Release notes for update package 1493-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday August 15, 2022
MD5 CHECKSUM:    08cab5846dec8579d07ff047711b308b
SHA1 CHECKSUM:    ab839007ce34f8e7a60db7ae7ce4cdbc8fae1a0f
SHA256 CHECKSUM:    282bd0247ff57709f008ee976b4b485e040b3bace1741912c4c088fbad4bc588

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in VMware Workspace ONE detected     CVE-2022-31656     VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656
High     An attempt to exploit a vulnerability in Advantech iView detected     CVE-2022-2135     Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection
High     An attempt to exploit a vulnerability in Grafana detected     CVE-2022-31097     Grafana-Unified-Alerting-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Node.js detected     CVE-2022-32213     Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656 CVE-2022-31656 HTTP_CSU-VMware-Workspace-One-Authentication-Bypass-CVE-2022-31656 Potential Compromise

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling CVE-2022-32213 HTTP_CSH-Node.js-Llhttp-Module-Transfer-Encoding-Handling-HTTP-Request-Smuggling Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection CVE-2022-2135 HTTP_CRL-Advantech-Iview-Findcfgdevicelist-Segment-SQL-Injection Suspected Compromise
High Grafana-Unified-Alerting-Stored-Cross-Site-Scripting CVE-2022-31097 HTTP_CRL-Grafana-Unified-Alerting-Stored-Cross-Site-Scripting Suspected Compromise

Updated detected attacks:

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316 CVE-2017-6316 HTTP_CSH-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316 Suspected Compromise
Name: HTTP_CHS-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316->HTTP_CSH-Citrix-NetScaler-SD-WAN-CGISESSID-Command-Execution-CVE-2017-6316

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal CVE-2020-16245 HTTP_CRL-Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
IPListAmazon AMAZON ap-southeast-6
IPListAmazon EC2 ap-southeast-6
IPListAmazon KINESIS_VIDEO_STREAMS us-gov-west-1
IPListMicrosoft Azure datacenter for malaysiasouth

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListMicrosoft Azure datacenter for australiaeast
IPListMicrosoft Azure datacenter for australiasoutheast
IPListMicrosoft Azure datacenter for brazilsouth
IPListMicrosoft Azure datacenter for canadacentral
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for canadaeast
IPListMicrosoft Azure datacenter for centralindia
IPListMicrosoft Azure datacenter for centraluseuap
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastasia
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for centralfrance
IPListMicrosoft Azure datacenter for southfrance
IPListMicrosoft Azure datacenter for japaneast
IPListMicrosoft Azure datacenter for japanwest
IPListMicrosoft Azure datacenter for koreacentral
IPListMicrosoft Azure datacenter for koreasouth
IPListMicrosoft Azure datacenter for northcentralus
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for southindia
IPListMicrosoft Azure datacenter for southeastasia
IPListMicrosoft Azure datacenter for uksouth
IPListMicrosoft Azure datacenter for ukwest
IPListMicrosoft Azure datacenter for westcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westindia
IPListMicrosoft Azure datacenter for westus2
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListMicrosoft Azure service for AzureVideoAnalyzerForMedia
IPListBotnet IP Address List
IPListMicrosoft Azure service for AzureLoadTestingInstanceManagement
IPListMalicious Site IP Address List
IPListAmazon AMAZON eu-west-2
IPListAmazon AMAZON us-east-1
IPListMicrosoft Azure datacenter for australiacentral
IPListMicrosoft Azure datacenter for australiacentral2
IPListMicrosoft Azure datacenter for brazilse
IPListMicrosoft Azure datacenter for germanyn
IPListMicrosoft Azure datacenter for germanywc
IPListMicrosoft Azure datacenter for norwaye
IPListMicrosoft Azure datacenter for norwayw
IPListMicrosoft Azure datacenter for southafricanorth
IPListMicrosoft Azure datacenter for southafricawest
IPListMicrosoft Azure datacenter for switzerlandn
IPListMicrosoft Azure datacenter for switzerlandw
IPListMicrosoft Azure datacenter for uaecentral
IPListMicrosoft Azure datacenter for uaenorth
IPListMicrosoft Azure service for ActionGroup
IPListMicrosoft Azure service for ApiManagement
IPListMicrosoft Azure service for AppConfiguration
IPListMicrosoft Azure service for AzureBackup
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureConnectors
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureCosmosDB
IPListMicrosoft Azure service for AzureDataExplorerManagement
IPListMicrosoft Azure service for AzureDigitalTwins
IPListMicrosoft Azure service for AzureMachineLearning
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureMonitor_Core
IPListMicrosoft Azure service for AzureResourceManager
IPListMicrosoft Azure service for CognitiveServicesManagement
IPListMicrosoft Azure service for EventHub
IPListMicrosoft Azure service for GuestAndHybridManagement
IPListMicrosoft Azure service for HDInsight
IPListMicrosoft Azure service for SqlManagement
IPListMicrosoft Azure service for Storage
IPListMicrosoft Azure service for StorageSyncService
IPListMicrosoft Azure datacenter for jioindiacentral
IPListMicrosoft Azure datacenter for jioindiawest
IPListMicrosoft Azure datacenter for swedencentral
IPListMicrosoft Azure datacenter for swedensouth
IPListMicrosoft Azure datacenter for westus3
IPListMicrosoft Azure datacenter for qatarcentral
IPListMicrosoft Azure service for AzureAttestation
IPListMicrosoft Azure datacenter for chilec
IPListMicrosoft Azure datacenter for isrealcentral
IPListMicrosoft Azure datacenter for italynorth
IPListMicrosoft Azure datacenter for newzealandnorth
IPListMicrosoft Azure datacenter for polandcentral
IPListMicrosoft Azure datacenter for spaincentral
IPListMicrosoft Azure datacenter for taiwannorth
IPListMicrosoft Azure service for M365ManagementActivityApi
IPListMicrosoft Azure service for WindowsAdminCenter
IPListMicrosoft Azure service for M365ManagementActivityApiWebhook

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.