Release notes for update package 1676-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Wednesday January 17, 2024
MD5 CHECKSUM:    318738792aecf21a25b4e45d4fab5abb
SHA1 CHECKSUM:    73272944b511fc9ceb3ad8939088e816f96b8002
SHA256 CHECKSUM:    e0c1a0f13d0574d37a11ad33e69b41533bfd04f1587a5ffe9e222f3da825cf8c

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in SonicWall detected     CVE-2023-0656     SonicWall-Stack-Buffer-Overflow-CVE-2023-0656
High     An attempt to exploit a vulnerability in SonicWall detected     CVE-2022-22274     SonicWall-Stack-Buffer-Overflow-CVE-2022-22274
High     An attempt to exploit a vulnerability in Ivanti Connect Secure detected     CVE-2023-46805     Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805
High     An attempt to exploit a vulnerability in Ivanti Connect Secure detected     CVE-2024-21887     Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
High     An attempt to exploit a vulnerability in Mirth Connect detected     CVE-2023-43208     Mirth-Connect-Remote-Code-Execution-CVE-2023-43208
High     An attempt to exploit a vulnerability in Ivanti Connect Secure detected     CVE-2024-21887     Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887
High     An attempt to exploit a vulnerability in Ivanti Avalanche detected     CVE-2023-46262     Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
High     An attempt to exploit a vulnerability in Ivanti Avalanche detected     CVE-2023-46262     Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
High     An attempt to exploit a vulnerability in Ivanti Avalanche detected     CVE-2023-46262     Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection
High     An attempt to exploit a vulnerability in Mirth Connect detected     CVE-2023-43208     Mirth-Connect-Remote-Code-Execution-CVE-2023-43208

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High SonicWall-Stack-Buffer-Overflow-CVE-2023-0656 CVE-2023-0656 HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2023-0656 Suspected Compromise
High SonicWall-Stack-Buffer-Overflow-CVE-2022-22274 CVE-2022-22274 HTTP_CS-SonicWall-Stack-Buffer-Overflow-CVE-2022-22274 Suspected Compromise

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805 CVE-2023-46805 HTTP_CSU-Ivanti-Connect-Secure-Authentication-Bypass-CVE-2023-46805 Suspected Compromise
High Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887 CVE-2024-21887 HTTP_CSU-Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection CVE-2023-46262 HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Mirth-Connect-Remote-Code-Execution-CVE-2023-43208 CVE-2023-43208 File-Text_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208 Suspected Compromise
High Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887 CVE-2024-21887 File-Text_Ivanti-Connect-Secure-Command-Injection-CVE-2024-21887 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Mirth-Connect-Remote-Code-Execution-CVE-2023-43208 CVE-2023-43208 File-TextId_Mirth-Connect-Remote-Code-Execution-CVE-2023-43208 Suspected Compromise

ARCserve Backup Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection CVE-2023-46262 ARCserve_CS-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery Suspected Compromise
High Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection CVE-2023-46262 ARCserve_CS-Potential-Ivanti-Avalanche-Remote-Control-Server-Validateamcwsconnection-Server-Side-Request-Forgery Potential Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Xstream-Library-Insecure-Deserialization CVE-2021-39144 HTTP_CS_Xstream-Library-Insecure-Xml-Deserialization-CVE-2021-39144 Suspected Compromise
Description has changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Xstream-Unsafe-Deserialization No CVE/CAN File-Text_Xstream-Unsafe-Deserialization Potential Compromise
Detection mechanism updated

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Xstream-Unsafe-Deserialization No CVE/CAN File-TextId_Xstream-Unsafe-Deserialization Potential Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryIvanti Connect Secure
CategoryMirth Connect
CategoryCVE2024
ApplicationSentry.io
SituationURLList 3211303

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListKenya
IPListSeychelles
IPListLebanon
IPListKuwait
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEthiopia
IPListGreece
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListRéunion
IPListSouth Africa
IPListMozambique
IPListPakistan
IPListBangladesh
IPListTajikistan
IPListSri Lanka
IPListBhutan
IPListIndia
IPListNepal
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListNew Zealand
IPListPortugal
IPListLiberia
IPListIvory Coast
IPListNigeria
IPListSierra Leone
IPListGibraltar
IPListSpain
IPListMalta
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListJersey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListMontenegro
IPListCroatia
IPListParaguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListBahamas
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListCosta Rica
IPListVenezuela
IPListColombia
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListCanada
IPListUnited States
IPListSerbia
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon CLOUDFRONT
IPListTOR relay nodes IP Address List
IPListNetflix Servers
IPListMicrosoft Azure datacenter
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon CLOUDFRONT eu-central-1
IPListAmazon AMAZON eu-west-2
IPListAmazon AMAZON sa-east-1
IPListForcepoint Drop IP Address List
SituationHTTP_CSU-Shared-Variables
ApplicationGoogle-Analytics
ApplicationGoogle
ApplicationGoogle-Orkut
ApplicationAmazon
ApplicationNetflix
ApplicationHbo
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationSpotify

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.