Release notes for update package 1799-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday November 14, 2024
MD5 CHECKSUM:    92c7b7e2eb6914d490ac1e346d587fe8
SHA1 CHECKSUM:    9a2e39e95e97fb8ecb5007b9b0a3f281989d6057
SHA256 CHECKSUM:    38c4fd53e3a7f879e72872ecc4488807b8475dfd6bcc580bfe50b278d8c6616b


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in D-Link NAS appliances     CVE-2024-10914     D-Link-NAS-Appliance-Command-Injection
High     An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected     CVE-2024-8191     Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection
High     An attempt to exploit a vulnerability in Metabase     CVE-2021-41277     Metabase-GeoJSON-URL-Local-File-Inclusion

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Metabase-GeoJSON-URL-Local-File-Inclusion CVE-2021-41277 HTTP_CRL-Metabase-GeoJSON-URL-Local-File-Inclusion Suspected Compromise
High D-Link-NAS-Appliance-Command-Injection CVE-2024-10914 HTTP_CRL-D-Link-NAS-Appliance-Command-Injection Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection CVE-2024-8191 File-TextId_Ivanti-Endpoint-Manager-Etask-Waspreviouslymapped-SQL-Injection Suspected Compromise

Updated detected attacks:

Zip File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Corel-PDF-Fusion-XPS-Stack-Buffer-Overflow CVE-2013-3248 File-Zip_Long-Filename Potential Compromise
Fingerprint regexp changed
High Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read CVE-2018-16430 File-Zip_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read Potential Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralindia
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for japaneast
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for uksouth
IPListMicrosoft Azure datacenter for westcentralus
IPListMicrosoft Azure datacenter for westeurope
IPListAmazon GLOBALACCELERATOR
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON eu-central-1
IPListAmazon AMAZON eu-west-1
IPListMicrosoft Azure service for VideoIndexer
IPListAmazon AMAZON sa-east-1
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListMicrosoft Azure datacenter for southafricanorth
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureDatabricks
IPListAmazon AMAZON ap-east-2
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure datacenter for westus3
IPListMicrosoft Azure datacenter for newzealandnorth
SituationHTTP_CSU-Shared-Variables
ApplicationTOR

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.