Release notes for update package 1617-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday July 31, 2023
MD5 CHECKSUM:    562600ac5b22a295187e60870adcbea5
SHA1 CHECKSUM:    006d2169afa09e1ac262152536f3b16eadc2ed9d
SHA256 CHECKSUM:    a4e9bfabcac8c531bf98d507ec991d807d64b00a63cc82b8bbedef360123aeb9

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in GLPI-Project GLPI detected     CVE-2023-36808     GLPI-Computervirtualmachine-SQL-Injection
High     An attempt to exploit a vulnerability in Ivanti Endpoint Manager Mobile detected     CVE-2023-35078     Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078
High     An attempt to exploit a vulnerability in GLPI-Project GLPI detected     CVE-2023-36808     GLPI-Computervirtualmachine-SQL-Injection
High     An attempt to exploit a vulnerability in Metabase detected     CVE-2023-38646     Metabase-Remote-Code-Execution-CVE-2023-38646
High     An attempt to exploit a vulnerability in SonicWall Analytics detected     CVE-2023-34125     SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal
High     An attempt to exploit a vulnerability in GLPI-Project GLPI detected     CVE-2023-36808     GLPI-Computervirtualmachine-SQL-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High GLPI-Computervirtualmachine-SQL-Injection CVE-2023-36808 HTTP_CS-GLPI-Computervirtualmachine-SQL-Injection Suspected Compromise

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078 CVE-2023-35078 HTTP_CSU-Ivanti-Endpoint-Manager-Mobile-Authentication-Bypass-CVE-2023-35078 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal CVE-2023-34125 HTTP_CRL-SonicWall-Gms-And-Analytics-Performdownloadtask-Directory-Traversal Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High GLPI-Computervirtualmachine-SQL-Injection CVE-2023-36808 File-Text_GLPI-Computervirtualmachine-SQL-Injection Suspected Compromise
High Metabase-Remote-Code-Execution-CVE-2023-38646 CVE-2023-38646 File-Text_Metabase-Remote-Code-Execution-CVE-2023-38646 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High GLPI-Computervirtualmachine-SQL-Injection CVE-2023-36808 File-TextId_GLPI-Computervirtualmachine-SQL-Injection Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting CVE-2017-2674 HTTP_CS-Red-Hat-Jboss-Bpm-Suite-Brms-Tasks-List-Cross-Site-Scripting Suspected Compromise
Fingerprint regexp changed

TCP MSRPC Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow CVE-2019-6550 MSRPC-TCP_Advantech-WebAccess-SCADA-Bwthinfl-Stack-Based-Buffer-Overflow Suspected Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical Trend-Micro-Iwsva-TestConfiguration-Command-Injection No CVE/CAN HTTP_CRL-Trend-Micro-Iwsva-TestConfiguration-Command-Injection Compromise
Fingerprint regexp changed
High Joomla-Com_Fields-SQL-Injection CVE-2017-8917 HTTP_CRL-Joomla-Com_Fields-SQL-Injection Suspected Compromise
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High XMRig_CPU_Miner_Binary_File No CVE/CAN File-Binary_XMRig_CPU_Miner_Binary_File Potential Compromise
Fingerprint regexp changed
High Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow CVE-2018-5067 File-Binary_Adobe-Acrobat-EMF-Emfplusdrawlines-Count-Heap-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow CVE-2013-3663 File-Binary_Trimble-Navigation-SketchUp-BMP-File-Buffer-Overflow Suspected Compromise
Detection mechanism updated

PDF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Adobe-Reader-JavaScript-Vulnerability-2011-2442 CVE-2011-2442 File-PDF_Adobe-Reader-JavaScript-Vulnerability-2011-2442 Potential Compromise
Detection mechanism updated

RIFF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution CVE-2010-4192 File-RIFF_Adobe-ShockwavePlayer-DirectorFile-RecordParsing-RemoteCodeExecution Suspected Compromise
Fingerprint regexp changed

