Release notes for update package 1411-5242

Rolling DFA upgrades

Starting from dynamic update 1393, the handling of situations appearing in multiple contexts is improved. To avoid the same traffic data to be matched against multiple DFA's, all DFA's are being modified. When large number of DFAs change at the same time, the temporary memory requirement during a policy installation or refresh increases. To avoid not enough available memory on low end NGFW appliances these changes on DFA's are implemented gradually over the course of 10 dynamic update packages. With low end NGFW appliances, especially N110 and N115, it is recommended to upgrade to NGFW version 6.8.2 or higher to better address new policy when there is not enough memory for both old and new policy. A large number of DFAs might change at the same time if there is a large gap between activating dynamic update packages and the subsequent policy refresh.

See knowledge base article 18570.

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Wednesday December 08, 2021
MD5 CHECKSUM:     d7efc35eefdf546058357cadf32d234b
SHA1 CHECKSUM:     572f7c6d524851d20fc33ce6b8331039ef659a5e
SHA256 CHECKSUM:     86816065d58fe6e0135c40276f960a7586abfce82b6cfceb1ca26b53776ae6f4

UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in Zoho Corporation ManageEngine ADManager Plus detected     CVE-2021-20130     Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload
High     An attempt to exploit a vulnerability in Grafana detected     No CVE/CAN Grafana-Local-File-Inclusion
High     Emotet download page was detected     No CVE/CAN Emotet-Download-Page
High     An attempt to exploit a vulnerability in Microsoft Exchange Server detected     CVE-2021-41349     Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in smartstore SmartStoreNET detected     CVE-2021-32608     Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Zoho ManageEngine ServiceDesk Plus detected     CVE-2021-44077     Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077
High     PyXie RAT infection traffic was detected     No CVE/CAN Pyxie-RAT-Infection-Traffic
High     An attempt to exploit a vulnerability in Foxit Software PDF Editor detected     CVE-2021-34833     Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Client Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload CVE-2021-20130 HTTP_CS-Zoho-Manageengine-Admanager-Plus-Passwordexpiryaction-Unrestricted-File-Upload Suspected Compromise

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Grafana-Local-File-Inclusion No CVE/CAN HTTP_CSU-Grafana-Local-File-Inclusion Suspected Compromise

HTTP Request Header Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Pyxie-RAT-Infection-Traffic No CVE/CAN HTTP_CSH-Pyxie-RAT-Infection-Traffic Suspected Botnet

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting CVE-2021-41349 HTTP_CRL-Microsoft-Exchange-Server-Reflected-Cross-Site-Scripting Suspected Compromise
High Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting CVE-2021-32608 HTTP_CRL-Smartstore-Smartstorenet-Forumpost-Stored-Cross-Site-Scripting Suspected Compromise
High Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077 CVE-2021-44077 HTTP_CRL-Zoho-Manageengine-Servicedesk-Plus-Remote-Code-Execution-CVE-2021-44077 Suspected Compromise

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Emotet-Download-Page No CVE/CAN File-Text_Emotet-Download-Page Suspected Botnet

PDF File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free CVE-2021-34833 File-PDF_Foxit-Reader-And-Editor-Annotation-CVE-2021-34833-Use-After-Free Potential Compromise

Updated detected attacks:

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow CVE-2014-0765 File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-GotoCmd-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411 CVE-2021-26411 File-Text_Internet_Explorer_Memory_Corruption_Vulnerability_CVE-2021-26411 Suspected Compromise
Detection mechanism updated
High Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow CVE-2014-0770 File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Username-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow CVE-2014-0764 File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-NodeName-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow CVE-2014-0767 File-Text_Advantech-WebAccess-SCADA-Webvact.ocx-Accesscode-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow CVE-2014-0991 File-Text_Advantech-WebAccess-SCADA-Projectname-Parameter-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow CVE-2014-0992 File-Text_Advantech-WebAccess-SCADA-Password-Parameter-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow CVE-2013-4164 File-Text_Ruby-On-Rails-JSON-Parse-Heap-Based-Buffer-Overflow Suspected Compromise
Fingerprint regexp changed

OLE File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Microsoft-Office-MSO-Buffer-Overflow CVE-2010-0243 File-OLE_Microsoft-Office-MSO-Buffer-Overflow Suspected Compromise
Detection mechanism updated
High Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Heap-Buffer-Overflow CVE-2021-38406 File-OLE_Delta-Industrial-Automation-DOPSoft-XLS-Mulblank-Record-Parsing-Heap-Buffer-Overflow Potential Compromise
Detection mechanism updated

Identified Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888 CVE-2012-1888 File-TextId_MS-Visio-DXF-File-Buffer-Overflow-CVE-2012-1888 Potential Compromise
Detection mechanism updated

LIST OF OTHER CHANGES:

New objects:

Type Name
Category Zoho Corporation ManageEngine ADManager Plus
Category SmartStoreNET
Situation HTTP_CSH-Native-PowerShell-User-Agent
Situation Windows 11
Situation Windows Server 2019
Situation Windows Server 2022

Updated objects:

Type Name Changes
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon EC2
IPList TOR relay nodes IP Address List
IPList Amazon EC2 af-south-1
IPList Amazon AMAZON ap-northeast-3
IPList Amazon EC2 ap-northeast-3
IPList Botnet IP Address List
IPList Malicious Site IP Address List
IPList Amazon AMAZON ap-south-1
IPList Amazon AMAZON cn-north-1
IPList Amazon EC2 cn-north-1
IPList Amazon AMAZON eu-north-1
IPList Amazon EC2 eu-north-1
IPList Amazon AMAZON us-east-1
IPList Amazon EC2 us-east-1
IPList Amazon AMAZON eu-south-1
IPList Amazon EC2 eu-south-1
IPList Zoom

DISCLAIMER AND COPYRIGHT

Copyright © 2021 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.