Release notes for update package 1836-5242

This update package improves the detection capabilities of the Forcepoint LLM system.

RELEASE DATE:     Thursday February 13, 2025
MD5 CHECKSUM:     2fd58ad9275eaa6b340a2477e669cc4e
SHA1 CHECKSUM:     750949a4fce579cf73374dced357c67949b6f4be
SHA256 CHECKSUM:     c1e8b6a8be19e4653c9cade59684c235d450c4fb6a32c3c4f2b05f2378a4c02b


UPDATE CRITICALITY:    HIGH

List of detected attacks in this update package:

Risk level Description Reference Vulnerability
High     An attempt to exploit a vulnerability in JimuReport detected     CVE-2023-4450     Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450
High     An attempt to exploit a vulnerability in GeoServer detected     CVE-2021-40822     GeoServer-Server-Side-Request-Forgery-CVE-2021-40822
High     An attempt to exploit a vulnerability in PRTG Network Monitor detected     CVE-2018-19410     PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410

Jump to: Detected Attacks Other Changes

DETECTED ATTACKS

New detected attacks:

HTTP Request URI

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410 CVE-2018-19410 HTTP_CSU-PRTG-Network-Monitor-Local-File-Inclusion-CVE-2018-19410 Suspected Compromise

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type
High GeoServer-Server-Side-Request-Forgery-CVE-2021-40822 CVE-2021-40822 HTTP_CRL-GeoServer-Server-Side-Request-Forgery-CVE-2021-40822 Suspected Compromise
High Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450 CVE-2023-4450 HTTP_CRL-Jimureport-Freemarker-Server-Side-Template-Injection-CVE-2023-4450 Suspected Compromise

Updated detected attacks:

HTTP Client Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Selenium-Chrome-RCE CVE-2022-28108 HTTP_CS-Selenium-Chrome-RCE Suspected Compromise
Fingerprint regexp changed

HTTP Normalized Request-Line

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection CVE-2024-6457 HTTP_CRL-Wordpress-Husky-Products-Filter-Plugin-Woof_Author-SQL-Injection Potential Compromise
Fingerprint regexp changed

Text File Stream

Risk Vulnerability/Situation References Related Fingerprint Situation Type Change Description
High Xstream-Unsafe-Deserialization No CVE/CAN File-Text_Xstream-Unsafe-Deserialization Potential Compromise
Description has changed
Category tag group CVE2021 added
Category tag group CVE2024 added

LIST OF OTHER CHANGES:

New objects:

Type Name
Category JimuReport
Application Meta AI
Application Microsoft Copilot
Element Ref Application dependency from Microsoft Copilot to Microsoft-Office-365
Element Ref Application dependency from Microsoft Copilot to Microsoft-Telemetry
Element Ref Application dependency from Microsoft Copilot to Microsoft-Defender-For-Endpoint
Element Ref Application dependency from Meta AI to Facebook

Updated objects:

Type Name Changes
Certificate Authority Certum Trusted Network CA (1)
Marked for removal
Certificate Authority Go Daddy Secure Certification Authority
Marked for removal
Certificate Authority Starfield Secure Certification Authority
Marked for removal
Certificate Authority GlobalSign (1)
Marked for removal
Certificate Authority AC Componentes Informáticos
Marked for removal
IPList GitHub Actions IP Address List
Situation File-Text_ActiveX-Shared-Variables

DISCLAIMER AND COPYRIGHT

Copyright © 2025 Forcepoint
Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.

All other trademarks used in this document are the property of their respective owners.

Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice.