R81.10 Jumbo Hotfix Take 158

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 158

Released on 20 August 2024

Take 158 - New Functionality

 

PRJ-53639,

PMTR-102064

Security Management

NEW: Added the ability to unset a persistent environment variable, using the "-u" flag for the override_server_setting.sh script introduced in sk165938. Upon execution, the specified property is now removed from the $MDS_FWDIR/conf/cpmEnvVars.conf file.

PRJ-36320,

PRHF-21090

Security Gateway

NEW: Implemented support for LDAP queries using Windows Security Identifiers (SIDs) as search criteria.

PRJ-52385,
PMTR-99313

Harmony Endpoint

NEW: Threat Emulation Blade in Endpoint Security Clients version E87.60 and higher now supports the ONE, XAR, and WSF file formats.

PRJ-53476,
CLUS-1936

Scalable Platforms

NEW: Added Generic Data Center support for Quantum Maestro environments.

Take 158 - Improvements and Resolved Issues

 

PRJ-51535,

PMTR-97312

Security Gateway

UPDATE: Apache HTTPD version was updated from 2.4.55 to 2.4.58 to fix CVE-2023-31122, CVE-2023-43622.

PRJ-55315,
PMTR-104507

Gaia OS

UPDATE: A patch on top of OpenSSL 1.1.1w to fix CVE-2024-2511. Refer to sk182320.

PRJ-56226,

PMTR-106852

Gaia OS

UPDATE: Added a defense mechanism against malicious code injections through special HTTP requests. Resolved CVE-2024-24914. Refer to sk182743.

PRJ-54495,
PMTR-104054

Security Management

UPDATE: JRE is updated from version 8.0_8.10 to version 8.0_8.21.

PRJ-53928,
PMTR-102275

Security Management

UPDATE: Modified the content of the https://<ip_adress>/license_management/ page.

PRJ-50380,
PRHF-30774

Security Management

UPDATE: Various Web Portals on the Management Server (for example, Web SmartConsole, SmartView) no longer accept HTTPS connections to ports 443 and 19009 with specific TLS 1.2 ciphers. Refer to sk181879.

PRJ-52931,
PRHF-32414

Security Management

UPDATE: When deleting a Secondary Multi-Domain Security Management Server, SmartConsole now shows an "After MDS '<MDS name>' is deleted, you should delete the Secondary Domain Servers from the Domains and revoke their certificates" message.

PRJ-53953,
PMTR-103052

Security Management

UPDATE: Changed the hardware name "1570R Appliances" to "1570R/1575R Appliances" in the Security Gateway editor in SmartConsole and SmartProvisioning.

  • Requires R81.10 SmartConsole Build 426 or higher.

PRJ-52953,
PMTR-101078

Logging

UPDATE: Enhanced the Access Control log for "Accept" actions with initial matched layers of "IoT" or "Playblocks":

The "Layer Name" field now shows the admin-configured layer, alongside Rule Name and Rule Number, allowing administrators to view their preferred match layer rather than defaulting to the first matched layer or inline rule. This change improves visibility into the specific security policy components responsible for accepting traffic.

PRJ-47489,
PRHF-28566

Security Gateway

UPDATE: Implemented automatic purging of expired SIC certificates on Security Gateways to eliminate memory residues and prevent misuse.

PRJ-51173,

PMTR-97400

Security Gateway

UPDATE: Deprecated RC2-CBC cipher for SIC in OpenSSL.

PRJ-51988,
PMTR-88361

Security Gateway

UPDATE: The performance of the thread blocker feature (sk180437) is now improved and the feature is re-enabled.

PRJ-51531,
PMTR-97036

Mobile Access

UPDATE: The Mobile Access Portal is no longer compatible with the Chrome browser on iOS and Android mobile devices.

PRJ-53918,
PRHF-32600

URL Filtering

UPDATE: When URL Filtering operates in Background Mode and encounters an unclassified connection, instead of being approved automatically, such connection is now accepted or rejected based on Access Rule Base execution, and listed under the "unknown" category.

PRJ-54589,

PMTR-100544

Gaia OS

UPDATE: Extended the "allowed-client" setting to enforce IP restrictions for both password and SSH key authentication methods, providing more comprehensive access control.

