R81.10 Jumbo Hotfix Take 173
|
Note - This Take contains all fixes from all earlier Takes. |
ID |
Product |
Description |
---|---|---|
Take 173 Released on 23 February 2025 |
||
Take 173 - New Functionality
|
||
PRJ-56795, PRJ-51149, |
Security Management |
NEW: In SmartConsole, the CSV export file of Access Policy NAT rules now contains the hit count data: "Hits", "First Hits" and "Last Hits" columns.
|
PRJ-56655, |
Security Management |
NEW: The "show nat-rule" and "show nat-rulebase" Management API commands now support displaying hit count data with optional date range filtering through the "show-hits true" parameter, allowing users to retrieve hit statistics for NAT rules with flexible time-based querying in JSON format. Syntax examples:
|
PRJ-55617, |
Security Gateway |
NEW: An additional memory leak detection report is now available. Refer to sk35496. |
PRJ-56663, |
Security Gateway |
NEW: Updatable objects can now be updated through the Security Management Server by adding the "<ProxyRoute>1</ProxyRoute>" configuration entry to the $CPDIR/conf/downloads/dl_prof_ONLINE_SERVICES.xml file, enabling proxy-based updates. |
PRJ-52904, |
Anti-Bot |
NEW: Added protection that prevents multiple unsuccessful login attempts from Endpoint Security Client users connecting through a Remote Access VPN to the Security Gateway. This protection prevents brute-force attacks on Endpoint Security Client users' passwords. Refer to sk182087. |
PRJ-53877, PRJ-54022, |
Identity Awareness |
NEW: Added new OID (1.3.6.1.4.1.2620.1.38.55) to monitor the Identity Collector connection status in the $CPDIR/lib/snmp/chkpnt.mib file.
|
Take 173 - Improvements and Resolved Issues
|
||
PRJ-58379, PMTR-110261 |
Mobile Access |
UPDATE: Resolved CVE-2024-52887 - Self-XSS vulnerability in Mobile Access Native Applications 'favorites' dialog. Refer to sk183054. |
PRJ-58394, PMTR-110274 |
Mobile Access |
UPDATE: Resolved CVE-2024-52888 - Mobile Access File Share applications are vulnerable to stored XSS attacks. Refer to sk183055. |
PRJ-57489, |
Security Management |
UPDATE: The Management API command "set-https-rule" now automatically sets the negative value to "false" when modifying the destination, source, service, or site-category fields, regardless of its previous setting. |
PRJ-56534, |
Security Management |
UPDATE: The Management API logs outbound payloads to api.elg only for non-"200" response codes. It is now possible to enable the "WRITE_FULL_OUT_PAYLOAD" environment variable to force comprehensive logging of all API call payloads, regardless of the response status. Refer to sk182786. |
PRJ-55605, |
Multi-Domain Security Management |
UPDATE: Added a log print to warn about unsupported SIC reset configurations on Multi-Domain Security Management Server / Multi-Domain Log Management Server and to alert when a Domain lacks an ObjectStoreDomain, which prevents CPM from starting. Refer to sk182533. |
PRJ-57146, |
Security Gateway |
UPDATE: Optimized handling of gzip encoded HTTP traffic to enhance performance under high load conditions. |
PRJ-53147, |
Security Gateway |
UPDATE: Reduced memory usage of LDAP keepalives and improved connection error handling, resulting in improved performance. |
PRJ-57846, |
Logging |
UPDATE: Enhanced the CLI "cp_log_export" command with additional examples and expanded help documentation. |
PRJ-57526, |
SecureXL |
UPDATE: Improved throughput of GRE tunnels configured on the ports of the 100G Acceleration Card when SecureXL works in the UPPAK mode. |
PRJ-56895, |
Gaia OS |
UPDATE: Added validation rules to ensure file names meet required format when restoring backups using Clish. |
