Release notes for update package 1835-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday February 11, 2025
MD5 CHECKSUM:    e3c6f5af7ce02acb3cd3688919add722
SHA1 CHECKSUM:    f701e417124ef8ef356f476df18f0afe049eb788
SHA256 CHECKSUM:    850e105996ea043f9080fdc4645cee5430c241e710a7232eaf537205c4477814


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2025-21400     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2025-21400     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400
High     A vulnerability in Microsoft Windows     CVE-2025-21376     Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2021-26420     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2021-26420     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

LDAP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376 CVE-2025-21376 LDAP_CS-Microsoft-Windows-LDAP-Remote-Code-Execution-Vulnerability-CVE-2025-21376 Potential Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 CVE-2025-21400 File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 Suspected Compromise
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420 CVE-2021-26420 File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 CVE-2025-21400 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 Suspected Compromise
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420 CVE-2021-26420 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2021-26420 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Nagios-XI--Windows-Winrm-Command-Injection No CVE/CAN HTTP_CS-Nagios-XI-Windows-Winrm-Command-Injection Suspected Compromise
Name: HTTP_CS-Nagios-XI--Windows-Winrm-Command-Injection->HTTP_CS-Nagios-XI-Windows-Winrm-Command-Injection

LDAP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow CVE-2011-0917 LDAP_CS-IBM-Lotus-Domino-LDAP-Bind-Request-Integer-Overflow Suspected Compromise
Detection mechanism updated

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Malicious-Internet-Shortcut-File No CVE/CAN File-Text_Suspicious-Internet-Shortcut-File Suspected Compromise
Description has changed
Category tag group MS2025-02 added
Category tag group CVE2025 added

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Malicious-Internet-Shortcut-File No CVE/CAN File-TextId_Suspicious-Internet-Shortcut-File Suspected Compromise
Description has changed
Category tag group MS2025-02 added
Category tag group CVE2025 added

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMS2025-02

Updated objects:

TypeNameChanges
Certificate AuthorityApple Root Certificate Authority
Marked for removal
IPListRwanda
IPListSomalia
IPListYemen
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListKenya
IPListSeychelles
IPListKuwait
IPListOman
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEgypt
IPListSudan
IPListGreece
IPListBurundi
IPListEstonia
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListMoldova
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZimbabwe
IPListZambia
IPListMalawi
IPListLesotho
IPListBotswana
IPListMauritius
IPListEswatini
IPListSouth Africa
IPListMozambique
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListIndia
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListPalau
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListMacao
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListRussia
IPListAustralia
IPListNew Zealand
IPListFiji
IPListLibya
IPListSenegal
IPListPortugal
IPListIvory Coast
IPListNigeria
IPListGibraltar
IPListSpain
IPListMalta
IPListDenmark
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListGuernsey
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListAngola
IPListUruguay
IPListBrazil
IPListDominican Republic
IPListCuba
IPListBahamas
IPListBermuda
IPListTrinidad and Tobago
IPListBritish Virgin Islands
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListPeru
IPListMexico
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListAntarctica
IPListSouth Sudan
IPListTOR exit nodes IP Address List
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListAmazon EC2 ap-northeast-3
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListGoogle Cloud IP Address List for me-central2
IPListForcepoint Drop IP Address List
IPListGoogle Cloud IP Address List for asia-northeast2
IPListGoogle Cloud IP Address List for asia-south1
IPListGoogle Cloud IP Address List for asia-southeast1
IPListGoogle Cloud IP Address List for australia-southeast2
IPListGoogle Cloud IP Address List for europe-southwest1
SituationFile-Text_Internet-Shortcut-File-Transfer
Fingerprint regexp changed
SituationLDAP_SS-Shared-Variables-For-Server-Stream-Context
Fingerprint regexp changed
SituationHTTP_PSU-Shared-Variables
Fingerprint regexp changed
SituationFile-TextId_Internet-Shortcut-File-Transfer
Fingerprint regexp changed
ApplicationTOR
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.