Release notes for update package 1810-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Thursday December 12, 2024
MD5 CHECKSUM:     2a4848bdad7dca8d5e58ca90af422517
SHA1 CHECKSUM:     1d5bb0cf57c25fd64f39e3c2e21f3040d0ed867b
SHA256 CHECKSUM:     4bf6eea4431b7ad6f0312c92a89bc7b2b84342121bc0297000662fefd89a7f60


UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in LibreNMS detected     CVE-2024-51092     LibreNMS-Authenticated-Command-Injection-CVE-2024-51092
High     An attempt to exploit a vulnerability in LibreNMS detected     CVE-2024-51092     LibreNMS-Aboutcontroller.php-Command-Injection
High     An attempt to exploit a vulnerability in JetBrains TeamCity     CVE-2024-47951     JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting
High     An attempt to exploit a vulnerability in Grafana     CVE-2024-9264     Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion CVE-2024-9264 HTTP_CRL-Grafana-SQL-Expressions-Command-Injection-And-Local-File-Inclusion Suspected Compromise
High LibreNMS-Aboutcontroller.php-Command-Injection CVE-2024-51092 HTTP_CRL-LibreNMS-Aboutcontroller-Command-Injection Suspected Compromise
High JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting CVE-2024-47951 HTTP_CRL-JetBrains-TeamCity-Global-Settings-Stored-Cross-Site-Scripting Suspected Compromise
High LibreNMS-Authenticated-Command-Injection-CVE-2024-51092 CVE-2024-51092 HTTP_CRL-LibreNMS-Authenticated-Command-Injection-CVE-2024-51092 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955 CVE-2023-24955 HTTP_CS-Microsoft-Sharepoint-Server-Generateproxyassembly-Code-Injection-CVE-2023-24955 Suspected Compromise
Detection mechanism updated
High Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection CVE-2024-21318 HTTP_CS-Microsoft-Sharepoint-Server-Business-Data-Connectivity-Unsafe-Reflection Potential Compromise
Detection mechanism updated
High Microsoft-Sharepoint-Server-Unsafe-Deserialization-CVE-2024-30044 CVE-2024-30044 HTTP_CS-Microsoft-Sharepoint-Server-Potential-Unsafe-Deserialization Potential Compromise
Description has changed
High Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023 CVE-2024-38023 HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023 Potential Compromise
Name: HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38024->HTTP_CS-Microsoft-Sharepoint-Server-Unsafe-Reflection-CVE-2024-38023
Description has changed

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Apache-Airflow-Remote-Code-Execution-CVE-2020-11978 CVE-2020-11978 HTTP_CRL_Apache-Airflow-Remote-Code-Execution-CVE-2020-11978 Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

Updated objects:

Type Name Changes
Situation URL_List-DNS-Over-HTTPS
Detection mechanism updated
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon EC2
IPList TOR relay nodes IP Address List
IPList Botnet IP Address List
IPList Malicious Site IP Address List
IPList NordVPN Servers IP Address List
IPList Amazon AMAZON us-east-1
IPList Amazon EC2 us-east-1
IPList Forcepoint Drop IP Address List
Application TOR
Application DNS-Over-HTTPS
Application NordVPN

DISCLAIMER AND COPYRIGHT

Copyright © 2024 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.