PRJ-51224, |
Gaia OS |
UPDATE: Implemented robust path validation during user deletion to prevent unintended deletion of parent directories. |
PRJ-57902, |
Scalable Platforms |
UPDATE: Added support for 28 Security Group Members in a Maestro Security Group (Single Site deployment) that runs SecureXL in the User Mode (UPPAK). Refer to sk182803. |
PRJ-57569, |
Scalable Platforms |
UPDATE: Optimized policy distribution to Maestro Security Group members to avoid failure under high load conditions. |
PRJ-58994, |
Automatic Updates - CPView |
UPDATE: Added Take 44 of CPviewExporter Release Updates. Refer to sk180521. |
PRJ-58355, ODU-2139, PRJ-58877, ODU-2219, PRJ-59437, ODU-2323 |
Automatic Updates - Web SmartConsole |
UPDATE: New features and improvements are released in Take 124, Take 125 and Take 128 via self-updatable package. Refer to sk170314. |
PRJ-59321, PRJ-58244, ODU-2259 |
Automatic Updates - HCP |
UPDATE: Added Update 21 and Update 22 of HealthCheck Point (HCP) Release. Refer to sk171436. |
PRJ-58988, |
Automatic Updates - CPView |
UPDATE: Added Take 141 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522. |
PRJ-59279, ODU-1579 |
Automatic Updates - Threat Prevention |
UPDATE: Added Update 25 of Autonomous Threat Prevention Management integration Release. Refer to sk167109. |
PRJ-57334, |
Security Management |
The on-premises Security Management Server with a proxy address configured may fail to connect to the Infinity Portal. |
PRJ-55883, |
Security Management |
In some scenarios, the webservices_cmas_ports.conf file is not updated after Domain deletion from the Multi-Domain Security Management Server, and contains ports of deleted Domains. |
PRJ-57905, |
Security Management |
In rare scenarios, the FWM process on the Security Management Server may unexpectedly exit, creating a core dump file. |
PRJ-52759, |
Security Management |
Audit logs may not be generated when changes are made to an inline (shared) layer that appears multiple times within the same policy. |
PRJ-57656, |
Security Management |
In some scenarios, High Availability synchronization fails with "NGM failed to export data" because of invalid Global Domain Assignments. |
PRJ-58272, |
Security Management |
In rare scenarios:
|
PRJ-57067, |
Security Management |
After installing R81.10 Jumbo Hotfix Accumulator Take 150, when browsing to SmartConsole > Manage & Settings > Permissions & Administrator > Administrators, the page may display "Error retrieving results". |
PRJ-56972, |
Security Management |
Using the "set simple-cluster" command without the "members.add" option to add cluster members may result in recreating existing cluster members and potential loss of SIC. |
PRJ-57915, PMTR-43993 |
Security Management |
In rare scenarios, the CPD process may unexpectedly exit and create a core dump file. Refer to sk182787. |
PRJ-57334, |
Security Management |
The on-premises Security Management Server with a proxy address configured may fail to connect to the Infinity Portal. |
PRJ-57780, |
Security Management |
In rare scenarios, publishing Multi-Domain Security Management level changes such as Administrator configuration changes fails. The "Action Failed due to an Internal Error" error is displayed. |
PRJ-59022, |
Security Management |
In rare scenarios, Access Control policy installation may fail with the "Policy installation had failed due to an internal error" error. Refer to sk182963. |
PRJ-57980, |
Multi-Domain Security Management |
In rare scenarios, an upgrade of Multi-Domain Security Management Server, handling Domain Log Server certificates, may get stuck.
