Release notes for update package 1714-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday April 11, 2024
MD5 CHECKSUM:    9e69f95145f5deb433c48bc35ecdcad2
SHA1 CHECKSUM:    39d04bfb5de25d2a487749d3e70d4a78f301f096
SHA256 CHECKSUM:    fb2a45705f1994d0d06faa714b6cfcf69fba4effa8d0ba16d4d3cb888f5a2ac6

UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Nagios XI detected     CVE-2024-24401     Nagios-XI-favorites.inc.php-SQL-Injection
High     An attempt to exploit a vulnerability in Apache Solr detected     CVE-2023-50386     Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
High     An attempt to exploit a vulnerability in Delta Industrial Automation DIAEnergie detected     CVE-2024-23494     Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection
High     An attempt to exploit a vulnerability in Gibbon Edu detected     CVE-2024-24725     Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability
High     An attempt to exploit a vulnerability in Django detected     CVE-2023-46695     Django-Usernamefield-Denial-Of-Service
High     An attempt to exploit a vulnerability in Apache Solr detected     CVE-2023-50386     Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
High     An attempt to exploit a vulnerability in Arcserve Unified Data Protection detected     CVE-2024-0801     Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service
High     An attempt to exploit a vulnerability in Apache Solr detected     CVE-2023-50386     Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386
High     An attempt to exploit a vulnerability in Apache Solr detected     CVE-2023-50386     Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Nagios-XI-favorites.inc.php-SQL-Injection CVE-2024-24401 HTTP_CSU-Nagios-XI-favorites.inc.php-SQL-Injection Suspected Compromise
High Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 CVE-2023-50386 HTTP_CSU-Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection CVE-2024-23494 HTTP_CRL-Delta-Industrial-Automation-Diaenergie-GetDIAE_unListParameters-SQL-Injection Suspected Compromise
High Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability CVE-2024-24725 HTTP_CRL-Gibbon-School-Platform-Authenticated-PHP-Deserialization-Vulnerability Suspected Compromise
High Django-Usernamefield-Denial-Of-Service CVE-2023-46695 HTTP_CRL-Django-Usernamefield-Denial-Of-Service Suspected Compromise

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 CVE-2023-50386 File-Binary_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service CVE-2024-0801 File-TextId_Arcserve-Unified-Data-Protection-Asnative.dll-Validate-Denial-Of-Service Suspected Compromise

Zip File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 CVE-2023-50386 File-Zip_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 Suspected Compromise

Archive type identification from member names

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 CVE-2023-50386 File-Member-Name_Apache-Solr-Configsets-Arbitrary-File-Upload-CVE-2023-50386 Suspected Compromise

Updated detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Sundown-Malware No CVE/CAN HTTP_CSU-Sundown-Malware-Activity Botnet
Fingerprint regexp changed
High HTTP-Apache-Struts-Directory-Traversal-File-Disclosure CVE-2008-6505 HTTP_CSU-Apache-Struts-Encoded-Dot-Dot-Slash-Directory-Traversal Disclosure
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Low Java-Archive-File-Upload No CVE/CAN File-Binary_Java-Archive-File-Upload Possibly Unwanted Content
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
ApplicationByteDance
ApplicationTranscend

