Release notes for update package 1858-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday March 31, 2025
MD5 CHECKSUM:    228214bfd9273cbd1b133b9b61141b92
SHA1 CHECKSUM:    f719095b172f58b27e41ebd6082c7a109c091678
SHA256 CHECKSUM:    0813d6829e44de3303fc15bf33df649d8cffca640699b708a722b2a48347738b


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Microsoft Windows detected     CVE-2025-21298     Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298
High     An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected     CVE-2024-50322     Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
High     An attempt to exploit a vulnerability in Ivanti Endpoint Manager detected     CVE-2024-50322     Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal
High     An attempt to exploit a vulnerability in 7-Zip detected     CVE-2024-11477     7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal CVE-2024-50322 HTTP_CRL-Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal CVE-2024-50322 File-Text_Ivanti-Endpoint-Manager-ECustomDataForm-OnSaveToDB-Directory-Traversal Suspected Compromise

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High 7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477 CVE-2024-11477 File-Binary_7-Zip-Zstandard-Decompression-Integer-Underflow-CVE-2024-11477 Suspected Compromise

RTF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298 CVE-2025-21298 File-RTF_Microsoft-OLE-UtOlePresStmToContentsStm-Use-After-Free-CVE-2025-21298 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187 CVE-2019-18187 HTTP_CS-Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187 Suspected Compromise
Name: HTTP_CS_Trend-Micro-OfficeScan-Zip-Directory-Traversal->HTTP_CS-Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Suspicious-Jsp-File-Upload No CVE/CAN File-Text_Suspicious-Jsp-File-Content-Upload Suspected Compromise
Detection mechanism updated
High Microsoft-Edge-RCE-CVE-2017-0236 CVE-2017-0236 File-Text_Microsoft-Edge-RCE-CVE-2017-0236 Potential Compromise
Detection mechanism updated
High Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption CVE-2016-7202 File-Text_Microsoft-Internet-Explorer-And-Edge-CVE-2016-7202-Memory-Corruption Potential Compromise
Detection mechanism updated
High Microsoft-Edge-Typedarray.sort-Use-After-Free CVE-2016-7288 File-Text_Microsoft-Edge-Typedarray.sort-Use-After-Free Potential Compromise
Detection mechanism updated

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read CVE-2018-16430 File-Binary_Gnu-Libextractor-Zip-File-Comment-Out-Of-Bounds-Read Potential Compromise
Fingerprint regexp changed

PDF File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free CVE-2021-28550 File-PDF_Adobe-Acrobat-Reader-Dc-Annots.api-Setprops-Use-After-Free Potential Compromise
Detection mechanism updated

Zip File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Php-Group-Php-Zip-Integer-Overflow CVE-2015-2331 File-Zip_Php-Group-Php-Zip-Integer-Overflow Potential Compromise
Fingerprint regexp changed
High Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187 CVE-2019-18187 File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187 Suspected Compromise
Name: File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal->File-Zip_Trend-Micro-OfficeScan-Zip-Directory-Traversal-CVE-2019-18187

LIST OF OTHER CHANGES:

Updated objects:

TypeNameChanges
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListDjibouti
IPListCentral African Republic
IPListSeychelles
IPListOman
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEthiopia
IPListEritrea
IPListEgypt
IPListGreece
IPListBurundi
IPListEstonia
IPListLatvia
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListUkraine
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListZambia
IPListComoros
IPListMalawi
IPListBotswana
IPListMauritius
IPListEswatini
IPListSouth Africa
IPListMozambique
IPListMadagascar
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListBhutan
IPListIndia
IPListNepal
IPListMyanmar
IPListKazakhstan
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListBrunei
IPListMacao
IPListCambodia
IPListSouth Korea
IPListJapan
IPListSingapore
IPListTimor-Leste
IPListRussia
IPListAustralia
IPListChristmas Island
IPListNew Zealand
IPListFiji
IPListLibya
IPListCameroon
IPListCongo Republic
IPListPortugal
IPListGhana
IPListEquatorial Guinea
IPListNigeria
IPListGuinea-Bissau
IPListBenin
IPListGabon
IPListGibraltar
IPListGambia
IPListGuinea
IPListTunisia
IPListSpain
IPListMalta
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListLiechtenstein
IPListIsle of Man
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListAngola
IPListNamibia
IPListBarbados
IPListCabo Verde
IPListGuyana
IPListFrench Guiana
IPListSuriname
IPListParaguay
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListCuba
IPListMartinique
IPListBahamas
IPListBermuda
IPListAnguilla
IPListTrinidad and Tobago
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListTurks and Caicos Islands
IPListAruba
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListMontserrat
IPListSaint Martin
IPListSaint Barthélemy
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListEl Salvador
IPListGuatemala
IPListHonduras
IPListNicaragua
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListHaiti
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListFrench Polynesia
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListCanada
IPListUnited States
IPListSerbia
IPListAntarctica
IPListSint Maarten
IPListCuraçao
IPListBonaire, Sint Eustatius, and Saba
IPListTOR exit nodes IP Address List
IPListFacebook Servers
IPListTOR relay nodes IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
ApplicationFacebook
ApplicationTOR
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.