint Helena
IPListCayman Islands
IPListArgentina
IPListPoland
IPListPapua New Guinea
IPListJapan
IPListMexico
IPListPortugal
IPListParaguay
IPListMayotte
IPListPeru
IPListNorth Korea
IPListTunisia
IPListLatvia
IPListLuxembourg
IPListVenezuela
IPListAkamai Servers
IPListHonduras
IPListSvalbard and Jan Mayen
IPListTokelau
IPListBhutan
IPListIndonesia
IPListUnited Arab Emirates
IPListSpain
IPListPuerto Rico
IPListAmazon AMAZON eu-west-1
IPListGuadeloupe
IPListNigeria
IPListThailand
IPListMalicious Site IP Address List
IPListItaly
IPListNorth Macedonia
IPListEcuador
IPListLibya
IPListGuatemala
IPListSouth Georgia and the South Sandwich Islands
IPListBrazil
IPListAlbania
IPListEgypt
IPListPanama
IPListIsrael
IPListRussia
IPListChile
IPListAustria
IPListMyanmar
IPListAntarctica
IPListAmazon AMAZON ap-southeast-2
IPListHungary
IPListGreece
IPListYemen
IPListHaiti
IPListSerbia
IPListGeorgia
IPListPakistan
IPListAmazon CLOUDFRONT
IPListAngola
IPListKyrgyzstan
IPListFinland
IPListDominican Republic
IPListAmazon AMAZON sa-east-1
IPListSaint Lucia
IPListIran
IPListCocos [Keeling] Islands
IPListBahamas
IPListSwitzerland
IPListBangladesh
IPListNorfolk Island
IPListBelarus
IPListOman
IPListSlovenia
IPListChristmas Island
IPListFrench Southern Territories
IPListKazakhstan
IPListMartinique
IPListSolomon Islands
IPListRomania
IPListJamaica
IPListAmazon AMAZON eu-west-2
IPListTOR exit nodes IP Address List
IPListFalkland Islands
IPListUzbekistan
IPListHong Kong
IPListCroatia
IPListKosovo
IPListDR Congo
IPListIraq
IPListSweden
IPListFrench Guiana
IPListUnited Kingdom
IPListSingapore
IPListJordan
IPListIreland
IPListNepal
IPListAndorra
IPListVietnam
IPListJersey
IPListChina
IPListZimbabwe
IPListAmazon AMAZON
IPListNetherlands
IPListBenin
IPListBosnia and Herzegovina
IPListTaiwan
IPListNamibia
IPListAustralia
IPListZambia
IPListLogMeIn GoToMeeting Servers
IPListBritish Virgin Islands
IPListSaint Barthélemy
IPListArmenia
IPListSaint Pierre and Miquelon
IPListQatar
IPListDenmark
IPListColombia
IPListWallis and Futuna
IPListNorway
IPListFrench Polynesia
IPListGuam
IPListNew Zealand
IPListMalaysia
IPListMoldova
IPListGoogle Servers
IPListCook Islands
IPListPitcairn Islands
IPListCzechia
IPListTurks and Caicos Islands
IPListMicrosoft Office 365 Common and Office Online
IPListAfghanistan
IPListPhilippines
IPListSeychelles
IPListSaudi Arabia
IPListNorthern Mariana Islands
IPListLiechtenstein
SituationGeneric_CS-Shared-Variable-Fingerprints
Fingerprint regexp changed
SituationGeneric_CS-IBM-Rational-Focal-Point-Requestaccesscontroller-Servlet-Information-Disclosure
Description has changed
Category tag situation Obsolete added
Category tag os Any Operating System removed
Category tag hardware Any Hardware removed
Category tag application IBM Focal Point removed
Category tag group CVE2013 removed
Category tag os_not_specific Any Operating System not specific removed
Category tag situation Suspected Compromise removed
Category tag group TCP Correlation Dependency Group removed
Category tag group Severity over 4 Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Fingerprint regexp changed
SituationFile-TextId_Shared-Variables
Fingerprint regexp changed
SituationHTTP_CSU-Shared-Variables
SituationFile-Text_Directory-Traversal-To-Sensitive-Unix-File
Fingerprint regexp changed
SituationHTTP_CSU-Tedroo-Bot-Traffic
SituationGeneric_CS-IBM-Rational-Focal-Point-Login-Servlet-Information-Disclosure
Description has changed
Category tag situation Obsolete added
Category tag os Any Operating System removed
Category tag hardware Any Hardware removed
Category tag application IBM Focal Point removed
Category tag group CVE2013 removed
Category tag os_not_specific Any Operating System not specific removed
Category tag situation Suspected Compromise removed
Category tag group TCP Correlation Dependency Group removed
Category tag group Severity over 4 Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Fingerprint regexp changed
SituationFile-Name_Shared-Variables

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.