Release notes for update package 1538-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday December 22, 2022
MD5 CHECKSUM:    2704dadb8e1ec31e4fb57972ff5f3b27
SHA1 CHECKSUM:    1af3d149be649b33253e5e3d1400b43170e1cf10
SHA256 CHECKSUM:    7f98036f66345999dcb24f0f70169a78c3a32ed5b20e65cbdbfb7975c09aad04

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.3.1.19034

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in VMWare vCenter Server detected     CVE-2022-31680     VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization
High     An attempt to exploit a vulnerability in GitLab Community Edition (CE) and Enterprise Edition (EE) detected     CVE-2022-2884     Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution
High     An attempt to exploit a vulnerability in Fluentd parser detected     CVE-2022-39379     Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379
High     An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected     CVE-2022-42904     Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization CVE-2022-31680 HTTP_CSU-VMware-Vcenter-Server-Psc-Dataaccesscontroller-Insecure-Deserialization Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection CVE-2022-42904 HTTP_CRL-Zoho-Manageengine-Admanager-Plus-Proxy-Settings-Command-Injection Potential Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution CVE-2022-2884 File-Text_Gitlab-Community-And-Enterprise-Edition-GitHub-Import-Remote-Code-Execution Potential Compromise
High Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379 CVE-2022-39379 File-Text_Fluentd-Oj-Parser-Insecure-Deserialization-CVE-2022-39379 Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection CVE-2022-43781 HTTP_CRL-Atlassian-Bitbucket-Server-And-Data-Center-CVE-2022-43781-Command-Injection Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryFluentd

Updated objects:

TypeNameChanges
Appliance Informationsg-352-0-C1.svg
Appliance Informationsg-355-0-C1.svg
IPListRwanda
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListArmenia
IPListKenya
IPListSeychelles
IPListJordan
IPListLebanon
IPListKuwait
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListZambia
IPListBotswana
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListMozambique
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListBhutan
IPListIndia
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListMacao
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListMongolia
IPListAustralia
IPListFederated States of Micronesia
IPListSolomon Islands
IPListNew Zealand
IPListFiji
IPListLibya
IPListCameroon
IPListPortugal
IPListNigeria
IPListGibraltar
IPListMali
IPListSpain
IPListMorocco
IPListMalta
IPListAlgeria
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListMonaco
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListJersey
IPListIsle of Man
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListVatican City
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListBosnia and Herzegovina
IPListFrench Guiana
IPListParaguay
IPListUruguay
IPListBrazil
IPListDominican Republic
IPListMartinique
IPListBermuda
IPListAnguilla
IPListSaint Lucia
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListSaint Martin
IPListGrenada
IPListCayman Islands
IPListBelize
IPListGuatemala
IPListHonduras
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListTonga
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListSint Maarten
IPListCuraçao
IPListBonaire, Sint Eustatius, and Saba
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon S3
IPListAmazon EC2
IPListFacebook Servers
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListAmazon EC2 ap-northeast-1
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-southeast-2
IPListAmazon S3 ap-southeast-2
IPListAmazon AMAZON cn-north-1
IPListAmazon AMAZON eu-central-1
IPListAmazon EC2 eu-central-1
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-west-1
IPListAmazon S3 us-west-1
IPListAmazon AMAZON us-west-2
IPListAmazon AMAZON ca-west-1
IPListAmazon EC2 ca-west-1
SituationForcepoint ONE SmartEdge Agent
Name: Forcepoint ONE Smart Agent->Forcepoint ONE SmartEdge Agent
Comment has changed
Description has changed

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2022 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.