Release notes for update package 1651-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday November 14, 2023
MD5 CHECKSUM:    9c5a98646e645707b31b611a977fe8be
SHA1 CHECKSUM:    b674aba221f777623b663570ad0d1de6856b8e5e
SHA256 CHECKSUM:    b59befc86b54e18cf2aca70c3f99f0faf5df7687a9eb3319f7134afac66a14e2

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Microsoft Office detected     CVE-2023-36413     Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

File Name

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413 CVE-2023-36413 File-Name_Microsoft-Office-Security-Feature-Bypass-CVE-2023-36413 Potential Compromise

Updated detected attacks:

MSRPC Client Payload Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow No CVE/CAN MSRPC-TCP_CPS-Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow Suspected Compromise
Name: MSRPC-TCP_CPS--Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow->MSRPC-TCP_CPS-Canonical-Ksmbd-Tools-Ksmbd.Mountd-SMB_Read_Sid-Heap-Buffer-Overflow
Description has changed

OLE File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Office-Art-Property-Table-Memory-Corruption CVE-2009-2528 File-OLE_Microsoft-Office-Art-Property-Table-Memory-Corruption Potential Compromise
Detection mechanism updated
High Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134 CVE-2009-3134 File-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134 Potential Compromise
Detection mechanism updated
High Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Heap-Buffer-Overflow CVE-2021-38406 File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Parsing-Heap-Buffer-Overflow Potential Compromise
Detection mechanism updated
High Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Heap-Buffer-Overflow CVE-2021-38406 File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-MulRk-Record-Parsing-Heap-Buffer-Overflow Potential Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMS2023-11

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListTOR exit nodes IP Address List
IPListTOR relay nodes IP Address List
IPListNordVPN Servers IP Address List
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.