Release notes for update package 1681-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Friday January 26, 2024
MD5 CHECKSUM:    8d12c2f5c38adab31ab1fe108c8b93ba
SHA1 CHECKSUM:    68c8ff8a8a657f9ff8732eb1895e19979042ad6a
SHA256 CHECKSUM:    2fb3a9383db31c0254182f27909c143dae45515aad7e595e08f43f9f24952988

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.5.1.10631
- Forcepoint NGFW:    6.5.1.21108

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in quic-go detected     CVE-2023-46239     Quic-go-Crypto-Ack-Nil-Pointer-Dereference
High     An attempt to exploit a vulnerability in WordPress Project LearnPress Plugin detected     CVE-2023-6567     Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
High     An attempt to exploit a vulnerability in WordPress Project LearnPress Plugin detected     CVE-2023-6567     Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection
High     An attempt to exploit a vulnerability in Kafka UI detected     CVE-2023-52251     Kafka-UI-Remote-Code-Execution-CVE-2023-52251
High     An attempt to exploit a vulnerability in Jenkins detected     CVE-2024-23897     Jenkins-Arbitrary-File-Read-CVE-2024-23897
High     An attempt to exploit a vulnerability in Voltronic ViewPower Pro detected     CVE-2023-51573     Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass
High     An attempt to exploit a vulnerability in Apache Traffic Server detected     CVE-2023-39456     Apache-Traffic-Server-HTTP-Range-Denial-Of-Service
High     An attempt to exploit a vulnerability in 7-Zip detected     CVE-2023-31102     7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability
High     An attempt to exploit a vulnerability in Microsoft Exchange Server detected     CVE-2023-36039     Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization
Low     An attempt to exploit a vulnerability in Apache HTTP Server detected     CVE-2023-43622     Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service
Low     An attempt to exploit a vulnerability in Apache HTTP Server detected     CVE-2023-43622     Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

UDP Packet Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Quic-go-Crypto-Ack-Nil-Pointer-Dereference CVE-2023-46239 Generic_UDP-Quic-go-Crypto-Ack-Nil-Pointer-Dereference Suspected Compromise

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection CVE-2023-6567 HTTP_CS-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection Suspected Compromise

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass CVE-2023-51573 Generic_CS-Voltronic-Power-Viewpower-Pro-UpdateManagerPassword-Authentication-Bypass Suspected Compromise

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Traffic-Server-HTTP-Range-Denial-Of-Service CVE-2023-39456 HTTP_CSH-Apache-Traffic-Server-HTTP-Range-Denial-Of-Service Potential Compromise
Low Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service CVE-2023-43622 HTTP_CSH-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service Potential Denial of Service

HTTP2 SETTINGS

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service CVE-2023-43622 HTTP2_SETTINGS-Apache-Httpd-Mod_HTTP2-H2_Session_process-Denial-Of-Service Potential Denial of Service

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection CVE-2023-6567 HTTP_CRL-Wordpress-Learnpress-Plugin-Handle_params_For_Query_courses-SQL-Injection Suspected Compromise
High Kafka-UI-Remote-Code-Execution-CVE-2023-52251 CVE-2023-52251 HTTP_CRL-Kafka-UI-Remote-Code-Execution-CVE-2023-52251 Suspected Compromise

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High 7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability CVE-2023-31102 File-Binary_7-Zip-7z-File-Ppmd-Properties-Parsing-Integer-Underflow-Vulnerability Potential Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization CVE-2023-36039 File-TextId_Microsoft-Exchange-PowerShell-Remoting-Federationtrust-Insecure-Deserialization Suspected Compromise

WebSocket Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Jenkins-Arbitrary-File-Read-CVE-2024-23897 CVE-2024-23897 WebSocket_CS-Jenkins-Arbitrary-File-Read-CVE-2024-23897 Suspected Compromise

Updated detected attacks:

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption CVE-2015-6140 File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2015-6140-Memory-Corruption Suspected Compromise
Detection mechanism updated

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Exchange-Unsafe-Deserialization-CVE-2022-41082 CVE-2022-41082 File-TextId_Microsoft-Exchange-Unsafe-Deserialization Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryApache Traffic Server
Categoryquic-go
CategoryWordPress Project LearnPress Plugin
CategoryKafka UI
Certificate AuthorityemSign EV SSL CA - G1
Certificate AuthorityEntrust Certification Authority - L1K (3)
Certificate AuthorityGlobalSign Atlas R3 AlphaSSL CA 2024 Q1
Certificate AuthorityGlobalSign Atlas R3 DV TLS CA 2024 Q1
Certificate Authoritye-Szigno Class3 SSL CA 2017 (1)
Certificate AuthorityCybertrust Japan SureServer EV CA G3_2023-2029-Cybertrust Japan SureServer EV CA G3
Certificate AuthoritySite Blindado RSA Domain Validation Secure Server CA 3
Certificate AuthorityTBS RSA Organization Validation Secure Server CA 3
Certificate AuthorityViking Cloud Domain Validation CA, Level 1
Certificate AuthorityTrustAsia Global Root CA G3
Certificate AuthorityTrustAsia Global Root CA G4
Certificate AuthorityCommScope Public Trust ECC Root-01
Certificate AuthorityCommScope Public Trust ECC Root-02
Certificate AuthorityCommScope Public Trust RSA Root-01
Certificate AuthorityCommScope Public Trust RSA Root-02

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListAmazon CLOUDFRONT
IPListTOR relay nodes IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON eu-west-1
IPListAmazon EC2 eu-west-1
IPListAmazon CLOUDFRONT us-east-2
IPListTwilio SIP
IPListTwilio media
SituationHTTP_CRL-Shared-Variables
ApplicationLinkedIn
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.