Release notes for update package 1853-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Friday March 21, 2025
MD5 CHECKSUM:    42a830c531cfada3eac9b2b6f270ce1b
SHA1 CHECKSUM:    0ad1ebeb59655bd8b051b5c767ae11439fa12304
SHA256 CHECKSUM:    84bcb54ee89d0843e98e784acdcc97418f2698755c37927003d45b87e7c71857


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Veeam Backup and Replication detected     CVE-2025-23120     Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120
High     An attempt to exploit a vulnerability in Edimax IC-7100 IP cameras detected     CVE-2025-1316     Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316
High     An attempt to exploit a vulnerability in WordPress WP Shortcodes Plugin detected     CVE-2025-0370     Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370
High     An attempt to exploit a vulnerability in Adobe ColdFusion detected     CVE-2024-53961     Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961
High     An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected     CVE-2024-50330     Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330
High     An attempt to exploit a vulnerability in Fortinet FortiManager detected     CVE-2024-48884     Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884
High     An attempt to exploit a vulnerability in LibreOffice LibreOffice detected     CVE-2024-12425     LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425
High     An attempt to exploit a vulnerability in Apache Airflow detected     CVE-2020-11981     Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981 CVE-2020-11981 Generic_CS-Apache-Airflow-Celery-Broker-RCE-CVE-2020-11981 Suspected Compromise
High Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884 CVE-2024-48884 Generic_CS-Fortinet-Multiple-Products-Csfd-Directory-Traversal-CVE-2024-48884 Suspected Compromise
High Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120 CVE-2025-23120 Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2025-23120 Suspected Compromise

HTTP Request URI

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961 CVE-2024-53961 HTTP_CSU-Adobe-ColdFusion-InvokeLoggingModule-Directory-Traversal-CVE-2024-53961 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330 CVE-2024-50330 HTTP_CRL-Ivanti-Endpoint-Manager-DPIDatabase-GetComputerID-SQL-Injection-CVE-2024-50330 Suspected Compromise
High Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370 CVE-2025-0370 HTTP_CRL-Wordpress-WP-Shortcodes-Plugin-Stored-Cross-Site-Scripting-CVE-2025-0370 Suspected Compromise
High Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316 CVE-2025-1316 HTTP_CRL-Edimax-IC-7100-IP-Camera-OS-Command-Injection-CVE-2025-1316 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425 CVE-2024-12425 File-TextId_LibreOffice-EmbeddedFontsHelper-Directory-Traversal-CVE-2024-12425 Suspected Compromise

Updated detected attacks:

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711 CVE-2024-40711 Generic_CS-Veeam-Backup-And-Replication-Insecure-Deserialization-CVE-2024-40711 Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryEdimax IP Camera
ApplicationWeCom
SituationWeCom URL List

Updated objects:

TypeNameChanges
SituationFile_Blocked-Known-Bad-SHA1-2
Detection mechanism updated
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListTOR relay nodes IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-south-1
IPListAmazon EC2 ap-south-1
IPListNordVPN Servers IP Address List
IPListForcepoint Drop IP Address List
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
ApplicationTOR
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.