Release notes for update package 1502-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday September 08, 2022
MD5 CHECKSUM:    16841e4efe9098ce94fef3215078a385
SHA1 CHECKSUM:    d684e6c7f8d3820106fd13447f2201eaebafc091
SHA256 CHECKSUM:    b8bf5fabd19d3344a75260b4e09797247474a292498cb42582a500cbf1d5647e

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Jetty detected     CVE-2021-28169     Jetty-File-Disclosure-CVE-2021-28169
High     An attempt to exploit a vulnerability in Oracle WebLogic Server detected     CVE-2022-21371     Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371
High     An attempt to exploit a vulnerability in NetGear RAX43 router detected     CVE-2021-20167     NetGear-RAX43-Command-Injection-CVE-2021-20167
High     An attempt to exploit a vulnerability in BeyondTrust Remote Support detected     CVE-2021-31589     Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589
High     An attempt to exploit a vulnerability in Watchguard     CVE-2022-26318     Watchguard-Pre-Auth-RCE-CVE-2022-26318
High     An attempt to exploit a vulnerability in Confluence detected     CVE-2022-26138     Confluence-Hardcoded-Credentials-CVE-2022-26138
High     An attempt to exploit a vulnerability in OpenEMR Development Team OpenEMR detected     CVE-2022-2733     Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in D-Link DIR816L detected     CVE-2022-28958     D-Link-DIR816L-Remote-Code-Execution-CVE-2022-28958
High     An attempt to exploit a vulnerability in Microsoft Windows Network File System detected.     CVE-2022-34715     Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability
High     An attempt to exploit a vulnerability in Oracle MySQL Cluster detected.     CVE-2022-21489     Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow
Low     An attempt to exploit a vulnerability in Microsoft Internet Information Services detected.     CVE-2022-22025     Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability CVE-2022-34715 Generic_CS-Microsoft-Windows-NFS-CVE-2022-34715-RCE-Vulnerability Suspected Compromise
High Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow CVE-2022-21489 Generic_CS-Oracle-MySQL-Cluster-GSN_CREATE_FRAGMENTATION_REQ-Buffer-Overflow Potential Compromise

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service CVE-2022-22025 HTTP_CSU-Microsoft-IIS-Cachuri-Tree_Hash_Table-Denial-of-Service Potential Denial of Service
High Jetty-File-Disclosure-CVE-2021-28169 CVE-2021-28169 HTTP_CSU-Jetty-File-Disclosure-CVE-2021-28169 Suspected Compromise
High Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371 CVE-2022-21371 HTTP_CSU-Oracle-WebLogic-Server-Local-File-Inclusion-CVE-2022-21371 Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High NetGear-RAX43-Command-Injection-CVE-2021-20167 CVE-2021-20167 HTTP_CRL-NetGear-RAX43-Command-Injection-CVE-2021-20167 Suspected Compromise
High Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589 CVE-2021-31589 HTTP_CRL-Beyondtrust-Remote-Support-Cross-Site-Scripting-CVE-2021-31589 Suspected Compromise
High Watchguard-Pre-Auth-RCE-CVE-2022-26318 CVE-2022-26318 HTTP_CRL-Watchguard-Pre-Auth-RCE-CVE-2022-26318 Suspected Compromise
High Confluence-Hardcoded-Credentials-CVE-2022-26138 CVE-2022-26138 HTTP_CRL-Confluence-Hardcoded-Credentials-CVE-2022-26138 Suspected Compromise
High Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting CVE-2022-2733 HTTP_CRL-Openemr-Fee_Sheet_Options_Ajax-Reflected-Cross-Site-Scripting Suspected Compromise
High D-Link-DIR816L-Remote-Code-Execution-CVE-2022-28958 CVE-2022-28958 HTTP_CRL-D-Link-DIR816L-Remote-Code-Execution-CVE-2022-28958 Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal CVE-2020-16245 HTTP_CRL-Advantech-Iview-Devicetreetable-Exporttaskmgrreport-Directory-Traversal Suspected Compromise
Fingerprint regexp changed
High Sophos-Firewall-Authentication-Bypass-CVE-2022-1040 CVE-2022-1040 HTTP_CRL-Sophos-Firewall-Authentication-Bypass-CVE-2022-1040 Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryWatchguard
CategoryBeyondTrust Remote Support
Certificate AuthorityGlobalSign RSA DV SSL CA - 2018 int
Certificate AuthorityGlobalSign GCC R3 DV TLS CA 2020 int
Certificate AuthorityEntrust Certification Authority - L1M int

Updated objects:

TypeNameChanges
IPListSomalia
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListKenya
IPListDR Congo
IPListUganda
IPListSeychelles
IPListJordan
IPListLebanon
IPListKuwait
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListGreece
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListMoldova
IPListBelarus
IPListFinland
IPListÅland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListZimbabwe
IPListBotswana
IPListMauritius
IPListEswatini
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListTajikistan
IPListSri Lanka
IPListIndia
IPListNepal
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListMacao
IPListCambodia
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListRussia
IPListAustralia
IPListPapua New Guinea
IPListNew Zealand
IPListFiji
IPListCongo Republic
IPListPortugal
IPListIvory Coast
IPListNigeria
IPListTogo
IPListGibraltar
IPListGambia
IPListSpain
IPListMalta
IPListFaroe Islands
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListJersey
IPListIsle of Man
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListBosnia and Herzegovina
IPListNamibia
IPListBarbados
IPListFrench Guiana
IPListParaguay
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListMartinique
IPListBahamas
IPListAnguilla
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListTurks and Caicos Islands
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListMontserrat
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListSamoa
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListSint Maarten
IPListCuraçao
IPListBonaire, Sint Eustatius, and Saba
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListTOR relay nodes IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON eu-central-1
IPListAmazon AMAZON eu-north-1
IPListAmazon AMAZON eu-west-2
IPListAmazon AMAZON us-east-1

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.