Executable File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Clamav-UPX-File-PE-Parsing-Memory-Access-Error CVE-2013-2020 File-Exe_Clamav-UPX-File-PE-Parsing-Memory-Access-Error Suspected Compromise
Fingerprint regexp changed
High XMRig_CPU_Miner_Binary_File No CVE/CAN File-Exe_XMRig_CPU_Miner_Binary_File Potential Compromise
Fingerprint regexp changed
High StalinLocker-Wiper-Binary-File No CVE/CAN File-Exe_StalinLocker-Wiper-Binary-File Spyware, Malware and Adware
Fingerprint regexp changed
High PEDICOM-Polyglot-File No CVE/CAN File-Exe_PEDICOM-Polyglot-File Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMetabase
CategoryIvanti Endpoint Manager Mobile

Updated objects:

TypeNameChanges
IPListSomalia
IPListYemen
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListSyria
IPListArmenia
IPListKenya
IPListDR Congo
IPListUganda
IPListSeychelles
IPListJordan
IPListLebanon
IPListKuwait
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListSudan
IPListGreece
IPListBurundi
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListZimbabwe
IPListMalawi
IPListLesotho
IPListBotswana
IPListMauritius
IPListEswatini
IPListSouth Africa
IPListMozambique
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListTurkmenistan
IPListTajikistan
IPListSri Lanka
IPListBhutan
IPListIndia
IPListMaldives
IPListNepal
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListFrench Southern Territories
IPListVietnam
IPListThailand
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListMacao
IPListCambodia
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListCook Islands
IPListTimor-Leste
IPListRussia
IPListMongolia
IPListAustralia
IPListFederated States of Micronesia
IPListSolomon Islands
IPListVanuatu
IPListNew Zealand
IPListLibya
IPListPortugal
IPListLiberia
IPListIvory Coast
IPListGhana
IPListNigeria
IPListTogo
IPListGibraltar
IPListGambia
IPListSpain
IPListMorocco
IPListMalta
IPListFaroe Islands
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListMonaco
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListIsle of Man
IPListSlovakia
IPListCzechia
IPListNorway
IPListVatican City
IPListSan Marino
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListNamibia
IPListBarbados
IPListGuyana
IPListFrench Guiana
IPListSaint Pierre and Miquelon
IPListGreenland
IPListParaguay
IPListBrazil
IPListFalkland Islands
IPListJamaica
IPListDominican Republic
IPListCuba
IPListMartinique
IPListBermuda
IPListTrinidad and Tobago
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListTurks and Caicos Islands
IPListSt Vincent and Grenadines
IPListSaint Martin
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListHaiti
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListAntarctica
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centraluseuap
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListApple Servers
IPListMicrosoft Azure datacenter for northeurope
IPListTelegram Messenger Network IP Address List
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListSalesforce Community Cloud
IPListSalesforce
IPListAmazon AMAZON ap-northeast-1
IPListAmazon EC2 ap-northeast-1
IPListAmazon AMAZON eu-central-2
IPListAmazon EC2 eu-central-2
IPListAmazon AMAZON ap-northeast-2
IPListAmazon EC2 ap-northeast-2
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-south-1
IPListAmazon EC2 ap-south-1
IPListAmazon AMAZON ap-southeast-1
IPListAmazon EC2 ap-southeast-1
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ap-southeast-2
IPListAmazon EC2 ap-southeast-2
IPListMicrosoft Azure service for AzureManagedGrafana
IPListAmazon AMAZON ca-central-1
IPListAmazon EC2 ca-central-1
IPListAmazon AMAZON eu-central-1
IPListAmazon EC2 eu-central-1
IPListAmazon AMAZON eu-north-1
IPListAmazon EC2 eu-north-1
IPListAmazon AMAZON eu-west-1
IPListAmazon EC2 eu-west-1
IPListAmazon AMAZON eu-west-2
IPListAmazon EC2 eu-west-2
IPListAmazon AMAZON eu-west-3
IPListAmazon EC2 eu-west-3
IPListAmazon AMAZON sa-east-1
IPListAmazon EC2 sa-east-1
IPListAmazon AMAZON us-east-2
IPListAmazon EC2 us-east-2
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListAmazon AMAZON eu-south-1
IPListAmazon EC2 eu-south-1
IPListMicrosoft Azure datacenter for southafricanorth
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure service for PowerQueryOnline
IPListGoogle Cloud IP Address List for australia-southeast1
IPListGoogle Cloud IP Address List for europe-west3
SituationHTTP_CSU-Shared-Variables

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.