Release notes for update package 1446-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday March 24, 2022
MD5 CHECKSUM:    dfee34c4c333e4cbec52c4ea7397b78f
SHA1 CHECKSUM:    744e2feebbc8fef49e2b8cebbc2eb96790bd06e6
SHA256 CHECKSUM:    23df8872201023128a53004c2adeaec4f023821aab1c88dc1a305b685bf227b2

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Oracle Access Manager detected     CVE-2021-35587     Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization
High     An attempt to exploit a vulnerability in Microweber detected.     No CVE/CAN Microweber-CMS-Local-File-Inclusion
High     An attempt to exploit a vulnerability in Firefox detected.     CVE-2020-26950     Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit
High     An attempt to exploit a vulnerability in the WordPress MasterStudy Plugin detected.     CVE-2022-0441     Wordpress-MasterStudy-Admin-Account-Creation
High     An attempt to exploit a vulnerability in VMWare Spring Cloud Gateway detected     CVE-2022-22947     VMware-Spring-Cloud-Gateway-Spel-Code-Injection
High     An attempt to exploit a vulnerability in Dolibarr ERP and CRM Suite detected     CVE-2022-0819     Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection
High     A vulnerability in OpenSSL detected.     CVE-2022-0778     OpenSSL-BN_Mod_sqrt-Infinite-Loop
High     A vulnerability in OpenSSL detected.     CVE-2022-0778     OpenSSL-BN_Mod_sqrt-Infinite-Loop
Low     An attempt to exploit a vulnerability in GitLab detected.     CVE-2021-4191     Gitlab-Graphql-API-User-Enumeration

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization CVE-2021-35587 HTTP_CS-Oracle-Access-Manager-Opensso-Agent-Insecure-Deserialization Suspected Compromise

HTTPS Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High OpenSSL-BN_Mod_sqrt-Infinite-Loop CVE-2022-0778 HTTPS_CS-OpenSSL-BN_Mod_sqrt-Infinite-Loop Suspected Denial of Service

HTTPS Server Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High OpenSSL-BN_Mod_sqrt-Infinite-Loop CVE-2022-0778 HTTPS_SS-OpenSSL-BN_Mod_sqrt-Infinite-Loop Suspected Denial of Service

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microweber-CMS-Local-File-Inclusion No CVE/CAN HTTP_CSU-Microweber-CMS-Local-File-Inclusion Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-MasterStudy-Admin-Account-Creation CVE-2022-0441 HTTP_CRL-Wordpress-MasterStudy-Admin-Account-Creation Suspected Compromise
High VMware-Spring-Cloud-Gateway-Spel-Code-Injection CVE-2022-22947 HTTP_CRL-VMware-Spring-Cloud-Gateway-Spel-Code-Injection Suspected Compromise
High Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection CVE-2022-0819 HTTP_CRL-Dolibarr-ERP-And-CRM-Suite-Menu-Editor-Dol_Eval-Code-Injection Suspected Compromise
Low Gitlab-Graphql-API-User-Enumeration CVE-2021-4191 HTTP_CRL-Gitlab-Graphql-API-User-Enumeration Potential Disclosure

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit CVE-2020-26950 File-Text_Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free-Exploit Potential Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Log4j-Remote-Code-Execution CVE-2021-44228 HTTP_CS_Log4j-Remote-Code-Execution-Evasion Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMicroweber
CategoryWordPress MasterStudy Plugin
CategoryVMWare Spring Cloud Gateway
CategoryOracle Access Manager
IPListLine Messenger IP Address List
SituationIP_Line_Messenger

Updated objects:

TypeNameChanges
IPListRwanda
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListKenya
IPListSeychelles
IPListJordan
IPListLebanon
IPListOman
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListGreece
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListBotswana
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListPakistan
IPListBangladesh
IPListTajikistan
IPListIndia
IPListMyanmar
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListNauru
IPListNew Zealand
IPListLibya
IPListPortugal
IPListGhana
IPListNigeria
IPListTogo
IPListGibraltar
IPListSpain
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListMontenegro
IPListCroatia
IPListAngola
IPListFrench Guiana
IPListUruguay
IPListBrazil
IPListDominican Republic
IPListMartinique
IPListBahamas
IPListAntigua and Barbuda
IPListSaint Lucia
IPListBritish Virgin Islands
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListBelize
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListHaiti
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListGuam
IPListU.S. Virgin Islands
IPListCanada
IPListUnited States
IPListSerbia
IPListSint Maarten
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListSpotify
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for centralfrance
IPListMicrosoft Azure datacenter for japaneast
IPListMicrosoft Azure datacenter for japanwest
IPListMicrosoft Azure datacenter for northcentralus
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListMicrosoft Azure service for AzureHealthcareAPIs
IPListMicrosoft Azure service for GenevaActions
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListMicrosoft Azure service for ApiManagement
IPListMicrosoft Azure service for AppConfiguration
IPListMicrosoft Azure service for AzureBackup
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureCosmosDB
IPListMicrosoft Azure service for AzureDataExplorerManagement
IPListMicrosoft Azure service for AzureDigitalTwins
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureResourceManager
IPListMicrosoft Azure service for CognitiveServicesManagement
IPListMicrosoft Azure service for GuestAndHybridManagement
IPListMicrosoft Azure service for HDInsight
IPListMicrosoft Azure service for SqlManagement
IPListMicrosoft Azure service for StorageSyncService
IPListMicrosoft Azure service for AzureUpdateDelivery
IPListMicrosoft Azure datacenter for usstagee
IPListMicrosoft Azure datacenter for qatarcentral
IPListMicrosoft Azure service for AzureAttestation
IPListMicrosoft Azure service for WindowsAdminCenter
ApplicationLine
Application detection context content changed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.