Release notes for update package 1893-5242

This update package improves the detection capabilities of the Forcepoint NGFW system.

RELEASE DATE:    Thursday June 19, 2025
MD5 CHECKSUM:    4228f421a61c3e328dcf14f8055a4844
SHA1 CHECKSUM:    8e4df1f3f233ea126119198550956447dc16b118
SHA256 CHECKSUM:    a256160aa77bab56c54e8a5fb39651a788a82b71214b0c561e9cffd280adb6ab


UPDATE CRITICALITY:    HIGH

MINIMUM SOFTWARE VERSIONS
- Forcepoint NGFW Security Management Center:    6.10.1.11125
- Forcepoint NGFW:    6.8.1.24103

List of detected attacks in this update package:

Risk levelDescriptionReferenceVulnerability
High     An attempt to exploit a vulnerability in F5 Networks BIG-IP detected     CVE-2025-31644     F5-Big-IP-iControl-REST-Command-Injection

Jump to: Detected Attacks

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

RiskVulnerability/SituationReferencesRelated FingerprintSituation Type
High F5-Big-IP-iControl-REST-Command-Injection CVE-2025-31644 HTTP_CRL-F5-Big-IP-iControl-REST-Command-Injection-CVE-2025-31644 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High LibreNMS-API-Token-Stored-Cross-Site-Scripting CVE-2024-49754 HTTP_CS-LibreNMS-API-Token-Stored-Cross-Site-Scripting Suspected Compromise
Fingerprint regexp changed
High Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass CVE-2024-47009 HTTP_CS-Ivanti-Avalanche-Securefilter-Dofilter-CVE-2024-47009-Authentication-Bypass Suspected Disclosure
Fingerprint regexp changed
High Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908 CVE-2024-47908 HTTP_CS-Ivanti-Cloud-Services-Application-SendAlert-Command-Injection-CVE-2024-47908 Suspected Compromise
Fingerprint regexp changed
High NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 CVE-2025-29512 HTTP_CS-NodeBB-IP-Blacklist-Stored-Cross-Site-Scripting-CVE-2025-29512 Suspected Compromise
Fingerprint regexp changed

Other Binary File Stream

RiskVulnerability/SituationReferencesRelated FingerprintSituation TypeChange Description
High Winace-Rar-And-Tar-Directory-Traversal-Vulnerability CVE-2006-0981 File-Binary_Path-Traversal-Via-Tar-Archive Suspected Compromise
Detection mechanism updated
High Pear-Archive-Tar-Phar-Protocol-Handling-Deserialization-Code-Execution CVE-2020-28948 File-Binary_Suspicious-File-Name-In-Tar-Archive Suspected Compromise
Description has changed
Category tag group CVE2025 added

HOW TO IMPORT AND ACTIVATE THE DYNAMIC UPDATE PACKAGE

  1. Download the dynamic update package, then make sure that the checksums for the original files and the files that you have downloaded match.
  2. In the Management Client, select Menu > File > Import > Import Update Packages.
  3. Browse to the file, select it, then click Import.
  4. Select  Configuration, then browse to Administration > Other Elements > Updates.
  5. Right-click the imported dynamic update package, then select Activate.
  6. When the activation is finished, refresh the policy on all NGFW Engines. If your policy uses a custom template, you might need to edit the policy.

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.