|
PRJ-58028, |
Multi-Domain Security Management |
In rare scenarios, in Multi-Domain Security Management environments, Domain creation fails with "Failed to create Domain server "<Domain name>" Permission calculation failed". |
PRJ-57783, |
Multi-Domain Security Management |
In environments where not all Domains are Active on the same Server (for example, in a multi-site environment), and there is no Domain Management Server for a specific Domain, logs from that Domain are not forwarded to the Infinity Portal. |
PRJ-55713, |
Multi-Domain Security Management |
During an upgrade, Global Policy Assignment on Active Domains may fail when performed from the Multi-Domain Security Management Server where the Global Domain is Standby. |
PRJ-57529, |
Multi-Domain Security Management |
In rare scenarios, in Multi-Domain Security Management environments, login to Smart Console fails. |
PRJ-58517, PMTR-110408 |
Logging |
In some scenarios, in Log Servers or Multi-Domain Log Servers (MDLS):
|
PRJ-59398, PRJ-59397 |
Logging |
After an upgrade, Log Sharing feature does not function as expected, "Encountered an internal error" is printed in the Infinity Services view, under Log Sharing status, and LOG_EXPORTER core dumps are generated. Refer to sk183146. See the Critical Information section. |
PRJ-56198, |
Security Gateway |
Large NAT Rule Base (more than 2,000 rules), may lead to high CPU usage during packet processing. |
PRJ-58187, |
Security Gateway |
After an upgrade, Dynamic Balancing does not start. The "dynamic_balancing -p" command returns "Dynamic Balancing is currently Initializing". Refer to sk182615. |
PRJ-57266, PMTR-108660 |
Security Gateway |
DoS protection and connection rate limiting configurations may fail to effectively enforce rules. |
PRJ-56184, |
Security Gateway |
When enabling MDPS using the "set mdps mgmt plane on" command, the "Failed to commit transaction on database" error is shown instead of a message explaining that the management interface should be configured first. |
PRJ-56506, |
Security Gateway |
When using HTTP/2 through a proxy, the Security Gateway may incorrectly add carriage return and newline characters (\r\n) to the X-Forwarded-For (XFF) header. This causes the header to become invalid and results in a connection failure. This issue only occurs when the Gateway is configured as a proxy. |
PRJ-56100, |
Security Gateway |
The server.log file of the ICAP Server is filled with "Failed to scan web object" entries. This is a cosmetic issue. |
PRJ-56909, |
Security Gateway |
The FWK process may unexpectedly exit after policy installation failure. |
PRJ-57960, |
Security Gateway |
In some specific HTTP/2 traffic scenarios, a valid connection may fail. |
PRJ-53322, |
Security Gateway |
PPPoE interface fails to restart when it is disconnected from the Server side. Refer to sk182154. |
PRJ-58089, |
Security Gateway |
When the autodebug feature is enabled, the RAD service may consume high CPU and trigger "RAD service not available" alert logs. |
PRJ-50697, |
Security Gateway |
Running the "g_tcpdump mcap" with "-C" flag fails with the file matching or captured packets merging error. |
PRJ-58186, |
Security Gateway |
The "dynamic_objects cfo_show" command may fail when the Security Gateway is under heavy load. |
PRJ-57597, |
Security Gateway |
In some scenarios, the FWK process may exit when traffic is inspected by Content Awareness. |
PRJ-58204, |
Security Gateway |
Incorrect Rule Base parameters synchronization logic may lead to the FWK process exit. |
PRJ-54401, |
Security Gateway |
In rare scenarios, after an upgrade, the FWK process may unexpectedly exit because of memory corruption. |
PRJ-50629, |
Security Gateway |
GTP-U traffic may be dropped because of incorrect message type handling. |
PRJ-52410, |
Security Gateway |
The PDPD process memory consumption may be high when using an Azure AD object. |
PRJ-57827, |
Security Gateway |
In some scenarios, an HTTP format size protection exception is not applied to the HTTP/2 flow. |
PRJ-57566, |
Internal CA |
In a rare scenario, when running the cpca_client utility, the CPCA process on the Security Management Server may exit. |
