This update package improves the detection capabilities of the Forcepoint LLM system.
RELEASE DATE: |
Monday February 03, 2025 |
MD5 CHECKSUM: |
0f25c8c330520393dc5f3172e0dbe429 |
SHA1 CHECKSUM: |
a365adf83ff87d89dc412800613d1b21e1813c91 |
SHA256 CHECKSUM: |
99ac7fa235eafcf5704736c4018414dfb24db6084e3bb7ba7c9e7b7a2c15da4e |
UPDATE CRITICALITY: HIGH
List of detected attacks in this update package:
Jump to: Detected Attacks Other Changes
DETECTED ATTACKS
New detected attacks:
HTTP Request URI
Risk |
Vulnerability/Situation |
References |
Related Fingerprint |
Situation Type |
High |
Papercut-WebDAV-Path-Traversal-CVE-2023-39143 |
CVE-2023-39143 |
HTTP_CSU-Papercut-WebDAV-Path-Traversal-CVE-2023-39143 |
Suspected Compromise |
HTTP Normalized Request-Line
Risk |
Vulnerability/Situation |
References |
Related Fingerprint |
Situation Type |
High |
Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 |
CVE-2024-41710 |
HTTP_CRL-Mitel-SIP-Phone-Argument-Injection-CVE-2024-41710 |
Suspected Compromise |
Updated detected attacks:
HTTP Request URI
Risk |
Vulnerability/Situation |
References |
Related Fingerprint |
Situation Type |
Change Description |
Critical |
HTTP-Apache-Backslash-Directory-Traversal |
CVE-2002-0661 |
HTTP_CSU-Apache-Backslash-Directory-Traversal |
Compromise |
Fingerprint regexp changed |
|
High |
HP-Intelligent-Management-Center-Reporting-Information-Disclosure |
No CVE/CAN |
HTTP_CSU-Path-Traversal-Sequence-In-File-Name |
Suspected Compromise |
Name: HTTP_CSU-HP-IMC-Uam-Acmservletdownload-Information-Disclosure->HTTP_CSU-Path-Traversal-Sequence-In-File-Name |
Comment has changed |
Description has changed |
Category tag group CVE2021 added |
|
High |
HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure |
CVE-2013-4826 |
HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure |
Suspected Compromise |
Name: HTTP_CSU-HP-Intelligent-Management-Center-Som-Sdfiledownload-Information-Disclosure->HTTP_CSU-HP-Intelligent-Management-Center-Sdfiledownload-Information-Disclosure |
Fingerprint regexp changed |
|
High |
Generic-HTTP-Exploit |
No CVE/CAN |
HTTP_CSU-Suspicious-Request |
Suspected Compromise |
Comment has changed |
Description has changed |
|
High |
TP-Link-Local-File-Disclosure-CVE-2015-3035 |
CVE-2015-3035 |
HTTP_CSU-TP-Link-Local-File-Disclosure-CVE-2015-3035 |
Suspected Disclosure |
Fingerprint regexp changed |
|
High |
SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 |
CVE-2023-47246 |
HTTP_CSU-SysAid-On-Premise-Directory-Traversal-CVE-2023-47246 |
Suspected Compromise |
Fingerprint regexp changed |
|
High |
SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 |
CVE-2024-57727 |
HTTP_CSU-SimpleHelp-Unauthenticated-Path-Traversal-CVE-2024-57727 |
Suspected Compromise |
Fingerprint regexp changed |
|
LIST OF OTHER CHANGES:
New objects:
Type |
Name |
Category |
Mitel SIP Phone |
Updated objects:
Type |
Name |
Changes |
IPList |
TOR exit nodes IP Address List |
|
IPList |
Amazon AMAZON |
|
IPList |
Amazon EC2 |
|
IPList |
Akamai Servers |
|
IPList |
TOR relay nodes IP Address List |
|
IPList |
Microsoft Intune IP Address List |
|
IPList |
Amazon AMAZON ap-northeast-2 |
|
IPList |
Amazon EC2 ap-northeast-2 |
|
IPList |
Botnet IP Address List |
|
IPList |
Malicious Site IP Address List |
|
IPList |
NordVPN Servers IP Address List |
|
IPList |
Amazon AMAZON eu-west-1 |
|
IPList |
Amazon EC2 sa-east-1 |
|
IPList |
Amazon AMAZON us-east-1 |
|
IPList |
Amazon EC2 us-east-1 |
|
IPList |
Amazon AMAZON us-east-2 |
|
IPList |
Amazon EC2 us-east-2 |
|
IPList |
Forcepoint Drop IP Address List |
|
IPList |
Amazon AMAZON us-west-2 |
|
IPList |
Amazon EC2 us-west-2 |
|
IPList |
Amazon IVS_REALTIME |
|
IPList |
Amazon IVS_REALTIME ap-northeast-2 |
|
Situation |
HTTP_CSU-Suspiciously-Long-URI-Path-Component |
Name: HTTP_CSU-Suspiciously-Long-First-Path-URI-Component->HTTP_CSU-Suspiciously-Long-URI-Path-Component |
Comment has changed |
Fingerprint regexp changed |
|
Situation |
HTTP_CSU-Shared-Variables |
|
Situation |
HTTP_CSU-DrayTek-Vigor-Local-File-Inclusion-CVE-2021-20124 |
Description has changed |
Attacker: connection_source->none |
Victim: connection_destination->none |
Category tag situation Obsolete added |
Category tag os Any Operating System removed |
Category tag hardware Any Hardware removed |
Category tag application DrayTek Vigor removed |
Category tag group CVE2021 removed |
Category tag os_not_specific Any Operating System not specific removed |
Category tag situation Suspected Compromise removed |
Category tag group HTTP Correlation Dependency Group removed |
Category tag group TCP Correlation Dependency Group removed |
Category tag group HTTP URI Correlation Dependency Group removed |
Category tag group Severity over 4 Correlation Dependency Group removed |
Category tag group TCP Client Traffic removed |
Fingerprint regexp changed |
|
Situation |
HTTP_CRL-Shared-Variables |
|
Application |
Akamai-Infrastructure |
|
Application |
TOR |
|
Application |
Manoto |
|
Application |
Microsoft-Intune |
|
Application |
NordVPN |
|
DISCLAIMER AND COPYRIGHT
Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.