Release notes for update package 1672-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday January 08, 2024
MD5 CHECKSUM:    b14e84ea76351fd20be3685fbd6eb7b6
SHA1 CHECKSUM:    5db1f7461eca37aa7a004cf3ae00efeab4159b4f
SHA256 CHECKSUM:    bec13d25ed832f2369d9093519f09798dc5ab1882862394ab9548dcbaf52607a

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     ms-appinstaller URI scheme detected     No CVE/CAN MS-appinstaller-URI-Scheme
High     An attempt to exploit a vulnerability in Sophos Web Appliance detected     CVE-2023-1671     Sophos-Web-Appliance-Command-Injection-CVE-2023-1671
High     An attempt to exploit a vulnerability in Schneider Electric C-Bus Toolkit detected     CVE-2023-5399     Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal CVE-2023-5399 Generic_CS-Schneider-Electric-C-Bus-Toolkit-File-Download-Command-Directory-Traversal Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Sophos-Web-Appliance-Command-Injection-CVE-2023-1671 CVE-2023-1671 HTTP_CRL-Sophos-Web-Appliance-Command-Injection-CVE-2023-1671 Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High MS-appinstaller-URI-Scheme No CVE/CAN File-Text_MS-appinstaller-URI-Scheme-Link-In-HTML Potential Compromise

Updated detected attacks:

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Exchange-Unsafe-Deserialization-CVE-2022-41082 CVE-2022-41082 File-TextId_Microsoft-Exchange-Unsafe-Deserialization Suspected Compromise
Detection mechanism updated
High Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization CVE-2023-36744 File-TextId_Microsoft-Exchange-PowerShell-Remoting-Dumpdatareader-Insecure-Deserialization Suspected Compromise
Description has changed
Category tag group MS2023-08 added

LIST OF OTHER CHANGES:

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon CLOUDFRONT
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListAmazon AMAZON eu-central-2
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon CLOUDFRONT us-east-1
IPListForcepoint Drop IP Address List
IPListForcepoint Extended Drop IP Address List
ApplicationASProxy
ApplicationCgi-IRC
ApplicationOutlook-Web-Access
ApplicationOwncloud
ApplicationMicrosoft-Office-365
ApplicationAkamai-Infrastructure
ApplicationTOR
ApplicationManoto
ApplicationDNS-Over-HTTPS

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.