Release notes for update package 1787-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Tuesday October 08, 2024
MD5 CHECKSUM:     b3cbf90811bee683394e4bbaafe234de
SHA1 CHECKSUM:     5d96b2cbec49f1141e9b84e41a8047bd47a04a37
SHA256 CHECKSUM:     64f96a9717c59669ca91a2ecde8bfbce80365b15bbbcf0f5ddacb83f7c783e75


UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in Windows MSHTML Platform detected     CVE-2024-43573     Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573
High     An attempt to exploit a vulnerability in Windows MSHTML Platform detected     CVE-2024-43573     Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573 CVE-2024-43573 File-Text_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573 Suspected Compromise

PDF File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573 CVE-2024-43573 File-PDF_Windows-MSHTML-Platform-Spoofing-Vulnerability-CVE-2024-43573 Suspected Compromise

Updated detected attacks:

TCP Client Stream Unknown

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Apache-RocketMQ-Buildstartcommand-Command-Injection CVE-2023-33246 Generic_CS-Apache-RocketMQ-Buildstartcommand-Command-Injection Suspected Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Saml-XML-Signature-Wrapping No CVE/CAN HTTP_CRL-Saml-XML-Signature-Wrapping Suspected Compromise
Detection mechanism updated

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572 CVE-2024-43572 File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572 Suspected Compromise
Name: File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files->File-Text_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
Description has changed
Category tag group MS2024-10 added
Category tag group CVE2024 added
Fingerprint regexp changed

Identified Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572 CVE-2024-43572 File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572 Suspected Compromise
Name: File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files->File-TextId_GrimResource-Remote-Code-Execution-Via-Windows-MSC-Files-CVE-2024-43572
Description has changed
Category tag group MS2024-10 added
Category tag group CVE2024 added
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

Type Name
Category ruby-saml
Category MS2024-10
IPList Amazon DYNAMODB ap-southeast-6
IPList Yealink Meeting IP Address List
Situation IP_Yealink_Meeting
Application Yealink
Element Ref Application dependency from Yealink to Google
Element Ref Application dependency from Yealink to ReCaptcha
Element Ref Application dependency from Yealink to DTLS
Element Ref Application dependency from Yealink to Google-Accounts
Element Ref Application dependency from Yealink to Google-Hosted-Libraries

Updated objects:

Type Name Changes
Situation File_Blocked-Bad-SHA1-Hash
Detection mechanism updated
Situation URL_List-DNS-Over-HTTPS
Detection mechanism updated
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon EC2
IPList TOR relay nodes IP Address List
IPList Amazon DYNAMODB
IPList Botnet IP Address List
IPList Malicious Site IP Address List
IPList Amazon AMAZON ap-southeast-6
IPList Amazon EC2 ap-southeast-6
IPList NordVPN Servers IP Address List
IPList Amazon AMAZON eusc-de-east-1
IPList Forcepoint Drop IP Address List
IPList Google Cloud IP Address List for asia-southeast1
IPList Google Cloud IP Address List for europe-west1
IPList Google Cloud IP Address List for europe-west2
IPList Google Cloud IP Address List for europe-west3
IPList Google Cloud IP Address List for europe-west4
IPList Google Cloud IP Address List for global
IPList Google Cloud IP Address List for us-central1
IPList Google Cloud IP Address List for us-east1
IPList Google Cloud IP Address List for us-east4
IPList Google Cloud IP Address List for us-west1
IPList Google Cloud IP Address List for us-west4
Application TOR
Application DNS-Over-HTTPS
Application NordVPN

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.