PRJ-55718,
PMTR-105631

VPN

UPDATE: VPN connections are now synchronized to all members of the Security Group by default. The default value of the "vpn_sync_to_all" kernel parameter is set to "1".

PRJ-54671,
PMTR-104379

VoIP

UPDATE: SIP over UDP requests and responses may be dispatched to different firewall instances when a single-direction rule is defined in the Rule Base, potentially causing returned SIP traffic to be dropped as an unknown connection. To address this, a new global parameter "sip_forward_if_needed" is introduced (disabled by default). When enabled, the Security Gateway forwards responses to the appropriate request instances. Refer to sk182667.

PRJ-53100,
PMTR-101359

Scalable Platforms

UPDATE: Removed the ability to delete the "_lldp" internal user in Gaia OS to prevent traffic impact. Refer to sk182026.

PRJ-56192,

ODU-1787

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 114 via self-updatable package. Refer to sk170314.

PRJ-56056,

ODU-1923

Automatic Updates - HCP

UPDATE: Added Update 18 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-55913,

ODU-1849

Automatic Updates - CPView

UPDATE: Added Take 97 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-55916,
ODU-1819

Automatic Updates - CloudGuard Network

UPDATE: Added Take 21 of Public Cloud CA Bundle. Refer to sk172188.

PRJ-50935,

PRHF-31120

Security Management

SmartConsole may freeze when selecting a client under Security Gateway object > Identity Awareness tab > RADIUS Accounting Settings.

  • Requires additional configuration and R81.10 SmartConsole Build 426 or higher. Refer to sk181630.

PRJ-54004,
PRHF-33311

Security Management

In rare scenarios, the Management Server upgrade fails during the import stage with "an eclipse error has occurred enable logging on EclipseLinkExceptionHandler to see full error".

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or via the Advanced Upgrade method.

PRJ-46787,

PRHF-29046

Security Management

In some scenarios, an upgrade of Security Management Server or Multi-Domain Security Management Server fails with the "Failed: upgrade of "DOMAIN_NAME". For more details see upgrade logs below" error in the upgrade report.

  • The fix requires the upgrade to be done using a Blink image or via the Advanced Upgrade method.

PRJ-51501,
PRHF-31420

Security Management

In rare scenarios, an upgrade of a Multi-Domain Security Management Server fails with "Cancelled due to a failure in other domain" in the upgrade report.

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or via the Advanced Upgrade method.

PRJ-52715,

PMTR-100061

Security Management

In rare scenarios, the CPCA process on the Security Management Server / Domain Management Server may exit unexpectedly, creating a core dump file. Refer to sk183101.

PRJ-52888,
PRHF-32372

Security Management

"Mapping of Data Center [xxxx] failed. Next mapping is in 300 seconds" errors in the CME logs show failed attempts to scan deleted data centers.

PRJ-52777,
PRHF-32265

Security Management

Objects Explorer search fails with "Error retrieving results" when more than twenty thousand IP addresses match the search criteria.

PRJ-53506,
PRHF-32561

Security Management

After upgrading, administrators with read/write permissions to edit Security Gateways and Clusters may lack IPS permissions and are unable to perform certain management tasks, such as enabling or disabling blades.

PRJ-49437,

PRHF-30400

Security Management

The UPDATE_INSPECT_FILES process of Upgrade Tools may exit with a core dump.

PRJ-52433,

PRHF-31953

Security Management

When Global Domain Assignment fails with the "More than one object named 'XXX' exists" error, not all duplicate objects are listed.

PRJ-53759,

PRHF-32936

Security Management

The "domains_tool -report" command may fail if more than sixteen host objects are defined as DNS Servers in the environment.

PRJ-54065,

PRHF-33349

Security Management

In some scenarios, users may be disconnected from SmartConsole, and an FWM process core dump is generated.

PRJ-53770,
PRHF-32899

Security Management

In some scenarios, the "show-gateways-and-servers" Management API command fails with "generic_err_object_not_found" when running with "details-level full".

PRJ-51120,
PRHF-31318

Security Management

In rare scenarios, if a Star VPN Community object is created, publish operations may fail.

