Release notes for update package 1419-5242

Rolling DFA upgrades

Starting from dynamic update 1393, the handling of situations appearing in multiple contexts is improved. To avoid the same traffic data to be matched against multiple DFA's, all DFA's are being modified. When large number of DFAs change at the same time, the temporary memory requirement during a policy installation or refresh increases. To avoid not enough available memory on low end NGFW appliances these changes on DFA's are implemented gradually over the course of 10 dynamic update packages. With low end NGFW appliances, especially N110 and N115, it is recommended to upgrade to NGFW version 6.8.2 or higher to better address new policy when there is not enough memory for both old and new policy. A large number of DFAs might change at the same time if there is a large gap between activating dynamic update packages and the subsequent policy refresh.

See knowledge base article 18570.

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday December 20, 2021
MD5 CHECKSUM:    54e8d7ec9f92ca3b130fd31160e9ef02
SHA1 CHECKSUM:    68d85a69c6bc803e6b8dc934c91a83d31bd47b90
SHA256 CHECKSUM:    d00999947cef8aca1cf2949fb1e35a6ae5eca41ef1ec6457c3c33c106fb10fdf

UPDATE CRITICALITY:    CRITICAL

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
Critical     A PDF file with log4j exploit was detected     CVE-2021-44228     Log4j-Remote-Code-Execution
High     An attempt to exploit a vulnerability in WordPress Project Download Manager Plugin for WordPress detected     CVE-2021-24773     Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Mongo Express detected     CVE-2019-10758     Mongo-Express-Remote-Code-Execution-CVE-2019-10758
High     An attempt to exploit a vulnerability in Fuel CMS detected     CVE-2020-17463     Fuel-CMS-SQL-Injection-CVE-2020-17463
High     An attempt to exploit a vulnerability in Apache Software Foundation Storm detected     CVE-2021-38294     Apache-Storm-Gettopologyhistory-Command-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Storm-Gettopologyhistory-Command-Injection CVE-2021-38294 Generic_CS-Apache-Storm-Gettopologyhistory-Command-Injection Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting CVE-2021-24773 HTTP_CRL-Wordpress-Download-Manager-Plugin-Attach-File-Stored-Cross-Site-Scripting Suspected Compromise
High Mongo-Express-Remote-Code-Execution-CVE-2019-10758 CVE-2019-10758 HTTP_CRL-Mongo-Express-Remote-Code-Execution-CVE-2019-10758 Suspected Compromise
High Fuel-CMS-SQL-Injection-CVE-2020-17463 CVE-2020-17463 HTTP_CRL-Fuel-CMS-SQL-Injection-CVE-2020-17463 Suspected Compromise

PDF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Critical Log4j-Remote-Code-Execution CVE-2021-44228 File-PDF_Log4j-Remote-Code-Execution Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Log4j-Remote-Code-Execution CVE-2021-44228 HTTP_CS_Log4j-Remote-Code-Execution Compromise
Category tag situation Compromise added
Category tag situation Suspected Compromise removed
Fingerprint regexp changed
Critical Log4j-Remote-Code-Execution CVE-2021-44228 HTTP_CS_Log4j-Remote-Code-Execution-Evasion Suspected Compromise
Fingerprint regexp changed

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Log4j-Remote-Code-Execution CVE-2021-44228 Generic_CS-Log4j-Remote-Code-Execution Compromise
Category tag situation Compromise added
Category tag situation Suspected Compromise removed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Log4j-Remote-Code-Execution CVE-2021-44228 HTTP_CRL-Log4j-Remote-Code-Execution Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMongo Express
CategoryApache Storm
CategoryFuel CMS
SituationIpsfp_Debug-Matcher-created
SituationIpsfp_Debug-Matcher-cloned
SituationIpsfp_Debug-Matcher-deleted
SituationIpsfp_Debug-New-data
SituationIpsfp_Debug-Assertion
SituationIpsfp_Debug-Missing-data
SituationIpsfp_Debug-Matcher-serialized
SituationIpsfp_Debug-Matcher-deserialized
SituationProtoId_gQUIC
ApplicationQUIC

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListTOR relay nodes IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON me-south-1
ApplicationgQUIC
Name: QUIC->gQUIC
Comment has changed
Description has changed
Application detection context content changed
Application Port "udp/80 tls: no" removed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.