Release notes for update package 1864-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Tuesday April 08, 2025
MD5 CHECKSUM:    50b06fd38de4a58a2f6e7521af81ca25
SHA1 CHECKSUM:    6af6293880360afdba4cd1cce482ea1ca31fa50a
SHA256 CHECKSUM:    fff43c7877347ed305f38eab46af7b3feede0af23dbeca8fd8ee743354c3332e


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in Windows Kerberos detected     CVE-2025-29809     Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
High     An attempt to exploit a vulnerability in Windows Kerberos detected     CVE-2025-29809     Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2025-29794     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
High     An attempt to exploit a vulnerability in Microsoft Sharepoint detected     CVE-2025-29794     Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794
High     An attempt to exploit a vulnerability in Ivanti Connect Secure detected     CVE-2025-22457     Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457
Low     A DTLS ClientHello request detected     CVE-2025-27480     Windows-Remote-Desktop-Services-Remote-Code-Execution-CVE-2025-27480

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

UDP Packet Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
Low Windows-Remote-Desktop-Services-Remote-Code-Execution-CVE-2025-27480 CVE-2025-27480 Generic_UDP-DTLS-ClientHello-Request Protocol Information
High Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809 CVE-2025-29809 Generic_UDP-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809 Potential Compromise

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809 CVE-2025-29809 Generic_CS-Windows-Kerberos-Security-Feature-Bypass-CVE-2025-29809 Potential Compromise

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457 CVE-2025-22457 HTTP_CSH-Ivanti-Connect-Secure-Buffer-Overflow-CVE-2025-22457 Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 CVE-2025-29794 File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 CVE-2025-29794 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-29794 Suspected Compromise

Updated detected attacks:

UDP Packet Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
Low OpenSSL-DTLS-Recursion-Denial-Of-Service CVE-2014-0221 Generic_UDP-DTLS-ServerHello-Request Protocol Information
Name: Generic_UDP-OpenSSL-DTLS-Hello-Request->Generic_UDP-DTLS-ServerHello-Request
Comment has changed
Description has changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Sharepoint-Accessserviceslisteventreceiver-Insecure-Deserialization CVE-2024-43464 HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization Suspected Compromise
Name: HTTP_CRL-Microsoft-Sharepoint-Workflow-Accessserviceslisteventreceiver-Insecure-Deserialization->HTTP_CRL-Microsoft-Sharepoint-Macro-Workflow-Insecure-Deserialization
Description has changed
Category tag group MS2025-04 added
Category tag group CVE2025 added

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 CVE-2025-21400 File-Text_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 Suspected Compromise
Detection mechanism updated

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 CVE-2025-21400 File-TextId_Microsoft-Sharepoint-Server-Remote-Code-Execution-CVE-2025-21400 Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryMS2025-04
IPListAmazon API_GATEWAY ap-east-2
SituationAnalyzer_DTLS-Connection-Flood

Updated objects:

TypeNameChanges
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListKenya
IPListSeychelles
IPListJordan
IPListLebanon
IPListOman
IPListQatar
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListGreece
IPListEstonia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListBelarus
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListMalawi
IPListBotswana
IPListMauritius
IPListRéunion
IPListSouth Africa
IPListPakistan
IPListBangladesh
IPListSri Lanka
IPListBhutan
IPListIndia
IPListNepal
IPListMyanmar
IPListKazakhstan
IPListKyrgyzstan
IPListCocos (Keeling) Islands
IPListVietnam
IPListThailand
IPListIndonesia
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListMacao
IPListCambodia
IPListSouth Korea
IPListJapan
IPListNorth Korea
IPListSingapore
IPListCook Islands
IPListTimor-Leste
IPListRussia
IPListMongolia
IPListAustralia
IPListNorfolk Island
IPListNew Zealand
IPListPortugal
IPListNigeria
IPListSpain
IPListMalta
IPListDenmark
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListFrance
IPListAndorra
IPListLiechtenstein
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListCroatia
IPListBosnia and Herzegovina
IPListAngola
IPListNamibia
IPListCabo Verde
IPListUruguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListCuba
IPListBahamas
IPListGuadeloupe
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListGuam
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListPalestine
IPListSerbia
IPListAntarctica
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListWebex Servers IP Address List
IPListAmazon EC2
IPListAmazon ROUTE53
IPListAmazon CLOUDFRONT
IPListTOR relay nodes IP Address List
IPListAmazon API_GATEWAY
IPListZscaler IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListAmazon AMAZON ap-southeast-6
IPListWebex Teams
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON us-east-2
IPListAmazon EC2 us-east-2
IPListAmazon AMAZON us-west-2
IPListAmazon EC2 us-west-2
IPListOracle Cloud Infrastructure ap-melbourne-1
IPListOracle Services Network us-ashburn-1
IPListOracle Cloud Infrastructure eu-amsterdam-1
IPListOracle Cloud Infrastructure mx-queretaro-1
IPListOracle Cloud Infrastructure us-phoenix-1
IPListOracle Cloud Infrastructure eu-jovanovac-1
Ressurrected
IPListAmazon EC2 me-west-1
IPListAmazon AMAZON me-west-1
SituationHTTP_CSH-Shared-Variables
SituationHTTP_PSU-Shared-Variables
Fingerprint regexp changed
ApplicationWebex
ApplicationTOR
ApplicationWebex-Teams
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.