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListTanzania
IPListKenya
IPListDR Congo
IPListUganda
IPListJordan
IPListLebanon
IPListKuwait
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEgypt
IPListGreece
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListMoldova
IPListBelarus
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZimbabwe
IPListZambia
IPListLesotho
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListMayotte
IPListMozambique
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListBhutan
IPListIndia
IPListNepal
IPListMyanmar
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListTimor-Leste
IPListRussia
IPListMongolia
IPListAustralia
IPListNew Zealand
IPListPortugal
IPListGhana
IPListNigeria
IPListMauritania
IPListSão Tomé and Príncipe
IPListGibraltar
IPListSpain
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListJersey
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListNamibia
IPListFrench Guiana
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListMartinique
IPListBahamas
IPListAnguilla
IPListTrinidad and Tobago
IPListSt Kitts and Nevis
IPListAntigua and Barbuda
IPListSaint Lucia
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListMontserrat
IPListSaint Martin
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListFrench Polynesia
IPListTonga
IPListSamoa
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListSerbia
IPListSint Maarten
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for japaneast
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListMicrosoft Azure service for AzureHealthcareAPIs
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListMicrosoft Azure service for AzureSpringCloud
IPListMicrosoft Azure service for CognitiveServicesFrontend
IPListMicrosoft Azure service for KustoAnalytics
IPListMicrosoft Azure service for AzureMachineLearningInference
IPListMicrosoft Azure service for VideoIndexer
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListForcepoint Extended Drop IP Address List
IPListMicrosoft Azure service for Scuba
IPListSinkhole IP List
IPListMicrosoft Azure service for ActionGroup
IPListMicrosoft Azure service for ApiManagement
IPListMicrosoft Azure service for AppConfiguration
IPListMicrosoft Azure service for AppService
IPListMicrosoft Azure service for AppServiceManagement
IPListMicrosoft Azure service for AzureActiveDirectory_ServiceEndpoint
IPListMicrosoft Azure service for AzureAdvancedThreatProtection
IPListMicrosoft Azure service for AzureArcInfrastructure
IPListMicrosoft Azure service for AzureBackup
IPListMicrosoft Azure service for AzureBotService
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureCognitiveSearch
IPListMicrosoft Azure service for AzureConnectors
IPListMicrosoft Azure service for AzureContainerRegistry
IPListMicrosoft Azure service for AzureCosmosDB
IPListMicrosoft Azure service for AzureDatabricks
IPListMicrosoft Azure service for AzureDataExplorerManagement
IPListMicrosoft Azure service for AzureDigitalTwins
IPListMicrosoft Azure service for AzureEventGrid
IPListMicrosoft Azure service for AzureFrontDoor_FirstParty
IPListMicrosoft Azure service for AzureKeyVault
IPListMicrosoft Azure service for AzureMachineLearning
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureMonitor_Core
IPListMicrosoft Azure service for AzurePortal
IPListMicrosoft Azure service for AzureResourceManager
IPListMicrosoft Azure service for AzureSiteRecovery
IPListMicrosoft Azure service for BatchNodeManagement
IPListMicrosoft Azure service for CognitiveServicesManagement
IPListMicrosoft Azure service for DataFactory
IPListMicrosoft Azure service for DataFactoryManagement
IPListMicrosoft Azure service for EventHub
IPListMicrosoft Azure service for GatewayManager
IPListMicrosoft Azure service for GuestAndHybridManagement
IPListMicrosoft Azure service for HDInsight
IPListMicrosoft Azure service for LogicApps
IPListMicrosoft Azure service for LogicAppsManagement
IPListMicrosoft Azure service for MicrosoftContainerRegistry
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure service for PowerQueryOnline
IPListMicrosoft Azure service for ServiceBus
IPListMicrosoft Azure service for ServiceFabric
IPListMicrosoft Azure service for Sql
IPListMicrosoft Azure service for SqlManagement
IPListMicrosoft Azure service for StorageSyncService
IPListMicrosoft Azure service for AzureAttestation
IPListMicrosoft Azure datacenter for mexicocentral
IPListMicrosoft Azure datacenter for spaincentral
IPListMicrosoft Azure service for WindowsAdminCenter
IPListMicrosoft Azure service for AzureSentinel
SituationHTTP_CSU-Shared-Variables
ApplicationESPN
ApplicationSnapchat
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationNordVPN
ApplicationNeustar
Category tag application_usage Marketing added
Category tag application_usage Miscellaneous removed
Application Port "tcp/443 tls: free" -> "tcp/443 tls: mandatory"
TLS Match identification changed from false to true

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.