PRJ-45160,
PRHF-28147

Security Management

In rare scenarios, login to the Security Management Server may fail with timeout and the FWM process on the Management Server may unexpectedly exit, creating a core dump file.

PRJ-50843,
PRHF-31188

Security Management

Export of a list of objects from the Global Object Explorer fails with the "Export policy is not supported when rule name is in a format of UUID" error message.

PRJ-53894,
PRHF-32890

Security Management

In rare scenarios, the API status shows "Automatic Start: Disabled" even though the automatic start was not disabled manually.

PRJ-50754,
ACCESS-704

Security Management

Access to and from the Generic Data Center objects may not be enforced when MDPS configuration is enabled on the Security Gateway.

PRJ-49056,
PRHF-30130

Security Management

In rare scenarios, publishing a session in SmartConsole fails with the "got at least one duplicate UID in requested list, duplicates UIDs: [XXX]" error.

PRJ-55522,
PMTR-85279

Security Management

In rare scenarios, the CPD process may exit with core dumps.

PRJ-48936,
PRHF-30136

Security Management

The "set simple-cluster" Management API command with the "vpn-settings.vpn-domain" parameter succeeds, but the VPN Domain is not set.

PRJ-53501,
PRHF-32764

Security Management

In some scenarios, SmartConsole may unexpectedly disconnect.

PRJ-53453,

PRHF-32750

Multi-Domain Security Management

Upgrade of the Multi-Domain Security Management Server may fail with the error "Folder object not found".

  • The fix requires the upgrade to be done using a Blink image or the Advanced Upgrade method.

PRJ-51629,
PRHF-31681

Multi-Domain Security Management

In rare scenarios, login to a newly created Domain fails and the CPCA daemon has the "down" status. Refer to sk181798.

PRJ-53551,
PRHF-32881

Multi-Domain Security Management

When a Domain name (for example, "XXX") is a subset of another Domain name (for example, "XXX-YYY"), the "mdsstop" command may fail to stop a Domain named "XXX-YYY".

PRJ-51516,
PRHF-31567

Logging

Log searches for the same time period may return more results in SmartConsole compared to SmartView.

PRJ-54060,
PMTR-102031

Logging

In rare scenarios, empty log list may be displayed when selecting a log file to view in SmartConsole.

PRJ-33620,
PRHF-20992

Logging

Log Exporter may unexpectedly exit when using a non-RSA certificate.

PRJ-51275,
PRHF-31323

Logging

When adding a table widget to a SmartView report:

  • The "Missed Malware Activity" and "Spyware Action" fields may not be possible to pick.

  • The "Malware Action" filter may appear twice in the picker.

PRJ-55511,
PRHF-34283

Logging

In some scenarios, the name of the Security Gateway is not shown in the title of the automatic reaction email, although it should be.

PRJ-51429,
PRHF-31388

Logging

In some scenarios, in Multi-Domain Security Management environments with over 300,000 network objects, the LOG_INDEXER process repeatedly exits if the procedure from sk164452 is not applied.

PRJ-50261,
PRHF-30848

Logging

In SmartView, some countries are not displayed in the countries picker.

PRJ-52463,
PRHF-31160

Logging

In SmartView, filtering logs by "event_type" may fail with the "Query failed" error.

PRJ-50694,
PRHF-31105

Logging

In some scenarios, viewing a Forensics report in Threat Hunting fails with the "Unable to load report" error. Refer to sk181800.

PRJ-51443,
PRHF-31195

Logging

The traffic field in the SmartEvent "Application and URL Filtering" report, specifically in the "High Bandwidth Applications" section, is incorrectly displaying data in petabytes (PB) instead of the expected gigabytes (GB).

PRJ-52940,

PRHF-32194

Logging

In the Logs view, the "TCP-other" and "UDP-other" services are displayed as generic service IDs, for example, "cp_tcp_A936BBAC_EBC3_4F18_B3CC_A63365F07477".

PRJ-51048,
PMTR-97496

Security Gateway

In some scenarios, websites that use HTTP2 protocol do not load properly.

PRJ-52773,
PRHF-32213

Security Gateway

In rare scenarios, the FWK process may unexpectedly exit.

