Release notes for update package 1823-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday January 13, 2025
MD5 CHECKSUM:    aafeec0e3c3f3a146850fa62768fe064
SHA1 CHECKSUM:    d143269c61de66c0c0dc57ac414b7110b6a8cdcb
SHA256 CHECKSUM:    702d8817b1971d084890b6536c6fe5d2cc722e12a79f0a8013f511ef2990a44e


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Rockwell Automation ThinManager ThinServer detected     CVE-2024-45826     Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal
High     An attempt to exploit a vulnerability in Microsoft Office SharePoint Server detected     CVE-2024-43464     Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal CVE-2024-45826 HTTP_CRL-Rockwell-Automation-Thinmanager-Thinserver-API-Directory-Traversal Suspected Compromise
High Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization CVE-2024-43464 HTTP_CRL-Microsoft-Sharepoint-Workflow-Accessserviceslisteventreceiver-Insecure-Deserialization Suspected Compromise

Updated detected attacks:

TCP SMB Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High PetitPotam-NTLM-Relay-Attack CVE-2021-36942 SMB-TCP_PetitPotam-NTLM-Relay-Attack Suspected Compromise
Description has changed
Category tag group CVE2021 added

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Artica-Proxy-Squid.conf-Authentication-Bypass CVE-2024-2056 Generic_CS-Artica-Proxy-Squid.conf-Authentication-Bypass Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListTOR relay nodes IP Address List
IPListAmazon AMAZON ap-northeast-2
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ap-southeast-2
IPListAmazon AMAZON eu-central-1
IPListAmazon AMAZON eu-west-1
IPListAmazon AMAZON eu-west-2
IPListAmazon AMAZON eu-west-3
IPListAmazon AMAZON us-east-1
IPListForcepoint Drop IP Address List
IPListAmazon AMAZON us-west-1
IPListAmazon AMAZON ap-southeast-3
SituationHTTP_PSU-Shared-Variables
Fingerprint regexp changed
ApplicationTOR
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.