Release notes for update package 1831-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Monday February 03, 2025
MD5 CHECKSUM:     0f25c8c330520393dc5f3172e0dbe429
SHA1 CHECKSUM:     a365adf83ff87d89dc412800613d1b21e1813c91
SHA256 CHECKSUM:     99ac7fa235eafcf5704736c4018414dfb24db6084e3bb7ba7c9e7b7a2c15da4e


UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in Mitel SIP phone detected     CVE-2024-41710     Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710
High     An attempt to exploit a vulnerability in PaperCut detected     CVE-2023-39143     Papercut-WebDAV-Path-Traversal-CVE-2023-39143

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Papercut-WebDAV-Path-Traversal-CVE-2023-39143 CVE-2023-39143 HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143 Suspected Compromise

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 CVE-2024-41710 HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 Suspected Compromise

Updated detected attacks:

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
Critical HTTP-Apache-Backslash-Directory-Traversal CVE-2002-0661 HTTP_CSU-Apache-Backslash-Directory-Traversal Compromise
Fingerprint regexp changed
High HP-Intelligent-Management-Center-Reporting-Information-Disclosure No CVE/CAN HTTP_CSU-Path-Traversal-Sequence-In-File-Name Suspected Compromise
Name: HTTP_CSU-HP-IMC-Uam-Acmservletdownload-Information-Disclosure->HTTP_CSU-Path-Traversal-Sequence-In-File-Name
Comment has changed
Description has changed
Category tag group CVE2021 added
High HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure CVE-2013-4826 HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure Suspected Compromise
Name: HTTP_CSU-HP-Intelligent-Management-Center-Som-Sdfiledownload-Information-Disclosure->HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure
Fingerprint regexp changed
High Generic-HTTP-Exploit No CVE/CAN HTTP_CSU-Suspicious-Request Suspected Compromise
Comment has changed
Description has changed
High TP-Link-Local-File-Disclosure-CVE-2015-3035 CVE-2015-3035 HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035 Suspected Disclosure
Fingerprint regexp changed
High SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 CVE-2023-47246 HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 Suspected Compromise
Fingerprint regexp changed
High SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 CVE-2024-57727 HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 Suspected Compromise
Fingerprint regexp changed

LIST OF OTHER CHANGES:

New objects:

Type Name
Category Mitel SIP Phone

Updated objects:

Type Name Changes
IPList TOR exit nodes IP Address List
IPList Amazon AMAZON
IPList Amazon EC2
IPList Akamai Servers
IPList TOR relay nodes IP Address List
IPList Microsoft Intune IP Address List
IPList Amazon AMAZON ap-northeast-2
IPList Amazon EC2 ap-northeast-2
IPList Botnet IP Address List
IPList Malicious Site IP Address List
IPList NordVPN Servers IP Address List
IPList Amazon AMAZON eu-west-1
IPList Amazon EC2 sa-east-1
IPList Amazon AMAZON us-east-1
IPList Amazon EC2 us-east-1
IPList Amazon AMAZON us-east-2
IPList Amazon EC2 us-east-2
IPList Forcepoint Drop IP Address List
IPList Amazon AMAZON us-west-2
IPList Amazon EC2 us-west-2
IPList Amazon IVS_REALTIME
IPList Amazon IVS_REALTIME ap-northeast-2
Situation HTTP_CSU-Suspiciously-Long-URI-Path-Component
Name: HTTP_CSU-Suspiciously-Long-First-Path-URI-Component->HTTP_CSU-Suspiciously-Long-URI-Path-Component
Comment has changed
Fingerprint regexp changed
Situation HTTP_CSU-Shared-Variables
Situation HTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124
Description has changed
Attacker: connection_source->none
Victim: connection_destination->none
Category tag situation Obsolete added
Category tag os Any Operating System removed
Category tag hardware Any Hardware removed
Category tag application DrayTek Vigor removed
Category tag group CVE2021 removed
Category tag os_not_specific Any Operating System not specific removed
Category tag situation Suspected Compromise removed
Category tag group HTTP Correlation Dependency Group removed
Category tag group TCP Correlation Dependency Group removed
Category tag group HTTP URI Correlation Dependency Group removed
Category tag group Severity over 4 Correlation Dependency Group removed
Category tag group TCP Client Traffic removed
Fingerprint regexp changed
Situation HTTP_CRL-Shared-Variables
Application Akamai-Infrastructure
Application TOR
Application Manoto
Application Microsoft-Intune
Application NordVPN

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.