PRJ-54627,
PRHF-33768

Security Gateway

In some scenarios, adding sequential IP addresses as MDPS task addresses may fail.

PRJ-55367,
PMTR-77377

Security Gateway

On appliances with FWD static core affinity, some processes may still be unexpectedly assigned to the FWD core, affecting the performance.

PRJ-51969,
PMTR-99054

Security Gateway

The CPWD daemon does not restart automatically.

PRJ-53074,
PMTR-96269

Security Gateway

In some occasions, redundant errors appear in logs: "fw_inspect_ghtab_bl_ld_sync: invalid FW_INSPECT_GHTAB_BL_LD_SYNC_TABLE_ID".

PRJ-55952,
PMTR-106146

Security Gateway

Security Gateway running in SecureXL User Mode (UPPAK) may crash during driver removal showing "m_free: mbuf doublefree" in the backtrace.

PRJ-51479,

PMTR-98475

Security Gateway

The RAD process exits and creates a core file on the Security Gateway.

PRJ-49901,
PRHF-30541

Security Gateway

Kernel Memory usage increases persistently each day on a Security Gateway/Security Group when CGNAT is enabled. Refer to sk182140.

PRJ-54528,
PMTR-103857

Security Gateway

In some scenarios, the Security Gateway offloads connections to SecureXL in error when the initial route lookup could not find a route for it.

PRJ-55519,
PMTR-104668

SSL Inspection

In rare scenarios, when HTTPS Inspection is enabled, the FWK process may unexpectedly exit due to memory violation.

PRJ-52646,
PRHF-31996

Internal CA

CRL fetch may fail when passing through a Security Gateway with deep inspection, even if the connection hold is quickly released. CPCA closes the connection prematurely.

PRJ-50700,
PRHF-30997

Threat Prevention

The Anti-Virus Blade fails to parse IoC feeds that contain IPv6 addresses.

PRJ-48309,
ACCESS-680

Threat Prevention

In rare scenarios, when the Anti-Virus, Threat Extraction and Threat Emulation Blades are enabled, some connections that were on hold are dropped.

PRJ-53200,
PMTR-97508

Threat Prevention

In some scenarios, policy installation and IPS package updates may take a very long time to finish and cause traffic drops.

PRJ-51340,
PRHF-29801

Identity Awareness

In some scenarios, the PEPD process may consume a high CPU because of a high rate of identity propagation. Refer to sk182588.

PRJ-46489,
PRHF-28698

Identity Awareness

Policy Enforcement Point (PEP) logs show a username after the user session is expired. Refer to sk181553.

PRJ-35860,
PMTR-76453

Identity Awareness

Microsoft Azure Active Directory does not fetch users in the Access Role object and shows "The user directory is still initializing". Refer to sk175983.

PRJ-43103,
PMTR-87284

DLP

Multiple internal errors, including file metadata retrieval failures and parsing errors, may be printed in the DLPDA logs.

PRJ-53127,
PRHF-32438

Anti-Virus

The DLPU process may unexpectedly exit due to uninitialized memory when the Anti-Virus Blade scans files. Refer to sk182030.

PRJ-53571,
PRJ-53566

Anti-Virus

In a rare scenario, the Security Gateway may crash due to memory corruption caused by the Anti-Virus Blade.

PRJ-50980,
PRHF-31207

Anti-Virus

The Anti-Virus Blade may enforce observables from IoC feeds although they were deactivated in SmartConsole.

PRJ-51153,
PMTR-92065

Mobile Access

Web Application names column width is too narrow to fit in the Mobile Access Portal. Refer to sk181774.

PRJ-52978,
PRHF-32251

Mobile Access

Enabling the "cvpnd" debug causes the reverseproxy_ssl_debug.log file size to continue growing even after the "reverse proxy" debug is off.

PRJ-54640,
PMTR-90199

Mobile Access

The HTTPD process of the Mobile Access Portal may exit with a core dump file.

PRJ-54169,
PMTR-103483

ClusterXL

In rare scenarios, in a cluster environment, the CPDiag tool may crash.

PRJ-55395,
PMTR-104268

SecureXL

A race condition may occur in a large scale VSX Cluster environment and SecureXL User Mode (UPPAK) is enabled.