PRJ-56402, |
Internal CA |
The "cpca_dbutil print" command may delete the provided output file content if the input file does not exist. |
PRJ-50231, |
Threat Prevention |
URL-based IoC containing percent-encoded characters may not be properly enforced due to parsing errors. |
PRJ-57134, |
Threat Prevention |
When SSH Deep Packet Inspection (SSH DPI) is enabled, a bypass log entry may not be generated if no Threat Prevention blade is active on the connection. This is a cosmetic issue. |
PRJ-43888, |
Threat Prevention |
Anti-Bot and Anti-Virus may still block traffic to URLs listed in IoC feeds even though these Software Blades are disabled in the Security Gateway/ Cluster object. |
PRJ-49856, |
Threat Prevention |
In a rare scenario, Anti-Virus blade prevents benign traffic due to improper parsing of URL observables in IoC feeds. Refer to sk181519. |
PRJ-56871, |
Identity Awareness |
In rare scenarios:
Refer to sk182613. |
PRJ-58025, PRHF-37011 |
Identity Awareness |
IDA Captive Portal may not be available after Jumbo Hotfix Accumulator installation or after an upgrade using the Blink image. Refer to sk172324. |
PRJ-57044, |
Identity Awareness |
In a rare scenario, the PDPD process may unexpectedly exit during policy Installation. |
PRJ-57643, |
Identity Awareness |
In a rare scenario, when fetch_by_SID is enabled, the PDPD process repeatedly exits. Refer to sk182745. |
PRJ-56811, |
Application Control |
An application may not be matched to an Application Control rule. |
PRJ-55651, |
Application Control |
In some scenarios, a custom application does not match a URL Filtering rule. |
PRJ-57763, |
IPS |
In some scenarios, the DNS Tunneling IPS protection does not function as expected. Refer to sk178487. |
PRJ-54398, |
IPS |
In a rare scenario, the FWK may unexpectedly exit because of a memory allocation issue. |
PRJ-56280, |
DLP |
The DLPU process may exit with a core dump file. |
PRJ-57967, |
DLP |
The DLP blade may not block the password-protected files of a specific type, although it should. |
PRJ-58168, |
Anti-Virus |
In a specific scenario involving a long-lived SMTP connection, the memory usage allocated by the Anti-Virus blade steadily increases over time. |
PRJ-58285, |
Anti-Virus |
In a rare scenario, when the Anti-Virus blade is enabled, the Security Gateway may crash during traffic inspection. |
PRJ-56634, |
ClusterXL |
In a cluster environment, proxy flow error may cause repeated log messages in the fwk.elg file: "de_allocate_port: fwx_alloc_global_del failed (second try)". |
PRJ-54382, |
SecureXL |
A Maestro Security Group Member may fail to initialize after enabling IPv6 and is stuck with pull_config pnote. |
PRJ-57610, |
SecureXL |
In some scenarios, after an update of the OS route configuration, there may be a significant delay in traffic passing through the Security Gateway when SecureXL works in the User space (UPPAK) mode. Refer to sk182740. |
PRJ-57680, |
SecureXL |
A memory leak may occur in the SIM process when using DOS/Rate Limiting rules. |
PRJ-56399, |
SecureXL |
When modifying MTU settings on LightSpeed Line Card interfaces with SecureXL working in User mode (UPPAK) and not re-enabling both ports immediately after the change, persistent interface binding errors may be printed in the /var/log/usim_x86.elg file, such as "Failed to bind hairpin Tx 2 to Rx 3 (64 - all ports)". |
PRJ-57799, |
SecureXL |
Policy installation failures may cause "fwaccel dos" commands to stop working. |
PRJ-56418, |
Gaia OS |
Miscalculation of disk space may cause snapshot to fail. |
PRJ-46984, |
Gaia OS |
When working with SNMP traps, Clish may become slow and unresponsive. |
PRJ-54255, |
Gaia OS |
When Gaia's backup retention policy is configured with a maximum of one backup or a disk space allocation smaller than the backup file size, the backup process hangs and requires a device reboot. This also may cause the CONFD daemon to exit. |
PRJ-54154, |
Gaia OS |
When querying VLAN interfaces, instead of returning the ifType specifically for the VLAN interface itself, the SNMP walk returns the ifType of the underlying physical interface that the VLAN is associated with. |
PRJ-58163, |
Gaia OS |
