Release notes for update package 1772-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday September 05, 2024
MD5 CHECKSUM:    cd12d9bef1001e292a770f403f17a454
SHA1 CHECKSUM:    43333d1851695489b9ac0ae9f94f07207920d400
SHA256 CHECKSUM:    3560598283c59525641536ae61e7ea0d49a3cc9183569df1a10dcdfb62d0b2a3


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Ivanti Avalanche detected     CVE-2024-38652     Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal
High     An attempt to exploit a vulnerability in AVTECH IP camera AVM1203 detected     CVE-2024-7029     Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029
High     An attempt to exploit a vulnerability in National Instruments FlexLogger detected     CVE-2024-4044     NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization
High     An attempt to exploit a vulnerability in GitLab detected     CVE-2023-6502     Gitlab-Gollum-Link-Regex-Denial-Of-Service
High     An attempt to exploit a vulnerability in an AXIS device detected     CVE-2013-3543     Axis-Media-Control-Unsafe-ActiveX-Method
High     An attempt to exploit a vulnerability in Microsoft XML Core Services detected     CVE-2006-5745     HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution
High     An attempt to exploit a vulnerability in AVTECH IP camera firmware detected     No CVE/CAN Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities
High     ARMBot Botnet traffic has been detected     No CVE/CAN ARMBot-Botnet
High     A possible attempt to exploit a vulnerability in multiple versions of the AVTECH IP camera firmware     No CVE/CAN Avtech-IP-Camera-Cgi-Bin-Nobody-Access
High     Lumma Stealer command-and-control traffic detected     No CVE/CAN Lumma-Stealer-C2-Activity

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Lumma-Stealer-C2-Activity No CVE/CAN HTTP_CSU-Lumma-Stealer-C2-Activity Spyware, Malware and Adware
High Avtech-IP-Camera-Cgi-Bin-Nobody-Access No CVE/CAN HTTP_CSU-Avtech-IP-Camera-Cgi-Bin-Nobody-Access Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal CVE-2024-38652 HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Deleteskin-Directory-Traversal Suspected Compromise
High ARMBot-Botnet No CVE/CAN HTTP_CRL-ARMBot-Botnet Suspected Compromise
High Gitlab-Gollum-Link-Regex-Denial-Of-Service CVE-2023-6502 HTTP_CRL-Gitlab-Gollum-Link-Regex-Denial-Of-Service Suspected Compromise
High Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029 CVE-2024-7029 HTTP_CRL-Avtech-IP-Camera-AVM1203-Command-Injection-CVE-2024-7029 Suspected Compromise
High Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities No CVE/CAN HTTP_CRL-Avtech-IP-Camera-Multiple-Command-Injection-Vulnerabilities Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High HTTP-Microsoft-Xml-Core-Services-ActiveX-Control-Code-Exectution CVE-2006-5745 File-Text_Microsoft-Xml-Core-Services-ActiveX-Control-Code-Execution-With-Open Suspected Compromise
High Axis-Media-Control-Unsafe-ActiveX-Method CVE-2013-3543 File-Text_Axis-Media-Control-Unsafe-ActiveX-Method Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization CVE-2024-4044 File-TextId_NI-Flexlogger-Flxproj-File-Parsedatavalueasxmlhierarchy-Insecure-Deserialization Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High QNAP-Multiple-Products-Privwizard-Username-Command-Injection CVE-2024-32766 HTTP_CRL-QNAP-Multiple-Products-Privwizard-Username-Command-Injection Suspected Compromise
Fingerprint regexp changed

PNG File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow CVE-2007-2365 File-PNG_Adobe-Products-PNG-File-Handling-Stack-Buffer-Overflow Suspected Compromise
Category tag situation Suspected Compromise added
Category tag situation Potential Compromise removed
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryNational Instruments FlexLogger
CategoryNational Instruments InstrumentStudio
CategoryShutter
CategoryLumma Stealer
CategoryAVTECH IP camera AVM1203
CategoryAVTECH IP camera
IPListGoogle Cloud IP Address List for northamerica-south1
SituationFile-Name_File-Name-Beginning-With-Possible-Command-Injection-Characters

Updated objects:

TypeNameChanges
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListRwanda
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListKenya
IPListCentral African Republic
IPListSeychelles
IPListJordan
IPListLebanon
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEthiopia
IPListEgypt
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListÅland Islands
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZimbabwe
IPListMauritius
IPListSouth Africa
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListTajikistan
IPListBhutan
IPListIndia
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListMacao
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListRussia
IPListAustralia
IPListNew Zealand
IPListPortugal
IPListLiberia
IPListGhana
IPListNigeria
IPListTogo
IPListGibraltar
IPListChad
IPListTunisia
IPListSpain
IPListMorocco
IPListDenmark
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListIsle of Man
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListMontenegro
IPListCroatia
IPListBouvet Island
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListCuba
IPListBahamas
IPListBermuda
IPListTrinidad and Tobago
IPListSaint Lucia
IPListTurks and Caicos Islands
IPListAruba
IPListBritish Virgin Islands
IPListCayman Islands
IPListBelize
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListCanada
IPListUnited States
IPListSerbia
IPListAntarctica
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListZscaler IP Address List
IPListAmazon AMAZON ap-northeast-1
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-south-1
IPListAmazon AMAZON ap-southeast-1
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ap-southeast-2
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListForcepoint Drop IP Address List
SituationHTTP_CRL-Shared-Variables
ApplicationKaspersky-AV
Category tag application_group Application Routing added
ApplicationWeChat
Category tag application_group Application Routing added
ApplicationAnyDesk
Category tag application_group Application Routing added
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationProtonVPN
Category tag application_group Application Routing added
ApplicationWebex-Teams
Category tag application_group Application Routing added
ApplicationNordVPN
ApplicationLinkedIn-Learning

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.