R81.10 Jumbo Hotfix Take 173

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 173

Released on 23 February 2025

Take 173 - New Functionality

 

PRJ-56795,

PRJ-51149,
PMTR-90911

Security Management

NEW: In SmartConsole, the CSV export file of Access Policy NAT rules now contains the hit count data: "Hits", "First Hits" and "Last Hits" columns.

  • Requires R81.10 SmartConsole Build 429 or higher.

PRJ-56655,
PMTR-92241

Security Management

NEW: The "show nat-rule" and "show nat-rulebase" Management API commands now support displaying hit count data with optional date range filtering through the "show-hits true" parameter, allowing users to retrieve hit statistics for NAT rules with flexible time-based querying in JSON format.

Syntax examples:

  • mgmt_cli show nat-rule rule-number 1 show-hits true package "standard" --format json

  • mgmt_cli show nat-rulebase offset 0 limit 20 details-level "standard" use-object-dictionary true package "standard" show-hits true --format json

  • mgmt_cli show nat-rule rule-number 1 show-hits true package "standard" hits-settings.from-date "2014-01-01" hits-settings.to-date "2014-12-31T23:59" --format json

PRJ-55617,
PRHF-33926

Security Gateway

NEW: An additional memory leak detection report is now available. Refer to sk35496.

PRJ-56663,
PMTR-102617

Security Gateway

NEW: Updatable objects can now be updated through the Security Management Server by adding the "<ProxyRoute>1</ProxyRoute>" configuration entry to the $CPDIR/conf/downloads/dl_prof_ONLINE_SERVICES.xml file, enabling proxy-based updates.

PRJ-52904,
PMTR-100688

Anti-Bot

NEW: Added protection that prevents multiple unsuccessful login attempts from Endpoint Security Client users connecting through a Remote Access VPN to the Security Gateway. This protection prevents brute-force attacks on Endpoint Security Client users' passwords. Refer to sk182087.

PRJ-53877,
PRHF-32290,

PRJ-54022,
PRHF-33261

Identity Awareness

NEW: Added new OID (1.3.6.1.4.1.2620.1.38.55) to monitor the Identity Collector connection status in the $CPDIR/lib/snmp/chkpnt.mib file.

  • This capability is supported for Identity Collector agents running with version R82.120.0000 or higher.

Take 173 - Improvements and Resolved Issues

 

PRJ-58379,

PMTR-110261

Mobile Access

UPDATE: Resolved CVE-2024-52887 - Self-XSS vulnerability in Mobile Access Native Applications 'favorites' dialog. Refer to sk183054.

PRJ-58394,

PMTR-110274

Mobile Access

UPDATE: Resolved CVE-2024-52888 - Mobile Access File Share applications are vulnerable to stored XSS attacks. Refer to sk183055.

PRJ-57489,
PMTR-108994

Security Management

UPDATE: The Management API command "set-https-rule" now automatically sets the negative value to "false" when modifying the destination, source, service, or site-category fields, regardless of its previous setting.

PRJ-56534,
PRHF-34745

Security Management

UPDATE: The Management API logs outbound payloads to api.elg only for non-"200" response codes. It is now possible to enable the "WRITE_FULL_OUT_PAYLOAD" environment variable to force comprehensive logging of all API call payloads, regardless of the response status. Refer to sk182786.

PRJ-55605,
PRHF-34346

Multi-Domain Security Management

UPDATE: Added a log print to warn about unsupported SIC reset configurations on Multi-Domain Security Management Server / Multi-Domain Log Management Server and to alert when a Domain lacks an ObjectStoreDomain, which prevents CPM from starting. Refer to sk182533.

PRJ-57146,
PMTR-108406

Security Gateway

UPDATE: Optimized handling of gzip encoded HTTP traffic to enhance performance under high load conditions.

PRJ-53147,
PRHF-32539

Security Gateway

UPDATE: Reduced memory usage of LDAP keepalives and improved connection error handling, resulting in improved performance.

PRJ-57846,
PMTR-109621

Logging

UPDATE: Enhanced the CLI "cp_log_export" command with additional examples and expanded help documentation.

PRJ-57526,
PMTR-109151

SecureXL

UPDATE: Improved throughput of GRE tunnels configured on the ports of the 100G Acceleration Card when SecureXL works in the UPPAK mode.

PRJ-56895,
PMTR-107995

Gaia OS

UPDATE: Added validation rules to ensure file names meet required format when restoring backups using Clish.

PRJ-51224,
PRHF-31341

Gaia OS

UPDATE: Implemented robust path validation during user deletion to prevent unintended deletion of parent directories.

PRJ-57902,
PMTR-109685

Scalable Platforms

UPDATE: Added support for 28 Security Group Members in a Maestro Security Group (Single Site deployment) that runs SecureXL in the User Mode (UPPAK). Refer to sk182803.

PRJ-57569,
PMTR-93424

Scalable Platforms

UPDATE: Optimized policy distribution to Maestro Security Group members to avoid failure under high load conditions.

