Release notes for update package 1467-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday May 12, 2022
MD5 CHECKSUM:    16cbeb84f6c2976c4458fd72d40fdc5f
SHA1 CHECKSUM:    4d587e1804cd65f911cdbc86eb9136252981b028
SHA256 CHECKSUM:    68b069c6f57188d23e3bca8bf9d706b1364b18d848f7bd5a09bdcdde8d6caf2d

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in nopCommerce detected.     CVE-2022-28451     nopCommerce-nopCommerce-BackupAction-Directory-Traversal
High     An attempt to exploit a vulnerability in TP-Link routers detected     CVE-2015-3035     TP-Link-Local-File-Disclosure-CVE-2015-3035
High     An attempt to exploit a vulnerability in Jenkins detected     CVE-2019-1003029     Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029
High     An attempt to exploit a vulnerability in Wecon LeviStudioU detected     CVE-2021-23157     Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High nopCommerce-nopCommerce-BackupAction-Directory-Traversal CVE-2022-28451 HTTP_CS-nopCommerce-nopCommerce-BackupAction-Directory-Traversal Suspected Compromise

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High TP-Link-Local-File-Disclosure-CVE-2015-3035 CVE-2015-3035 HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035 Suspected Disclosure

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029 CVE-2019-1003029 HTTP_CRL-Jenkins-Script-Security-Plugin-Sandbox-Bypass-CVE-2019-1003029 Potential Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow CVE-2021-23157 File-TextId_Wecon-LeviStudioU-Screeninfo-Scrnfile-Heap-Buffer-Overflow Suspected Compromise

Updated detected attacks:

SSH TCP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use CVE-2021-35211 SSH_CS-Solarwinds-Serv-U-FTP-Server-SSH-AES-NEWKEYS-Uninitialized-Memory-Use Potential Compromise
Category tag situation Potential Compromise added
Category tag situation Suspected Compromise removed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Log4j-Remote-Code-Execution CVE-2021-44228 HTTP_CRL-Log4j-Remote-Code-Execution Suspected Compromise
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High SocGholish-Framework-Activity No CVE/CAN File-Text_SocGholish-Framework-Injected-Script Suspected Compromise
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability CVE-2021-30833 File-Binary_Apple-XAR-Archive-Parsing-Arbitrary-File-Write-Vulnerability Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategorynopCommerce
SituationLC_HTTP-Version-0.9-Transfer-Encoding-Chunked-Request-Header

Updated objects:

TypeNameChanges
IPListRwanda
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListArmenia
IPListKenya
IPListDR Congo
IPListSeychelles
IPListLebanon
IPListKuwait
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListÅland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZimbabwe
IPListZambia
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListMozambique
IPListMadagascar
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListIndia
IPListMaldives
IPListNepal
IPListMyanmar
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListCook Islands
IPListRussia
IPListMongolia
IPListAustralia
IPListPapua New Guinea
IPListSolomon Islands
IPListVanuatu
IPListNew Caledonia
IPListNew Zealand
IPListLibya
IPListSenegal
IPListPortugal
IPListIvory Coast
IPListGhana
IPListNigeria
IPListTogo
IPListMauritania
IPListBenin
IPListGabon
IPListGibraltar
IPListTunisia
IPListSpain
IPListMorocco
IPListMalta
IPListAlgeria
IPListFaroe Islands
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListMonaco
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListJersey
IPListIsle of Man
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListSan Marino
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListNamibia
IPListBarbados
IPListCabo Verde
IPListGuyana
IPListFrench Guiana
IPListSuriname
IPListGreenland
IPListParaguay
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListMartinique
IPListBahamas
IPListAnguilla
IPListTrinidad and Tobago
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListAruba
IPListBritish Virgin Islands
IPListMontserrat
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListSint Maarten
IPListBonaire, Sint Eustatius, and Saba
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralindia
IPListMicrosoft Azure datacenter for centraluseuap
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastasia
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westus2
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON us-east-1
IPListMicrosoft Azure datacenter for southafricanorth
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureDataLake
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for GuestAndHybridManagement
IPListMicrosoft Azure datacenter for qatarcentral
SituationHTTP_CSH-Shared-Variables
Fingerprint regexp changed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.