Release notes for update package 1537-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday December 19, 2022
MD5 CHECKSUM:    25875385bf01788625c2677fa042f439
SHA1 CHECKSUM:    175fda0a92843df5fc7ede6c27cb48defdcf3687
SHA256 CHECKSUM:    42ca8b1b3a4e20da67d59e727b8c1bea850c55bc6adbf28caae2a7e6b1369037

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Totolink wireless routers detected     CVE-2022-26210     Totolink-setupgradefw-Command-Injection-CVE-2022-26210
High     An attempt to exploit a vulnerability in Atlassian Bitbucket Server and Data Center detected     CVE-2022-43781     Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection
High     An attempt to exploit a vulnerability in Net-SNMP detected     CVE-2022-44792     Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

SNMP UDP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference CVE-2022-44792 SNMP-UDP_Net-SNMP-Handle_ipdefaultttl-Null-Pointer-Dereference Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection CVE-2022-43781 HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Totolink-setupgradefw-Command-Injection-CVE-2022-26210 CVE-2022-26210 File-Text_Totolink-setupgradefw-Command-Injection-CVE-2022-26210 Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186 CVE-2022-26186 HTTP_CRL-Totolink-N600R-exportOvpn-Command-Injection-CVE-2022-26186 Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
IPListMicrosoft Azure service for MicrosoftDefenderForEndpoint

Updated objects:

TypeNameChanges
Certificate AuthorityWellsSecure Public Root Certificate Authority
Marked for removal
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListArmenia
IPListKenya
IPListSeychelles
IPListJordan
IPListKuwait
IPListOman
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListSudan
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListÅland Islands
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListBotswana
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListMozambique
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListIndia
IPListNepal
IPListMyanmar
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListNorfolk Island
IPListNew Zealand
IPListSenegal
IPListCongo Republic
IPListPortugal
IPListNigeria
IPListGuinea-Bissau
IPListGibraltar
IPListTunisia
IPListSpain
IPListMorocco
IPListMalta
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListJersey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListFrench Guiana
IPListParaguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListMartinique
IPListAntigua and Barbuda
IPListSaint Lucia
IPListSt Vincent and Grenadines
IPListMontserrat
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListCayman Islands
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListNiue
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListSerbia
IPListSint Maarten
IPListAmazon AMAZON
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for westeurope
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-southeast-1
IPListAmazon AMAZON us-east-1
IPListMicrosoft Azure service for AppConfiguration
IPListMicrosoft Azure service for AppServiceManagement
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureCosmosDB
IPListMicrosoft Azure service for AzureIoTHub
IPListMicrosoft Azure service for AzureKeyVault
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureMonitor_Core
IPListMicrosoft Azure service for DataFactory
IPListMicrosoft Azure service for DataFactoryManagement
IPListMicrosoft Azure service for EventHub
IPListMicrosoft Azure service for MicrosoftContainerRegistry
IPListMicrosoft Azure service for ServiceBus
IPListMicrosoft Azure service for ServiceFabric
IPListMicrosoft Azure service for Sql
IPListMicrosoft Azure service for SqlManagement

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.