Release notes for update package 1870-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday April 24, 2025
MD5 CHECKSUM:    e4154e84765acb01471811943b6d51eb
SHA1 CHECKSUM:    136b1ff4382acff760e069da56cc7503ef80adf8
SHA256 CHECKSUM:    d878921ea357a9417fa51107a8375d15e4d7718ff52a592f6c1b4ecfac5aa7de


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in BentoML detected     CVE-2025-32375     BentoML-Runner-Server-RCE-CVE-2025-32375
High     An attempt to exploit a vulnerability in BentoML detected     CVE-2025-27520     BentoML-RCE-CVE-2025-27520
High     An attempt to exploit a vulnerability in WordPress Project Husky Products Filter Plugin detected     CVE-2025-1661     Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661
High     An attempt to exploit a vulnerability in Fortinet FortiOS     CVE-2024-45324     Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324 CVE-2024-45324 HTTP_CS-Fortinet-Multiple-Products-Certificate-Import-Format-String-CVE-2024-45324 Suspected Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661 CVE-2025-1661 HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Local-File-Inclusion-CVE-2025-1661 Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High BentoML-RCE-CVE-2025-27520 CVE-2025-27520 File-Text_BentoML-RCE-CVE-2025-27520 Suspected Compromise
High BentoML-Runner-Server-RCE-CVE-2025-32375 CVE-2025-32375 File-Text_BentoML-Runner-Server-RCE-CVE-2025-32375 Suspected Compromise

Updated detected attacks:

DNS UDP Server Message

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service CVE-2016-1286 DNS-UDP_ISC-Bind-Dname-RRSIG-Assertion-Failure-Denial-Of-Service Suspected Compromise
Detection mechanism updated
High ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service CVE-2016-9147 DNS-UDP_ISC-Bind-RRSIG-Record-Response-Assertion-Failure-Denial-Of-Service Suspected Compromise
Fingerprint regexp changed
High Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop CVE-2017-15908 DNS-UDP_Systemd-Resolved-DNS_Packet_Read_Type_Window-Infinite-Loop Suspected Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryBentoML

Updated objects:

TypeNameChanges
IPListIraq
IPListSaudi Arabia
IPListIran
IPListCyprus
IPListArmenia
IPListKenya
IPListDR Congo
IPListDjibouti
IPListUganda
IPListCentral African Republic
IPListSeychelles
IPListJordan
IPListKuwait
IPListOman
IPListQatar
IPListBahrain
IPListUnited Arab Emirates
IPListIsrael
IPListTürkiye
IPListEgypt
IPListGreece
IPListLatvia
IPListAzerbaijan
IPListLithuania
IPListGeorgia
IPListMoldova
IPListFinland
IPListUkraine
IPListNorth Macedonia
IPListHungary
IPListBulgaria
IPListAlbania
IPListPoland
IPListRomania
IPListKosovo
IPListZambia
IPListLesotho
IPListMauritius
IPListSouth Africa
IPListAfghanistan
IPListPakistan
IPListBangladesh
IPListTurkmenistan
IPListSri Lanka
IPListBhutan
IPListIndia
IPListBritish Indian Ocean Territory
IPListMyanmar
IPListUzbekistan
IPListKazakhstan
IPListKyrgyzstan
IPListFrench Southern Territories
IPListHeard and McDonald Islands
IPListVietnam
IPListThailand
IPListIndonesia
IPListLaos
IPListTaiwan
IPListPhilippines
IPListMalaysia
IPListChina
IPListHong Kong
IPListMacao
IPListSouth Korea
IPListJapan
IPListSingapore
IPListRussia
IPListAustralia
IPListChristmas Island
IPListNorfolk Island
IPListNew Zealand
IPListPortugal
IPListIvory Coast
IPListNigeria
IPListGibraltar
IPListChad
IPListWestern Sahara
IPListTunisia
IPListSpain
IPListDenmark
IPListIceland
IPListUnited Kingdom
IPListSwitzerland
IPListSweden
IPListThe Netherlands
IPListAustria
IPListBelgium
IPListGermany
IPListLuxembourg
IPListIreland
IPListMonaco
IPListFrance
IPListLiechtenstein
IPListIsle of Man
IPListSlovakia
IPListCzechia
IPListNorway
IPListItaly
IPListSlovenia
IPListMontenegro
IPListNamibia
IPListBouvet Island
IPListBarbados
IPListGreenland
IPListParaguay
IPListBrazil
IPListJamaica
IPListDominican Republic
IPListMartinique
IPListBahamas
IPListAnguilla
IPListTrinidad and Tobago
IPListSt Kitts and Nevis
IPListDominica
IPListAntigua and Barbuda
IPListSaint Lucia
IPListTurks and Caicos Islands
IPListBritish Virgin Islands
IPListSt Vincent and Grenadines
IPListGuadeloupe
IPListGrenada
IPListCayman Islands
IPListBelize
IPListGuatemala
IPListHonduras
IPListCosta Rica
IPListVenezuela
IPListEcuador
IPListColombia
IPListPanama
IPListArgentina
IPListChile
IPListBolivia
IPListPeru
IPListMexico
IPListNorthern Mariana Islands
IPListGuam
IPListPuerto Rico
IPListU.S. Virgin Islands
IPListAmerican Samoa
IPListCanada
IPListUnited States
IPListSerbia
IPListAntarctica
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon EC2
IPListGoogle Servers
IPListTOR relay nodes IP Address List
IPListBotnet IP Address List
IPListMalicious Site IP Address List
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ca-central-1
IPListAmazon EC2 ca-central-1
IPListAmazon AMAZON eu-west-2
IPListAmazon EC2 eu-west-2
IPListForcepoint Drop IP Address List
SituationHTTP_CSU-Shared-Variables
SituationHTTP_CSH-Shared-Variables
SituationHTTP_CS-Shared-Variables-For-Client-Stream-Context
Fingerprint regexp changed
ApplicationTOR
ApplicationNordVPN

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.