The ROUTED daemon fails to start when a VTI is configured with a local IP address that matches the next-hop address used in the static route configuration. Refer to sk182848. |
PRJ-53603, |
Gaia OS |
Capturing with Check Point Traffic Capture Tool (cppcap) from all devices may lead to high CPU usage and potential performance issues. |
PRJ-57989, |
Routing |
The "iphelper" (IP Broadcast Helper) service may trigger high CPU utilization because of a recursive packet broadcasting loop between network interfaces. |
PRJ-57984, |
Routing |
Static routes may get permanently deleted from the kernel during rapid interface configuration changes when there is a large number of routes. |
PRJ-55553, |
VPN |
Policy installation fails with "ERROR: Duplicate keys <0000001b, ac130265, ac130265> in table vpn_routing_correction" when duplicating keys in a VPN table and "Encryption domain per community" is configured. Refer to sk182353. |
PRJ-57999, |
VPN |
Capsule VPN connectivity failures may occur after a configuration change of the VPND daemon table parameters. |
PRJ-56171, |
VPN |
An ECDH object may be deleted before its associated event is completed processing. |
PRJ-53462, |
VPN |
In some scenarios when Link Selection (LS) is configured, traffic outage may occur after policy installation. |
PRJ-56497, |
VPN |
There is no audio during the first 5 seconds of each VoIP call. Refer to sk182730. |
PRJ-56803, |
VPN |
SSL Network Extender (SNX) traffic on Maestro may be dropped with "vpnk_tcpt invalid negative tunnel id". Refer to sk182806. |
PRJ-54557, |
VPN |
Policy installation in large scale VPN environments may take a long time. |
PRJ-57941, |
VPN |
When configuring machine authentication without an LDAP server, the computer is authenticated during the connection with the RA VPN. However, the logs in SmartConsole do not display the "Authenticated machine ..." message as expected. |
PRJ-56913, |
VSX |
In SmartConsole, in the Device and License Information view, the Compliance Blade license status may incorrectly display "Quota Exceeded" when Virtual Routers or Virtual Switches are present. |
PRJ-54637, |
VSX |
The "vsx_util convert_cluster" command may fail and cause the FWM process to exit with a core file. |
PRJ-57393, |
VSX |
Newly pushed VSX configuration on Maestro may not be synchronized on all Security Group Members, causing DOWN state. |
PRJ-57744, |
VSX |
In a rare scenario, the FWM process may exit when running the VSX creation wizard. |
PRJ-57057, PRHF-34508 |
VSX |
After a Jumbo Hotfix upgrade, the Mail Transfer Agent may fail on all Virtual Systems except one. See the Critical Information section. |
PRJ-49285, |
Harmony Endpoint |
Exclusions for Anti-Bot policy created through the WebUI do not correctly handle Cyrillic characters. |
PRJ-54334, |
Scalable Platforms |
When different Network Interface Card models are attached among Maestro Security Group members, it may trigger unnecessary reboots. |
PRJ-37792, |
Scalable Platforms |
When Maestro Hyperscale Orchestrator (MHO) is not reachable, the "mq_mng -s" command becomes unresponsive. |
PRJ-57641, |
Scalable Platforms |
Activation of downgraded Security Group members may fail, preventing the rollback process performed using the "sp_upgrade --revert" command. |
PRJ-57638, |
Scalable Platforms |
Security Group Member may be in Down state during the license distribution to Maestro Security Group members. Refer to sk181245. |
PRJ-57479, PMTR-109043 |
Scalable Platforms |
During a Maestro upgrade, if one of the Security Gateway members becomes unresponsive or enters a DETACH/LOST state, policy installation from SmartConsole fails. |
PRJ-58037, |
Scalable Platforms |
Using the "#" character in the Message of the Day (MOTD) banner message causes SGMs to fail during boot. |
PRJ-57471, |
Scalable Platforms |
In rare scenarios, Interface Active check may cause a Security Gateway crash when probing a local network. |
PRJ-48695, |
Scalable Platforms |
After upgrade:
|
PRJ-56442, |
Carrier Security |
When Carrier Security is enabled, GTP-U packets are incorrectly matched against GTP rules instead of a non-GTP UDP rule, causing drops with the "Unestablished tunnel" error. |