Release notes for update package 1642-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday October 19, 2023
MD5 CHECKSUM:    4ee5af1e528dd665661594354de1aa87
SHA1 CHECKSUM:    ece94fecdc673684b90da737cd513f96f9af0d98
SHA256 CHECKSUM:    efa771aaa1f57be4c21e9e1a7e384a5ef4918c4cb6b7193bd529d04224765f07

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Apache Software Foundation Tomcat detected     CVE-2023-41080     Apache-Tomcat-Formauthenticator-Open-Redirect
High     An attempt to exploit a vulnerability in Cisco IOS detected     CVE-2023-20198     Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
High     An attempt to exploit a vulnerability in Cisco IOS detected     CVE-2023-20198     Cisco-IOS-XE-CVE-2023-20198-Implant-Detection
High     An attempt to exploit a vulnerability in Pimcore Pimcore detected     CVE-2023-3820     Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Tomcat-Formauthenticator-Open-Redirect CVE-2023-41080 HTTP_CSU-Apache-Tomcat-Formauthenticator-Open-Redirect Suspected Compromise
High Cisco-IOS-XE-CVE-2023-20198-Implant-Detection CVE-2023-20198 HTTP_CSU-Cisco-IOS-XE-CVE-2023-20198-Implant-Detection Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection CVE-2023-3820 HTTP_CRL-Pimcore-Gridhelperservice.php-Preparelistingforgrid-SQL-Injection Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Cisco-IOS-XE-CVE-2023-20198-Implant-Detection CVE-2023-20198 File-Text_Cisco-IOS-XE-CVE-2023-20198-Implant-Detection Suspected Compromise

Updated detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Confluence-Access-Control-Vulnerability-CVE-2023-22515 CVE-2023-22515 HTTP_CSU-Confluence-Access-Control-Vulnerability-CVE-2023-22515-2 Potential Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Confluence-Access-Control-Vulnerability-CVE-2023-22515 CVE-2023-22515 HTTP_CRL-Confluence-Access-Control-Vulnerability-CVE-2023-22515 Suspected Compromise
Name: HTTP_CSU-Confluence-Access-Control-Vulnerability-CVE-2023-22515->HTTP_CRL-Confluence-Access-Control-Vulnerability-CVE-2023-22515
Category tag group TCP Correlation Dependency Group removed
Category tag group HTTP URI Correlation Dependency Group removed
Context has changed from HTTP Request URI to HTTP Normalized Request-Line

LIST OF OTHER CHANGES:

New objects:

TypeName
Appliance Informationsg-3501-0-C1.svg
Appliance Informationsg-3505-0-C1.svg
Appliance Informationsg-3510-0-C1.svg

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListYemen
IPListIraq
IPListIran
IPListCyprus
IPListSyria
IPListArmenia
IPListKenya
IPListDR Congo
IPListSeychelles
IPListLebanon
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListGreece
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListMoldova
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListSouth Africa
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListBhutan
IPListIndia
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListPapua New Guinea
IPListNew Zealand
IPListLibya
IPListCameroon
IPListCongo Republic
IPListPortugal
IPListLiberia
IPListNigeria
IPListBurkina Faso
IPListSpain
IPListMorocco
IPListMalta
IPListAlgeria
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListNetherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListBosnia and Herzegovina
IPListBarbados
IPListCabo Verde
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListBahamas
IPListSt Kitts and Nevis
IPListAntigua and Barbuda
IPListSt Vincent and Grenadines
IPListSaint Martin
IPListGuadeloupe
IPListCayman Islands
IPListBelize
IPListGuatemala
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListSamoa
IPListGuam
IPListPuerto Rico
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListSouth Sudan
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon S3
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for japanwest
IPListMicrosoft Azure datacenter for koreacentral
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ap-southeast-5
IPListAmazon EC2 ap-southeast-5
IPListAmazon S3 ap-southeast-5
IPListAmazon AMAZON us-gov-west-1
IPListAmazon S3 us-gov-west-1
IPListAmazon EC2 us-gov-west-1
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListMicrosoft Azure datacenter for southafricanorth
IPListMicrosoft Azure datacenter for southafricawest
IPListMicrosoft Azure datacenter for uaenorth
IPListMicrosoft Azure service for AppConfiguration
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureIoTHub
IPListMicrosoft Azure service for AzureKeyVault
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureMonitor_Core
IPListMicrosoft Azure service for AzureTrafficManager
IPListMicrosoft Azure service for DataFactory
IPListMicrosoft Azure service for DataFactoryManagement
IPListMicrosoft Azure service for EventHub
IPListMicrosoft Azure service for MicrosoftContainerRegistry
IPListMicrosoft Azure service for ServiceBus
IPListMicrosoft Azure service for ServiceFabric
IPListMicrosoft Azure service for Sql
IPListMicrosoft Azure service for SqlManagement
IPListMicrosoft Azure service for EOPExternalPublishedIPs
IPListMicrosoft Azure datacenter for qatarcentral
IPListMicrosoft Azure datacenter for israelcentral
IPListMicrosoft Azure service for M365ManagementActivityApi
IPListMicrosoft Azure service for M365ManagementActivityApiWebhook
SituationAnalyzer_HTTP2-Reset-Flood-Denial-of-Service
Name: Analyzer_Microsoft-Windows-HTTP2-Reset-Flood-Denial-of-Service->Analyzer_HTTP2-Reset-Flood-Denial-of-Service
Comment has changed
Description has changed
SituationHTTP_CSH-Shared-Variables
Fingerprint regexp changed
ApplicationTOR
ApplicationDNS-Over-HTTPS
Application detection context content changed
ApplicationNordVPN
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.