Release notes for update package 1831-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday February 03, 2025
MD5 CHECKSUM:    fae2e9570190afa43518e928f983a0a6
SHA1 CHECKSUM:    509e96e67b093380ee764b632b67bdc64cdadeb7
SHA256 CHECKSUM:    a43ee34471103ad7a5f136783d4d31ae6478d2a597a10355c532c6251d554386


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Mitel SIP phone detected     CVE-2024-41710     Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
High     An attempt to exploit a vulnerability in PaperCut detected     CVE-2023-39143     Papercut-WebDAV-Path-Traversal-CVE-2023-39143

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Papercut-WebDAV-Path-Traversal-CVE-2023-39143 CVE-2023-39143 HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 CVE-2024-41710 HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 Suspected Compromise

Updated detected attacks:

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Critical HTTP-Apache-Backslash-Directory-Traversal CVE-2002-0661 HTTP_CSU-Apache-Backslash-Directory-Traversal Compromise
Fingerprint regexp changed
High HP-Intelligent-Management-Center-Reporting-Information-Disclosure No CVE/CAN HTTP_CSU-Path-Traversal-Sequence-In-File-Name Suspected Compromise
Name: HTTP_CSU-HP-IMC-Uam-Acmservletdownload-Information-Disclosure->HTTP_CSU-Path-Traversal-Sequence-In-File-Name
Comment has changed
Description has changed
Category tag group CVE2021 added
High HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure CVE-2013-4826 HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure Suspected Compromise
Name: HTTP_CSU-HP-Intelligent-Management-Center-Som-Sdfiledownload-Information-Disclosure->HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
Fingerprint regexp changed
High Generic-HTTP-Exploit No CVE/CAN HTTP_CSU-Suspicious-Request Suspected Compromise
Comment has changed
Description has changed
High TP-Link-Local-File-Disclosure-CVE-2015-3035 CVE-2015-3035 HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035 Suspected Disclosure
Fingerprint regexp changed
High SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 CVE-2023-47246 HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 Suspected Compromise
Fingerprint regexp changed
High SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 CVE-2024-57727 HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMitel SIP Phone

Updated objects:

TypeNameChanges
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListAkamai Servers
IPListTOR relay nodes IP Address List
IPListMicrosoft Intune IP Address List
IPListAmazon AMAZON ap-northeast-2
IPListAmazon EC2 ap-northeast-2
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON eu-west-1
IPListAmazon EC2 sa-east-1
IPListAmazon AMAZON us-east-1
IPListAmazon EC2 us-east-1
IPListAmazon AMAZON us-east-2
IPListAmazon EC2 us-east-2
IPListForcepoint Drop IP Address List
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListAmazon IVS_REALTIME
IPListAmazon IVS_REALTIME ap-northeast-2
SituationHTTP_CSU-Suspiciously-Long-URI-Path-Component
Name: HTTP_CSU-Suspiciously-Long-First-Path-URI-Component->HTTP_CSU-Suspiciously-Long-URI-Path-Component
Comment has changed
Fingerprint regexp changed
SituationHTTP_CSU-Shared-Variables
SituationHTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124
Description has changed
Attacker: connection_source->none
Victim: connection_destination->none
Category tag situation Obsolete added
Category tag os Any Operating System removed
Category tag hardware Any Hardware removed
Category tag application DrayTek Vigor removed
Category tag group CVE2021 removed
Category tag os_not_specific Any Operating System not specific removed
Category tag situation Suspected Compromise removed
Category tag group HTTP Correlation Dependency Group removed
Category tag group TCP Correlation Dependency Group removed
Category tag group HTTP URI Correlation Dependency Group removed
Category tag group Severity over 4 Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Fingerprint regexp changed
SituationHTTP_CRL-Shared-Variables
ApplicationAkamai-Infrastructure
ApplicationTOR
ApplicationManoto
ApplicationMicrosoft-Intune
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.