Release notes for update package 1875-5242

Certification Policy Update

This update package introduces significant changes to the Certification Policy (Inspection Policy). Customers using the Certification Policy should review and test these changes before applying them. To summarize, a large portion of situations from Possibly Unwated Content as well as a number of syntax errors and anomalies have been set to terminate. Three disabled rules show situations which need to be allowed for synthetic traffic generators. New exceptions to reduce false positives on web browsing have been added.

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Monday May 05, 2025
MD5 CHECKSUM:    3cf028aa380f61b1047d8e063f141aac
SHA1 CHECKSUM:    ff9093414b5d10e4aebe4eb7089e8a3a0ed8ecab
SHA256 CHECKSUM:    50a9f87cd44372d8ff4bf20cb94e8d35d02fca26a4ad33e5f7c72e8fcd88e21a


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in NodeBB     CVE-2025-29512     NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512
High     An attempt to exploit a vulnerability in NodeBB     CVE-2025-29512     NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512
High     An attempt to exploit a vulnerability in FlowiseAI Flowise detected     CVE-2025-26319     FlowiseAI-Flowise-Attachments-Directory-Traversal-CVE-2025-26319
High     An attempt to exploit a vulnerability in GLPI detected     CVE-2025-24799     GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799
High     An attempt to exploit a vulnerability in GLPI detected     CVE-2025-24799     GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799
High     An attempt to exploit a vulnerability in Fortinet FortiOS detected     CVE-2024-55591     Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
High     An attempt to exploit a vulnerability in Fortinet FortiOS detected     CVE-2024-55591     Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591
High     An attempt to exploit a vulnerability in Dnsmasq detected     CVE-2017-13704     Dnsmasq-Overly-Large-UDP-Packet-CVE-2017-13704
High     A suspicious Remote Desktop request was detected     CVE-2017-0176     EsteemAudit-Exploit-Tool
High     An attempt to exploit a vulnerability in bsnmpd detected     CVE-2014-1452     FreeBSD-bsnmpd-GetBulk-Request-Buffer-Overflow-CVE-2014-1452

Jump to: Detected Attacks System Policies Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 CVE-2025-29512 HTTP_CS-NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 Suspected Compromise

DNS UDP Client Message

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Dnsmasq-Overly-Large-UDP-Packet-CVE-2017-13704 CVE-2017-13704 DNS-UDP_Dnsmasq-Overly-Large-UDP-Packet-CVE-2017-13704 Potential Compromise

TCP Client Stream Unknown

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High EsteemAudit-Exploit-Tool CVE-2017-0176 Generic_CS-Microsoft-Windows-Remote-Desktop-Buffer-Overflow-CVE-2017-0176 Potential Compromise

SNMP UDP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High FreeBSD-bsnmpd-GetBulk-Request-Buffer-Overflow-CVE-2014-1452 CVE-2014-1452 SNMP-UDP_FreeBSD-bsnmpd-GetBulk-Request-Buffer-Overflow-CVE-2014-1452 Potential Compromise

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High FlowiseAI-Flowise-Attachments-Directory-Traversal-CVE-2025-26319 CVE-2025-26319 HTTP_CRL-FlowiseAI-Flowise-Attachments-Directory-Traversal-CVE-2025-26319 Suspected Compromise

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799 CVE-2025-24799 File-Text_GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799 Suspected Compromise

Identified Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799 CVE-2025-24799 File-TextId_GLPI-Project-GLPI-Inventory-handleAgent-SQL-Injection-CVE-2025-24799 Suspected Compromise

WebSocket Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591 CVE-2024-55591 WebSocket_CS-Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591 Suspected Compromise
High NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 CVE-2025-29512 WebSocket_CS-NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 Suspected Compromise

WebSocket Server Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591 CVE-2024-55591 WebSocket_SS-Fortinet-FortiOS-Authentication-Bypass-CVE-2024-55591 Suspected Compromise

Updated detected attacks:

HTTP Request Header Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High CrushFTP-Server-Side-Template-Injection-CVE-2024-4040 CVE-2024-4040 HTTP_CSH-CrushFTP-Server-Side-Template-Injection-CVE-2024-4040 Suspected Compromise
Detection mechanism updated
High CrushFTP-S3-Authentication-Bypass-CVE-2025-31161 CVE-2025-31161 HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-31161 Suspected Compromise
Name: HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-2825->HTTP_CSH-CrushFTP-S3-Authentication-Bypass-CVE-2025-31161
Description has changed
Fingerprint regexp changed

