Release notes for update package 1374-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday August 05, 2021
MD5 CHECKSUM:    8919e3256c57b599feff76655e5b53a0
SHA1 CHECKSUM:    67624f76ec302ac56408e955f8795acd3f2ee16e
SHA256 CHECKSUM:    50b117d814a25bc9feb96a5a82fe06ab6f0aa2250a8c8061530491fb51f85199

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Advantech iView detected     CVE-2021-32932     Advantech-Iview-Setdeviceauthentication-SQL-Injection
High     An attempt to exploit a vulnerability in Dasan GPON routers detected     CVE-2018-10562     Dasan-GPON-Router-Command-Injection
High     Orcus RAT infection traffic was detected     No CVE/CAN Orcus-RAT-Infection-Traffic
High     Orcus RAT infection traffic was detected     No CVE/CAN Orcus-RAT-Infection-Traffic

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Advantech-Iview-Setdeviceauthentication-SQL-Injection CVE-2021-32932 HTTP_CRL-Advantech-Iview-Setdeviceauthentication-SQL-Injection Suspected Compromise
High Dasan-GPON-Router-Command-Injection CVE-2018-10562 HTTP_CRL-Dasan-GPON-Router-Command-Injection Suspected Compromise

TLS Server Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Orcus-RAT-Infection-Traffic No CVE/CAN TLS_SS-Orcus-RAT-Infection-Traffic Suspected Botnet

TLS SNI Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Orcus-RAT-Infection-Traffic No CVE/CAN TLS-SNI_Orcus-RAT-Infection-Traffic Suspected Botnet

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass No CVE/CAN HTTP_CS-Novell-Sentinel-Log-Manager-Retention-Policy-Security-Restriction-Bypass Suspected Compromise
Fingerprint regexp changed
High Phpmyadmin-Tbl_replace.php-Local-File-Inclusion CVE-2018-19968 HTTP_CS-Phpmyadmin-Tbl_replace.php-Local-File-Inclusion Suspected Compromise
Fingerprint regexp changed
High Vidar-Malware-Infection-Traffic No CVE/CAN HTTP_CS-Vidar-Malware-Infection-Traffic Suspected Botnet
Fingerprint regexp changed
High HuntBar No CVE/CAN HTTP_CS-HuntBar-SiteReview Spyware, Malware and Adware
Fingerprint regexp changed
Low AOL-Instant-Messenger-Usage No CVE/CAN HTTP_CS-AOL-Instant-Messenger-Usage Instant Messaging
Fingerprint regexp changed

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow CVE-2008-2928 HTTP_CSH-Red-Hat-Directory-Server-Accept-Language-Parsing-Buffer-Overflow Suspected Compromise
Fingerprint regexp changed
Low HTTP-Browser-Usage No CVE/CAN HTTP_CSH-Windows-WebDAV-Access Possibly Unwanted Content
Fingerprint regexp changed
Critical Php-Nuke-Referer-SQL-Injection CVE-2007-1061 HTTP_CSH-SQL-Injection-In-Referer-Header-Field Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High ThinkPHP-RCE-Vulnerability-CVE-2018-20062 CVE-2018-20062 HTTP_CRL-ThinkPHP-RCE-Vulnerability-CVE-2018-20062 Suspected Compromise
Fingerprint regexp changed
High Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution CVE-2017-12629 HTTP_CRL-Apache-Solr-Xmlparser-XML-External-Entity-Expansion-Remote-Code-Execution Suspected Compromise
Fingerprint regexp changed
High Imperva-SecureSphere-Pws-Command-Injection No CVE/CAN HTTP_CRL-Imperva-SecureSphere-Pws-Command-Injection Suspected Compromise
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow CVE-2018-18993 File-Text_Omron-Cx-One-Cx-Position-Cdmapi32-Stack-Based-Buffer-Overflow Suspected Compromise
Fingerprint regexp changed
High Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading CVE-2011-2980 File-Text_Mozilla-Firefox-And-Thunderbird-Sensor.dll-Insecure-Library-Loading Potential Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryDasan GPON
IPListMicrosoft Azure datacenter for brazilne
IPListMicrosoft Azure datacenter for easteurope
IPListMicrosoft Azure datacenter for northeurope2
SituationHTTP_SHS-Suspicious-Partial-Data-Request-From-Server
SituationFile-Text_Suspicious-Rfc822-Response-From-Server
ApplicationOneTrust
ApplicationGoogle-Workspace
Element Ref135
Element Ref139
Element Ref141
Element Ref143
Element Ref145
Element Ref147
Element Ref149
Element Ref151
Element Ref153
Element Ref155
Element Ref157
Element Ref159
Element Ref161
Element Ref163
Element Ref165

