Release notes for update package 1288-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Thursday October 15, 2020
MD5 CHECKSUM:     99d6801490fc7e10222884dd2ebfde54
SHA1 CHECKSUM:     0dc18e4a0098f1541cb9b837a93065e6d5384352
SHA256 CHECKSUM:     03292e8d710fe91245ccac7437a90782a79b751915d8ea5bb6232b04ff84cb98

UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in HAProxy detected     CVE-2020-11100     Haproxy-HTTP2-HPACK-Out-of-Bound-Write
High     An attempt to exploit a vulnerability in Advantech WebAccess/NMS detected     CVE-2020-10621     Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload
High     An attempt to exploit a vulnerability in Apache Tapestry detected     CVE-2020-13953     Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure
High     An attempt to exploit a vulnerability in Apache SkyWalking detected     CVE-2020-9483     Apache-SkyWalking-Graphql-Protocol-SQL-Injection
High     An attempt to exploit a vulnerability in MobileIron detected     CVE-2020-15505     MobileIron-Remote-Code-Execution-CVE-2020-15505
High     An attempt to exploit a vulnerability in Apache Airflow detected     CVE-2020-13944     Apache-Airflow-Origin-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Apache Software Foundation SkyWalking detected     CVE-2020-13921     Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection
High     An attempt to exploit a vulnerability in Adobe Systems Acrobat 2015 detected     CVE-2020-9715     Adobe-Acrobat-Reader-Esobject-Use-After-Free

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Haproxy-HTTP2-HPACK-Out-of-Bound-Write CVE-2020-11100 HTTP_CS-Haproxy-HTTP2-HPACK-Out-of-Bound-Write Suspected Compromise
High Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload CVE-2020-10621 HTTP_CS-Advantech-WebAccess-NMS-Fwupgradeaction-Arbitrary-File-Upload Suspected Compromise

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure CVE-2020-13953 HTTP_CSU_Apache-Tapestry-ContextAssetRequestHandler-Information-Disclosure Suspected Disclosure

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Apache-SkyWalking-Graphql-Protocol-SQL-Injection CVE-2020-9483 HTTP_CRL-Apache-SkyWalking-Graphql-Protocol-SQL-Injection Suspected Disclosure
High MobileIron-Remote-Code-Execution-CVE-2020-15505 CVE-2020-15505 HTTP_CRL-MobileIron-Remote-Code-Execution-CVE-2020-15505 Suspected Compromise
High Apache-Airflow-Origin-Cross-Site-Scripting CVE-2020-13944 HTTP_CRL-Apache-Airflow-Origin-Cross-Site-Scripting Suspected Compromise

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection CVE-2020-13921 File-Text_Apache-SkyWalking-Alarm-Wildcard-Search-Graphql-SQL-Injection Suspected Compromise

PDF File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Adobe-Acrobat-Reader-Esobject-Use-After-Free CVE-2020-9715 File-PDF_Adobe-Acrobat-Reader-Esobject-Use-After-Free Suspected Compromise

Updated detected attacks:

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
Low Generic-Shared-Variables No CVE/CAN HTTP_CRL-Shared-Variables System Inspections
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

Type Name
Category MobileIron
Category Apache Tapestry
Category Apache SkyWalking
Category Apache Airflow

Updated objects:

Type Name Changes
Network Element TOR exit nodes
IPList Amazon AMAZON ap-southeast-1
IPList Botnet IP Address List
IPList TOR relay nodes IP Address List
IPList Malicious Site IP Address List
IPList Amazon AMAZON af-south-1
IPList Amazon AMAZON us-east-1
IPList Amazon CLOUDFRONT
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON

DISCLAIMER AND COPYRIGHT

Copyright © 2020 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.