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971 CVE-2024-12971 HTTP_CRL-Pandora-FMS-chromium_path-Or-phantomjs_bin-RCE-CVE-2024-12971 Suspected Compromise
Fingerprint regexp changed

Text File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High JavaScript-Obfuscated-With-Hangul-Filler-Characters No CVE/CAN File-Text_JavaScript-Obfuscated-With-Hangul-Filler-Characters Suspected Compromise
Fingerprint regexp changed

SYSTEM POLICY CHANGES

UPDATED POLICIES:
NameChanges
Certification Policy

LIST OF OTHER CHANGES:

New objects:

TypeName
CategoryFlowiseAI Flowise
Categorybsnmpd
IPListWeChat IP Address List
IPListMicrosoft Azure datacenter for southeastus
IPListMicrosoft Azure service for AzureFrontDoor_MicrosoftSecurity

Updated objects:

TypeNameChanges
SituationHTTP_CSU-Shared-Variables
SituationHTTP_PSU-Shared-Variables
Fingerprint regexp changed
ApplicationOutlook-Web-Access
ApplicationMicrosoft-Office-365
ApplicationTOR
ApplicationDNS-Over-HTTPS
ApplicationNordVPN
ApplicationLinkedIn File Upload
ApplicationMicrosoft-Teams
SituationURL_List-DNS-Over-HTTPS
Detection mechanism updated
IPListTOR exit nodes IP Address List
IPListAmazon AMAZON
IPListAmazon CLOUDFRONT
IPListMicrosoft Azure datacenter for australiaeast
IPListMicrosoft Azure datacenter for australiasoutheast
IPListMicrosoft Azure datacenter for brazilsouth
IPListMicrosoft Azure datacenter for canadacentral
IPListTOR relay nodes IP Address List
IPListMicrosoft Azure datacenter for centralindia
IPListMicrosoft Azure datacenter for centraluseuap
IPListMicrosoft Azure datacenter for centralus
IPListMicrosoft Azure datacenter for eastasia
IPListMicrosoft Azure datacenter for eastus2euap
IPListMicrosoft Azure datacenter for eastus2
IPListMicrosoft Azure datacenter for eastus
IPListMicrosoft Azure datacenter for japaneast
IPListMicrosoft Azure datacenter for northeurope
IPListMicrosoft Azure datacenter for southcentralus
IPListMicrosoft Azure datacenter for southeastasia
IPListMicrosoft Azure datacenter for uksouth
IPListMicrosoft Office 365 Exchange Online
IPListMicrosoft Office 365 Skype for Business Online and Microsoft Teams
IPListMicrosoft Azure datacenter for westeurope
IPListMicrosoft Azure datacenter for westus2
IPListMicrosoft Azure datacenter for westus
IPListMicrosoft Azure datacenter
IPListZscaler IP Address List
IPListAmazon WORKSPACES_GATEWAYS
IPListAmazon CLOUDFRONT ap-northeast-1
IPListMalicious Site IP Address List
IPListMicrosoft Azure datacenter for indonesiacentral
IPListNordVPN Servers IP Address List
IPListAmazon AMAZON ap-southeast-2
IPListAmazon AMAZON ap-southeast-5
IPListAmazon WORKSPACES_GATEWAYS eu-west-3
IPListAmazon AMAZON us-east-1
IPListForcepoint Drop IP Address List
IPListMicrosoft Azure service for SerialConsole
IPListMicrosoft Azure service for AzureCloud
IPListMicrosoft Azure service for AzureFrontDoor_FirstParty
IPListMicrosoft Azure service for AzureKeyVault
IPListMicrosoft Azure service for AzureMonitor
IPListMicrosoft Azure service for AzureSignalR
IPListMicrosoft Azure service for DataFactory
IPListMicrosoft Azure service for DataFactoryManagement
IPListMicrosoft Azure service for LogicApps
IPListMicrosoft Azure service for LogicAppsManagement
IPListMicrosoft Azure service for PowerBI
IPListMicrosoft Azure datacenter for westus3
IPListMicrosoft Azure datacenter for usstagec
IPListMicrosoft Azure datacenter for polandcentral
IPListMicrosoft Azure datacenter for spaincentral
IPListMicrosoft Azure service for AzureWebPubSub

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.