Release notes for update package 1658-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday November 30, 2023
MD5 CHECKSUM:    900ce6bc6f3c046acc33145a56aaf3a7
SHA1 CHECKSUM:    1fd92c6ff0c4de2827a2c7da30589704f47fc875
SHA256 CHECKSUM:    1e0f4873036b6090f0ba30db55b55227c283356de8a5fea3ad141e02d6d05f2f

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in ABUS TVIP 20000-21150 detected     No CVE/CAN ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion
High     An attempt to exploit a vulnerability in Google Chrome detected     CVE-2022-4262     Google-Chrome-Type-Confusion-CVE-2022-4262
High     An attempt to exploit a vulnerability in Google Chrome detected     CVE-2019-13720     Google-Chrome-Use-After-Free-CVE-2019-13720
High     An attempt to exploit a vulnerability in ABUS TVIP 20000-21150 detected     CVE-2023-26609     ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609
High     An attempt to exploit a vulnerability in ZoneMinder detected     CVE-2023-26035     ZoneMinder-Snapshots-Command-Injection
Low     A DNS request containing a long domain name with mixed letters and digits detected     No CVE/CAN Long-Domain-Name-With-Mixed-Letters-And-Digits
Low     A DNS request containing a long domain name with mixed letters and digits detected     No CVE/CAN Long-Domain-Name-With-Mixed-Letters-And-Digits

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

DNS UDP Client Message

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Long-Domain-Name-With-Mixed-Letters-And-Digits No CVE/CAN DNS-UDP_Long-Domain-Name-With-Mixed-Letters-And-Digits Protocol Information
Low Long-Domain-Name-With-Mixed-Letters-And-Digits No CVE/CAN DNS-UDP_Suspicious-Long-Domain-Name-With-Mixed-Letters-And-Digits Potential Disclosure

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion No CVE/CAN HTTP_CSU-ABUS-TVIP-20000-21150-Security-Camera-Local-File-Inclusion Suspected Disclosure

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609 CVE-2023-26609 HTTP_CRL-ABUS-TVIP-20000-21150-Security-Camera-Command-Injection-CVE-2023-26609 Suspected Compromise
High ZoneMinder-Snapshots-Command-Injection CVE-2023-26035 HTTP_CRL-ZoneMinder-Snapshots-Command-Injection Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Google-Chrome-Type-Confusion-CVE-2022-4262 CVE-2022-4262 File-Text_Google-Chrome-Type-Confusion-CVE-2022-4262 Suspected Compromise
High Google-Chrome-Use-After-Free-CVE-2019-13720 CVE-2019-13720 File-Text_Google-Chrome-Use-After-Free-CVE-2019-13720 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High APSystems-ECU-R-Command-Injection-CVE-2022-45699 CVE-2022-45699 HTTP_CS-APSystems-ECU-R-Command-Injection-CVE-2022-45699 Suspected Compromise
Description has changed
Fingerprint regexp changed

DNS UDP Client Message

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Low DNS-Query-Containing-Base64-Encoded-Data No CVE/CAN DNS-UDP_DNS-Query-Containing-Base64-Encoded-Data Potential Disclosure
Severity: 7->2
Category tag situation Potential Disclosure added
Category tag situation Potential Compromise removed
Category tag group UDP Correlation Dependency Group removed
Category tag group Severity over 4 Correlation Dependency Group removed

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894 CVE-2023-20894 Generic_CS-VMware-Vcenter-Server-Authentication-Pointer-Out-of-Range-CVE-2023-20894 Suspected Compromise
Description has changed
Category tag application VMware Cloud Foundation added
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
ApplicationDiscoveryplus
ApplicationStarz
ApplicationTubi
ApplicationWOW Presents Plus
CategoryABUS TVIP

Updated objects:

TypeNameChanges
SituationDNS-UDP_Message-Parser
ApplicationWeather.com
ApplicationHbo
ApplicationAkamai-Infrastructure
ApplicationTOR
ApplicationManoto
ApplicationDNS-Over-HTTPS
ApplicationNordVPN
ApplicationCriterion Channel
ApplicationPeacock
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListSyria
IPListKenya
IPListDR Congo
IPListUganda
IPListSeychelles
IPListJordan
IPListLebanon
IPListKuwait
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTurkey
IPListEthiopia
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZimbabwe
IPListZambia
IPListMauritius
IPListSouth Africa
IPListMozambique
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListIndia
IPListMaldives
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListPapua New Guinea
IPListNew Zealand
IPListFiji
IPListCameroon
IPListPortugal
IPListGhana
IPListNigeria
IPListMauritania
IPListGibraltar
IPListTunisia
IPListSpain
IPListMorocco
IPListMalta
IPListAlgeria
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListAngola
IPListBarbados
IPListParaguay
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListBahamas
IPListBermuda
IPListTrinidad and Tobago
IPListDominica
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListPuerto Rico
IPListCanada
IPListUnited States
IPListSerbia
IPListTOR exit nodes IP Address List
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListOkta IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.