Updated objects:

TypeNameChanges
IPListRwanda
IPListSomalia
IPListYemen
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListSyria
IPListArmenia
IPListKenya
IPListDR Congo
IPListDjibouti
IPListUganda
IPListCentral African Republic
IPListSeychelles
IPListJordan
IPListLebanon
IPListKuwait
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEthiopia
IPListEritrea
IPListEgypt
IPListSudan
IPListGreece
IPListBurundi
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListÅland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListZimbabwe
IPListZambia
IPListComoros
IPListMalawi
IPListLesotho
IPListBotswana
IPListMauritius
IPListEswatini
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListMozambique
IPListMadagascar
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListTurkmenistan
IPListTajikistan
IPListSri Lanka
IPListBhutan
IPListIndia
IPListMaldives
IPListBritish Indian Ocean Territory
IPListNepal
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListPalau
IPListVietnam
IPListThailand
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListMacao
IPListCambodia
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListCook Islands
IPListEast Timor
IPListRussia
IPListMongolia
IPListAustralia
IPListMarshall Islands
IPListFederated States of Micronesia
IPListPapua New Guinea
IPListSolomon Islands
IPListTuvalu
IPListNauru
IPListVanuatu
IPListNew Caledonia
IPListNorfolk Island
IPListNew Zealand
IPListFiji
IPListLibya
IPListCameroon
IPListSenegal
IPListCongo Republic
IPListPortugal
IPListLiberia
IPListIvory Coast
IPListGhana
IPListEquatorial Guinea
IPListNigeria
IPListBurkina Faso
IPListTogo
IPListGuinea-Bissau
IPListMauritania
IPListBenin
IPListGabon
IPListSierra Leone
IPListSão Tomé and Príncipe
IPListGibraltar
IPListGambia
IPListGuinea
IPListChad
IPListNiger
IPListMali
IPListTunisia
IPListSpain
IPListMorocco
IPListMalta
IPListAlgeria
IPListFaroe Islands
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListPrincipality of Monaco
IPListFrance
IPListLiechtenstein
IPListJersey
IPListIsle of Man
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListNamibia
IPListCabo Verde
IPListGuyana
IPListFrench Guiana
IPListSuriname
IPListSaint Pierre and Miquelon
IPListGreenland
IPListParaguay
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListCuba
IPListMartinique
IPListBahamas
IPListBermuda
IPListTrinidad and Tobago
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListTurks and Caicos Islands
IPListAruba
IPListBritish Virgin Islands
IPListSaint Vincent and the Grenadines
IPListMontserrat
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListHaiti
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListFrench Polynesia
IPListKiribati
IPListTonga
IPListWallis and Futuna
IPListSamoa
IPListNiue
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListSouth Sudan
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListSpotify
IPListAmazon S3
IPListAmazon EC2
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListAmazon GLOBALACCELERATOR
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-southeast-1
IPListAmazon EC2 ap-southeast-1
IPListAmazon AMAZON eu-west-2
IPListAmazon EC2 eu-west-2
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-east-2
IPListAmazon S3 us-east-2
IPListAmazon AMAZON us-west-1
SituationHTTP_CS-Breakingpoint-Generated-HTTP-Request-Message
SituationHTTP_CSH-Shared-Variables
Fingerprint regexp changed
SituationHTTP_CS-Shared-Variables-For-Client-Stream-Context
Fingerprint regexp changed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.