Release notes for update package 1382-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday August 31, 2021
MD5 CHECKSUM:    b13bc612152b5347401bb68aca87fc23
SHA1 CHECKSUM:    4aa03fa02e214dcab304b0f30bead44783fcafde
SHA256 CHECKSUM:    6073cbef2470fada3605b790965949676160592c296e47906d51e52c826f1f5c

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     Vjw0rm malware infection traffic detected     No CVE/CAN Vjw0rm-Malware-Infection-Traffic
High     Obfuscated JavaScript Detected     No CVE/CAN JavaScript-Obfuscation
High     An attempt to exploit a vulnerability in Flarum detected     CVE-2021-32671     Flarum-Core-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Advantech R-SeeNet detected     CVE-2021-21800     Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Flarum detected     CVE-2021-32671     Flarum-Core-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Oracle Business Intelligence Enterprise Edition detected     CVE-2021-2401     Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Vjw0rm-Malware-Infection-Traffic No CVE/CAN HTTP_CS-Vjw0rm-Malware-Infection-Traffic Suspected Botnet

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting CVE-2021-21800 HTTP_CRL-Advantech-r-Seenet-SSH_Form-Cross-Site-Scripting Suspected Compromise
High Flarum-Core-Cross-Site-Scripting CVE-2021-32671 HTTP_CRL-Flarum-Core-Cross-Site-Scripting Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High JavaScript-Obfuscation No CVE/CAN File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected-2 Potential Compromise
High Flarum-Core-Cross-Site-Scripting CVE-2021-32671 File-Text_Flarum-Core-Cross-Site-Scripting Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection CVE-2021-2401 File-TextId_Oracle-Business-Intelligence-CVE-2021-2401-Xdo-Xml-External-Entity-Injection Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Maze-Ransomware-Traffic No CVE/CAN HTTP_CS-Maze-Ransomware-Traffic Potential Botnet
Detection mechanism updated

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Memcached-Process_Bin_Append_Prepend-Integer-Overflow CVE-2016-8704 Generic_CS-Memcached-Process_Bin_Append_Prepend-Integer-Overflow Suspected Compromise
Fingerprint regexp changed
High AveMaria-Stealer-C2-Traffic No CVE/CAN Generic_CS-AveMaria-Stealer-C2-Traffic Suspected Botnet
Description has changed

TFTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload CVE-2018-15379 TFTP_CS-Cisco-Prime-Infrastructure-Swimtemp-TFTP-Arbitrary-File-Upload Suspected Compromise
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High JavaScript-Obfuscation No CVE/CAN File-Text_QZX-Obfuscated-Malicious-JavaScript-Detected Suspected Compromise
Fingerprint regexp changed
High Generic-HTTP-Exploit No CVE/CAN File-Text_Suspicious-Text-File Suspected Compromise
Detection mechanism updated
High Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error CVE-2015-2092 File-Text_Agilent-Technologies-Feature-Extraction-ActiveX-Index-Boundary-Error Suspected Compromise
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Pear-Archive-Tar-CVE-2021-32610-Symbolic-Link-Handling-Arbitrary-File-Write CVE-2021-32610 File-Binary_Pear-Archive-Tar-CVE-2021-32610-Symbolic-Link-Handling-Arbitrary-File-Write Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryFlarum
IPListTwilio SIP
IPListTwilio media

Updated objects:

TypeNameChanges
IPListRwanda
IPListIraq
IPListIran
IPListCyprus
IPListSyria
IPListArmenia
IPListKenya
IPListDR Congo
IPListUganda
IPListSeychelles
IPListJordan
IPListKuwait
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListMoldova
IPListFinland
IPListÅland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListMalawi
IPListRéunion
IPListSouth Africa
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListIndia
IPListNepal
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListMongolia
IPListAustralia
IPListChristmas Island
IPListPapua New Guinea
IPListVanuatu
IPListNew Zealand
IPListCameroon
IPListPortugal
IPListGhana
IPListNigeria
IPListSpain
IPListMalta
IPListAlgeria
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListPrincipality of Monaco
IPListFrance
IPListAndorra
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListBarbados
IPListFrench Guiana
IPListParaguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListBahamas
IPListBermuda
IPListAnguilla
IPListSt Kitts and Nevis
IPListAntigua and Barbuda
IPListSaint Lucia
IPListAruba
IPListBritish Virgin Islands
IPListGuadeloupe
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListTonga
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListTOR exit nodes IP Address List
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListAmazon EC2 eu-south-2
IPListBotnet IP Address List
IPListMalicious Site IP Address List
SituationHTTP_CSU-Shared-Variables
SituationFile-Text_QZX-Obfuscated-JavaScript-Detected-2
Category tag situation Obsolete added
Category tag os Any Operating System removed
Category tag hardware Any Hardware removed
Category tag application Generic HTTP client removed
Category tag os_not_specific Any Operating System not specific removed
Category tag application_not_specific Generic HTTP client not specific removed
Category tag situation Suspected Attack Related Anomalies removed
Category tag group Anomalies removed
Category tag group Severity over 4 Correlation Dependency Group removed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.