Release notes for update package 1630-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday September 12, 2023
MD5 CHECKSUM:    f34cf509ae2558dd621c20060305f0f7
SHA1 CHECKSUM:    4f6b45d4048ea3c89e7959d1e4c77d1a2475ef20
SHA256 CHECKSUM:    4b58fe5e5810001896b192daf939089fea3777a9e5316353d9c2573ceda60124

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Windows DHCPv6 server detected     CVE-2023-38152     Dhcpv6-Buffer-Overread-CVE-2023-38152
High     An attempt to exploit a vulnerability in LibreNMS detected     CVE-2023-4347     LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Windows ICS DHCP server detected     CVE-2023-38148     Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

UDP Packet Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Dhcpv6-Buffer-Overread-CVE-2023-38152 CVE-2023-38152 Generic_UDP-Dhcpv6-Buffer-Overread-CVE-2023-38152 Suspected Compromise

BOOTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148 CVE-2023-38148 BOOTP_CS-Windows-ICS-DHCP-Buffer-Overflow-CVE-2023-38148 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting CVE-2023-4347 HTTP_CRL-LibreNMS-Outages-Outages.inc.php-Reflected-Cross-Site-Scripting Suspected Compromise

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMS2023-09

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListAmazon AMAZON ap-northeast-3
IPListAmazon EC2 ap-northeast-3
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.