Release notes for update package 1370-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday July 22, 2021
MD5 CHECKSUM:    9da5cd7042517547f0e854efbb14959d
SHA1 CHECKSUM:    dccea2a7a9b1f0434d105cca1ee5ebb7fef05a50
SHA256 CHECKSUM:    f252f4c1d0d7a1af8f1fa61539a8bdc8ff501a165487e0b5cb3109db40ea0fd5

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in ISC BIND detected.     CVE-2020-8620     ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS
High     An attempt to exploit a vulnerability in Nginx DNS Resolver detected.     CVE-2021-23017     Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow
High     An attempt to exploit a vulnerability in Jenkins Extra Columns Plugin detected     CVE-2021-21630     Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Apache Software Foundation Spark detected     CVE-2020-9480     Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution
High     An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader     CVE-2021-28640     Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free
High     An attempt to exploit a vulnerability in Adobe Systems Acrobat Reader     CVE-2021-28635     Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free
Low     An attempt to exploit a vulnerability in Microsoft Windows Server detected.     CVE-2020-0856     Microsoft-Windows-ADIDNS-Information-Disclosure

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

DNS UDP Server Message

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow CVE-2021-23017 DNS-UDP_Nginx-DNS-Resolver-Off-By-One-Heap-Buffer-Overflow Suspected Compromise

DNS TCP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS CVE-2020-8620 DNS-TCP_ISC-BIND-TCP-Receive-Buffer-Length-Assertion-DoS Suspected Compromise

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution CVE-2020-9480 Generic_CS-Apache-Spark-Auth-enabled-Standalone-Master-Command-Execution Suspected Compromise

LDAP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Microsoft-Windows-ADIDNS-Information-Disclosure CVE-2020-0856 LDAP_CS-Microsoft-Windows-ADIDNS-Information-Disclosure Potential Disclosure

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting CVE-2021-21630 HTTP_CRL-Jenkins-Extra-Columns-Plugin-Stored-Cross-Site-Scripting Suspected Compromise

PDF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free CVE-2021-28640 File-PDF_Adobe-Acrobat-Reader-Dc-Escript.api-Thermometer-Object-Use-After-Free Suspected Compromise
High Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free CVE-2021-28635 File-PDF_Adobe-Acrobat-And-Acrobat-Reader-Dc-Acroform-Addfield-Use-After-Free Potential Compromise

Updated detected attacks:

LDAP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664 CVE-2020-0664 LDAP_CS-Microsoft_Windows_Memory_Corruption_Vulnerability_CVE-2020-0664 Compromise
Description has changed

MSRPC Client Payload Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527 CVE-2021-34527 MSRPC-TCP_CPS-Microsoft-Windows-Print-Spooler-RCE-CVE-2021-34527 Suspected Compromise
Fingerprint regexp changed

SMB Server Header Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Low Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 CVE-2021-28325 SMB-TCP_SHS-Microsoft-Windows-SMB-Information-Disclosure-Vulnerability-CVE-2021-28325 Potential Disclosure
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryApache Spark

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for westus2
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON sa-east-1
IPListAmazon AMAZON us-west-1
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureFrontDoor_Frontend
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure service for Storage
IPListMicrosoft Azure datacenter for eastusslv
IPListMicrosoft Azure datacenter for usstagee
IPListMicrosoft Azure datacenter for swedencentral
IPListMicrosoft Azure datacenter for swedensouth
IPListMicrosoft Azure datacenter for qatarcentral

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.