PRJ-54322,
PMTR-103651

SecureXL

In some scenarios, traffic with Passive or Active Streaming configuration may not correctly pass through a Virtual Router on a VSX Security Gateway.

PRJ-55565,
PMTR-104603

SecureXL

The USIM process may unexpectedly exit.

PRJ-55961,

PRHF-34753

SecureXL

The duration of each "stop" and "start" API call for the LightSpeed Acceleration interfaces may take several seconds. Refer to sk182585.

PRJ-54330,
PRHF-33511

SecureXL

In rare scenarios, the Security Gateway crashes when the interface goes down right before it transmits packets out.

PRJ-54427,
PMTR-102834

SecureXL

In some scenarios, the VSX Security Gateway does not initialize the Virtual System correctly when connected to a Virtual Router or Virtual Switch.

PRJ-54566,
ACCHA-2595

PRJ-54569,
ACCHA-2571

SecureXL

Some packets on connections to bonded VLAN interfaces may be dropped because of missing interface info.

PRJ-54602,
PMTR-104146

Routing

Routing BFD sessions using IPv6 global addresses on single-hop interfaces fail to recover after the network interface is administratively disabled and re-enabled.

PRJ-55343,
PMTR-104736

Routing

OSPFv2 graceful restart mechanism fails on broadcast and point-to-multipoint networks due to the omission of an "IP-Address" field in the grace LSA.

PRJ-52415,

PRHF-31929

Gaia OS

SNMP query for OID 1.3.6.1.4.1.2620.1.6.7.5.1.5 (CPU utilization per CPU core) and the "cpstat os -f cpu" command may return an incorrect value. Refer to sk182447.

PRJ-51019,
PRHF-31136

VPN

Duo management reports display incorrect access source locations due to Security Gateways providing inverted IP addresses during the two-factor authentication challenge response process. Refer to sk181783.

PRJ-52911,
PRHF-32348

VPN

SNMP queries show a different number of connected RA VPN users than what is shown in CPView and from CLI. RaUserState information is missing in the SNMP MIB file.

PRJ-55487,
PRHF-30493

VPN

During high-frequency encryption of packets over a VPN tunnel, the Security Gateway may assign the same sequence number to multiple packets. This causes the receiving VPN peer to mistakenly identify these legitimate packets as replay attacks and drop them.

PRJ-55292,
PMTR-103968

VPN

Configuring a Large Scale VPN (LSV) with IPv6 and establishing a VPN tunnel may cause the FWK process to exit.

PRJ-53714,
PRHF-32719

VPN

Tunnel testing may fail after an upgrade. Refer to sk182267.

PRJ-54679,

PMTR-104230

Multi-Portal

Under a special routing configuration, an active Cluster member may accept portal traffic (on TCP ports 80 and 443) destined to a Standby member IP address.

PRJ-54597,
PRHF-33572

VSX

In rare scenarios, the CPD process of the default Virtual System on a VSX Gateway (VS0) gets stuck.

PRJ-53117,
PMTR-99343

VSX

In a VSX Cluster with IPv6 enabled, after an upgrade, VS's without IPv6 address may fail to install the Access policy.

PRJ-47807,
PRHF-29624

CloudGuard Network

In the Kubernetes Data Center, the Import window may be stuck in "Initializing" state.

PRJ-29747,
PMTR-70976

Scalable Platforms

When configuring backup-scheduled/snapshot recurrence via gClish shell with "The <name> job already exists. Please choose another name. Backup schedule failed. The backup will not be scheduled".

PRJ-48012,
PRHF-29741

Scalable Platforms

When running the "set user username force-password-change yes" command in gClish on Scalable Platforms, the new configuration may not be applied.

PRJ-49847,
PRHF-30436

Scalable Platforms

Site to Site VPN traffic may be interrupted after installing policy with VSLS.

PRJ-43740,
PMTR-88853

Scalable Platforms

The "distutil" script may take a long time to run in an environment with many VS's.

PRJ-50625,
PRHF-29180

Carrier Security

  • ClusterXL Active member changes the status to "LOST".

  • Kernel segfault error is printed in /var/log/messages.

  • The CPD daemon and CPVIEW_SERVICE exit.