Release notes for update package 1573-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Friday March 31, 2023
MD5 CHECKSUM:     3d79ca788ca5edc353931c93b2350676
SHA1 CHECKSUM:     16bf009c9ffa0d5748012b85e5755f6189c8a25b
SHA256 CHECKSUM:     950f7fc18bbe34c8df3a1ec2cb4574bc909d7f624bf520099ecad7c07fe27179

UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in WordPress Project Metform Elementor Contact Form Builder Plugin detected     CVE-2023-0084     Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Ivanti Avalanche detected     CVE-2022-44574     Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass
High     An attempt to exploit a vulnerability in XWiki detected.     CVE-2023-26475     Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting CVE-2023-0084 HTTP_CRL-Wordpress-Metform-Elementor-Plugin-Form-data.php-Stored-Cross-Site-Scripting Potential Compromise
High Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass CVE-2022-44574 HTTP_CRL-Ivanti-Avalanche-Remote-Control-Server-Setproperty-Authentication-Bypass Suspected Compromise
High Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection CVE-2023-26475 HTTP_CRL-Xwiki.org-Xwiki-TextAreaClass-displayView-Code-Injection Suspected Compromise

Updated detected attacks:

HTTP Request Header Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Generic-HTTP-Exploit No CVE/CAN HTTP_CHS-Suspicious-Host Suspected Compromise
Detection mechanism updated
High Haproxy-Empty-Header-Name-Access-Control-Bypass CVE-2023-25725 HTTP_CSH-Haproxy-Empty-Header-Name-Access-Control-Bypass Potential Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution CVE-2021-1497 HTTP_CRL-Cisco-Hyperflex-Hx-Auth-Handling-Remote-Command-Execution Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

Updated objects:

Type Name Changes
Situation File_Malware-MD5
Detection mechanism updated
Situation File_Malware-SHA1
Detection mechanism updated
Situation URL_List-Known-Hostile-URL
Detection mechanism updated
IPList Rwanda
IPList Saudi Arabia
IPList Cyprus
IPList Armenia
IPList Djibouti
IPList Seychelles
IPList Lebanon
IPList Kuwait
IPList Qatar
IPList United Arab Emirates
IPList Israel
IPList Turkey
IPList Egypt
IPList Greece
IPList Latvia
IPList Lithuania
IPList Moldova
IPList Belarus
IPList Finland
IPList Ukraine
IPList North Macedonia
IPList Hungary
IPList Bulgaria
IPList Albania
IPList Poland
IPList Romania
IPList Botswana
IPList Mauritius
IPList South Africa
IPList Pakistan
IPList Bangladesh
IPList Tajikistan
IPList India
IPList Nepal
IPList Myanmar
IPList Uzbekistan
IPList Kazakhstan
IPList Kyrgyzstan
IPList Vietnam
IPList Thailand
IPList Indonesia
IPList Laos
IPList Taiwan
IPList Philippines
IPList Malaysia
IPList China
IPList Hong Kong
IPList Cambodia
IPList South Korea
IPList Japan
IPList North Korea
IPList Singapore
IPList Russia
IPList Australia
IPList New Zealand
IPList Portugal
IPList Ivory Coast
IPList Nigeria
IPList Gibraltar
IPList Spain
IPList Denmark
IPList Iceland
IPList United Kingdom
IPList Switzerland
IPList Sweden
IPList Netherlands
IPList Austria
IPList Belgium
IPList Germany
IPList Luxembourg
IPList Ireland
IPList France
IPList Slovakia
IPList Czechia
IPList Norway
IPList San Marino
IPList Italy
IPList Slovenia
IPList Croatia
IPList Paraguay
IPList Uruguay
IPList Brazil
IPList Jamaica
IPList Dominican Republic
IPList Trinidad and Tobago
IPList Nicaragua
IPList Costa Rica
IPList Venezuela
IPList Ecuador
IPList Colombia
IPList Panama
IPList Haiti
IPList Argentina
IPList Chile
IPList Bolivia
IPList Peru
IPList Mexico
IPList Puerto Rico
IPList Canada
IPList United States
IPList Palestine
IPList Serbia
IPList Sint Maarten
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon S3
IPList Amazon EC2
IPList TOR relay nodes IP Address List
IPList Microsoft Office 365 Common and Office Online
IPList Botnet IP Address List
IPList Malicious Site IP Address List
IPList NordVPN Servers IP Address List
IPList Amazon AMAZON us-east-1
IPList Amazon EC2 us-east-1
IPList Amazon AMAZON us-west-1
IPList Amazon S3 us-west-1

DISCLAIMER AND COPYRIGHT

Copyright © 2023 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.