Release notes for update package 1829-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday January 27, 2025
MD5 CHECKSUM:    ea3ac20e5ba646dd5639c6f78e8273c8
SHA1 CHECKSUM:    a364c158ff44eb28f67efac9a397138a367ed04f
SHA256 CHECKSUM:    8be35feaadbcc8e2f1a01dac75d05edf5c88cf246de0dc5db6421873786a28cf


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Fancy Product Designer plugin for WordPress detected     CVE-2024-51818     Fancy-Product-Designer-Unauthenticated-SQL-Injection
High     An attempt to exploit a vulnerability in Apache Software Foundation OFBiz detected     CVE-2024-45507     Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507
High     An attempt to exploit a vulnerability in Microsoft Configuration Manager detected     CVE-2024-43468     Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468
High     An attempt to exploit a vulnerability in Oracle JDeveloper detected.     CVE-2022-21445     Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization
Low     A login failure in Cisco Remote Access VPN detected     CVE-2024-20481     Cisco-Remote-Access-VPN-Brute-Force-CVE-2024-20481
Low     An authentication failure in Forcepoint VPN detected     No CVE/CAN Forcepoint-SSLVPN-Password-Brute-Force

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468 CVE-2024-43468 HTTP_CS-Microsoft-Configuration-Manager-SQL-Injection-CVE-2024-43468 Suspected Compromise

TCP Server Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Forcepoint-SSLVPN-Password-Brute-Force No CVE/CAN Generic_SS-Forcepoint-SSLVPN-Authentication-Failure Protocol Information

HTTP Reply Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization CVE-2022-21445 HTTP_SHS-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Fancy-Product-Designer-Unauthenticated-SQL-Injection CVE-2024-51818 HTTP_CRL-Fancy-Product-Designer-Plugin-For-Wordpress-Unauthenticated-SQL-Injection Suspected Compromise
High Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507 CVE-2024-45507 HTTP_CRL-Apache-Ofbiz-SSRF-And-Remote-Code-Execution-CVE-2024-45507 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Cisco-Remote-Access-VPN-Brute-Force-CVE-2024-20481 CVE-2024-20481 File-TextId_Cisco-Remote-Access-VPN-Login-Failure Protocol Information

Updated detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization CVE-2022-21445 HTTP_CSU-Oracle-JDeveloper-ADF-Faces-Remote-Resource-Loader-Insecure-Deserialization Potential Compromise
Detection mechanism updated

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Unauthenticated-Remote-Code-Execution-In-Ignition CVE-2021-3129 HTTP_CRL-Unauthenticated-Remote-Code-Execution-In-Ignition Suspected Compromise
Name: HTTP_CS-Unauthenticated-Remote-Code-Execution-In-Ignition->HTTP_CRL-Unauthenticated-Remote-Code-Execution-In-Ignition
Category tag group TCP Correlation Dependency Group removed
Context has changed from HTTP Client Stream to HTTP Normalized Request-Line
High Palo-Alto-Expedition-Command-Injection-CVE-2024-9463 CVE-2024-9463 HTTP_CRL-Palo-Alto-Expedition-Command-Injection-CVE-2024-9463 Suspected Compromise
Category tag situation Suspected Compromise added
Category tag situation Potential Compromise removed
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High MS-Search-URI-Scheme No CVE/CAN File-Text_Suspicious-MS-Search-URI-Scheme-Link-In-HTML Suspected Compromise
Description has changed
Category tag group CVE2024 added
Category tag situation Suspected Compromise added
Category tag situation Potential Compromise removed
Fingerprint regexp changed
High MS-Search-URI-Scheme No CVE/CAN File-Text_MS-Search-URI-Scheme-Link-In-HTML Potential Compromise
Severity: 2->7
Category tag situation Potential Compromise added
Category tag group Severity over 4 Correlation Dependency Group added
Category tag situation Possibly Unwanted Content removed
High Information-Stealer-Using-Fake-Captcha No CVE/CAN File-Text_Information-Stealer-Using-Fake-Captcha Potential Compromise
Detection mechanism updated
High Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965 CVE-2020-13965 File-Text_Roundcube-Webmail-XML-Attachment-Cross-Site-Scripting-CVE-2020-13965 Potential Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMicrosoft Configuration Manager
CategoryForcepoint VPN
IPListAmazon IVS_REALTIME ap-northeast-2
SituationAnalyzer_Cisco-Remote-Access-VPN-Password-Brute-Force
SituationAnalyzer_Forcepoint-SSLVPN-Password-Brute-Force

Updated objects:

TypeNameChanges
Certificate Authoritywww.lh.pl
Marked for removal
Certificate AuthorityGlobalSign Atlas R3 DV TLS CA 2022 Q2
Marked for removal
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListIraq
IPListSaudi Arabia
IPListIran
IPListDR Congo
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListMauritius
IPListSouth Africa
IPListMadagascar
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListIndia
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListVietnam
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListPapua New Guinea
IPListPortugal
IPListNigeria
IPListMauritania
IPListSpain
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListSlovakia
IPListCzechia
IPListSan Marino
IPListItaly
IPListCroatia
IPListAngola
IPListParaguay
IPListBrazil
IPListDominican Republic
IPListMartinique
IPListSt Kitts and Nevis
IPListAruba
IPListBelize
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListCanada
IPListUnited States
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListWebex Servers IP Address List
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for northcentralus
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for southindia
IPListMicrosoft Azure datacenter for southeastasia
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westus2
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListAmazon AMAZON ap-northeast-1
IPListAmazon AMAZON ap-northeast-2
IPListAmazon EC2 ap-northeast-2
IPListWebex Teams
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON eu-west-2
IPListAmazon EC2 eu-west-2
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-east-2
IPListForcepoint Drop IP Address List
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListAmazon IVS_REALTIME
IPListGitHub Actions IP Address List
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureFrontDoor_FirstParty
IPListMicrosoft Azure service for AzureFrontDoor_Frontend
IPListMicrosoft Azure service for GuestAndHybridManagement
IPListMicrosoft Azure service for StorageSyncService
IPListMicrosoft Azure datacenter for mexicocentral
IPListMicrosoft Azure datacenter for newzealandnorth
IPListOracle Services Network us-phoenix-1
IPListMicrosoft Azure service for AzureSentinel
IPListOracle Cloud Infrastructure eu-jovanovac-1
Marked for removal
SituationHTTP_CSH-Shared-Variables
SituationE-Mail_HCS-Shared-Variables
Fingerprint regexp changed
SituationGeneric_CS-Shared-Variable-Fingerprints
Fingerprint regexp changed
ApplicationWebex
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationWebex-Teams
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.