Release notes for update package 1632-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday September 18, 2023
MD5 CHECKSUM:    c7a01210717a44986df1abc7ff398d95
SHA1 CHECKSUM:    252e56acfb3380ae9574306845bf58877c74bcc9
SHA256 CHECKSUM:    2004ef197d2b9d030d6b91457cb50bcd3ce3ca443dfba7916aa020a50f38ff3a

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in VMware Aria Operations for Networks detected     CVE-2023-20890     VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal
High     An attempt to exploit a vulnerability in WordPress Forminator Plugin detected     CVE-2023-3134     Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting
Low     Microsoft-Symbol-Server User-Agent detected     No CVE/CAN HTTP-Browser-Usage
Low     VCSoapClient User-Agent detected     No CVE/CAN HTTP-Browser-Usage
Low     Windows User-Agent detected     No CVE/CAN HTTP-Browser-Usage
Low     HTTP User-Agent processed     No CVE/CAN HTTP-Browser-Usage

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal CVE-2023-20890 HTTP_CS-VMware-Aria-Operations-For-Networks-Savefiletodisk-Directory-Traversal Suspected Compromise

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low HTTP-Browser-Usage No CVE/CAN HTTP_CSH-User-Agent-Microsoft-Symbol-Server Browsers
Low HTTP-Browser-Usage No CVE/CAN HTTP_CSH-User-Agent-VCSoapClient Browsers
Low HTTP-Browser-Usage No CVE/CAN HTTP_CSH-User-Agent-Windows Browsers
Low HTTP-Browser-Usage No CVE/CAN HTTP_CSH-User-Agent-Processed Browsers

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting CVE-2023-3134 File-Text_Wordpress-Forminator-Plugin-Reflected-Cross-Site-Scripting Potential Compromise

Updated detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Ysoserial-Generated-Java-Serialized-Object No CVE/CAN Generic_CS-Ysoserial-Generated-Java-Serialized-Object Suspected Compromise
Description has changed
Category tag group CVE2023 added

LIST OF OTHER CHANGES:

New objects:

TypeName
SituationNTLM IWA Support User-Agent
IPListAmazon EC2_INSTANCE_CONNECT ap-northeast-3
IPListAmazon EC2_INSTANCE_CONNECT ap-south-2
IPListAmazon EC2_INSTANCE_CONNECT ap-southeast-3
IPListAmazon EC2_INSTANCE_CONNECT me-central-1
IPListAmazon EC2_INSTANCE_CONNECT me-south-1
IPListAmazon EC2_INSTANCE_CONNECT ap-east-1

Updated objects:

TypeNameChanges
SituationHTTP_CSU-Shared-Variables
SituationHTTP_CSH-Shared-Variables
Fingerprint regexp changed
SituationFile_Blocked-Known-Bad-SHA1-2
Detection mechanism updated
IPListRwanda
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListArmenia
IPListKenya
IPListDR Congo
IPListUganda
IPListSeychelles
IPListJordan
IPListQatar
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListMoldova
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListPoland
IPListRomania
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListIndia
IPListMaldives
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListNew Zealand
IPListPortugal
IPListBurkina Faso
IPListMali
IPListSpain
IPListMorocco
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListSlovakia
IPListCzechia
IPListNorway
IPListVatican City
IPListItaly
IPListSlovenia
IPListCroatia
IPListBarbados
IPListBrazil
IPListDominican Republic
IPListMartinique
IPListSt Kitts and Nevis
IPListSaint Lucia
IPListGuadeloupe
IPListBelize
IPListVenezuela
IPListEcuador
IPListColombia
IPListArgentina
IPListChile
IPListBolivia
IPListMexico
IPListNorthern Mariana Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListAntarctica
IPListSouth Sudan
IPListYour-Freedom Servers IP Address List
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListAmazon EC2_INSTANCE_CONNECT
IPListAmazon AMAZON ap-northeast-1
IPListAmazon EC2 ap-northeast-1
IPListOkta IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.