PRJ-58994,
ODU-2203

Automatic Updates - CPView

UPDATE: Added Take 44 of CPviewExporter Release Updates. Refer to sk180521.

PRJ-58355,

ODU-2139,

PRJ-58877,

ODU-2219,

PRJ-59437,

ODU-2323

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 124, Take 125 and Take 128 via self-updatable package. Refer to sk170314.

PRJ-59321,

PRJ-58244,
ODU-2099,

ODU-2259

Automatic Updates - HCP

UPDATE: Added Update 21 and Update 22 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-58988,
ODU-2195

Automatic Updates - CPView

UPDATE: Added Take 141 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-59279,

ODU-1579

Automatic Updates - Threat Prevention

UPDATE: Added Update 25 of Autonomous Threat Prevention Management integration Release. Refer to sk167109.

PRJ-57334,
PMTR-105173

Security Management

The on-premises Security Management Server with a proxy address configured may fail to connect to the Infinity Portal.

PRJ-55883,
PMTR-106113

Security Management

In some scenarios, the webservices_cmas_ports.conf file is not updated after Domain deletion from the Multi-Domain Security Management Server, and contains ports of deleted Domains.

PRJ-57905,
PRHF-36295

Security Management

In rare scenarios, the FWM process on the Security Management Server may unexpectedly exit, creating a core dump file.

PRJ-52759,
PRHF-32246

Security Management

Audit logs may not be generated when changes are made to an inline (shared) layer that appears multiple times within the same policy.

PRJ-57656,
PRHF-36501

Security Management

In some scenarios, High Availability synchronization fails with "NGM failed to export data" because of invalid Global Domain Assignments.

PRJ-58272,
PRHF-37209

Security Management

In rare scenarios:

  • Login to the Security Management Server may fail with timeout.

  • Publish operations may take a long time.

PRJ-57067,
PRHF-36058

Security Management

After installing R81.10 Jumbo Hotfix Accumulator Take 150, when browsing to SmartConsole > Manage & Settings > Permissions & Administrator > Administrators, the page may display "Error retrieving results".

PRJ-56972,
PRHF-36032

Security Management

Using the "set simple-cluster" command without the "members.add" option to add cluster members may result in recreating existing cluster members and potential loss of SIC.

PRJ-57915,

PMTR-43993

Security Management

In rare scenarios, the CPD process may unexpectedly exit and create a core dump file. Refer to sk182787.

PRJ-57334,
PMTR-105173

Security Management

The on-premises Security Management Server with a proxy address configured may fail to connect to the Infinity Portal.

PRJ-57780,
PRHF-36576

Security Management

In rare scenarios, publishing Multi-Domain Security Management level changes such as Administrator configuration changes fails. The "Action Failed due to an Internal Error" error is displayed.

PRJ-59022,
PRHF-37939

Security Management

In rare scenarios, Access Control policy installation may fail with the "Policy installation had failed due to an internal error" error. Refer to sk182963.

PRJ-57980,
PRHF-36890

Multi-Domain Security Management

In rare scenarios, an upgrade of Multi-Domain Security Management Server, handling Domain Log Server certificates, may get stuck.

  • The fix will only be applied if the upgrade to R81.10 Jumbo Hotfix Accumulator Take 173 or higher is done using a Blink image or the Advanced Upgrade method.

PRJ-58028,
PRHF-36922

Multi-Domain Security Management

In rare scenarios, in Multi-Domain Security Management environments, Domain creation fails with "Failed to create Domain server "<Domain name>" Permission calculation failed".

PRJ-57783,
PRHF-36479

Multi-Domain Security Management

In environments where not all Domains are Active on the same Server (for example, in a multi-site environment), and there is no Domain Management Server for a specific Domain, logs from that Domain are not forwarded to the Infinity Portal.

PRJ-55713,
PMTR-105491

Multi-Domain Security Management

During an upgrade, Global Policy Assignment on Active Domains may fail when performed from the Multi-Domain Security Management Server where the Global Domain is Standby.

PRJ-57529,
PRHF-36514

Multi-Domain Security Management

In rare scenarios, in Multi-Domain Security Management environments, login to Smart Console fails.

PRJ-58517,

PMTR-110408

Logging

In some scenarios, in Log Servers or Multi-Domain Log Servers (MDLS):

  • The SOLR process consumes high CPU.

  • There is a delay in displaying logs in the Logs view.

PRJ-59398,

PRJ-59397

Logging

After an upgrade, Log Sharing feature does not function as expected, "Encountered an internal error" is printed in the Infinity Services view, under Log Sharing status, and LOG_EXPORTER core dumps are generated. Refer to sk183146.

See the Critical Information section.

PRJ-56198,
FMW-795

Security Gateway

Large NAT Rule Base (more than 2,000 rules), may lead to high CPU usage during packet processing.

PRJ-58187,
PRHF-35819

Security Gateway

After an upgrade, Dynamic Balancing does not start. The "dynamic_balancing -p" command returns "Dynamic Balancing is currently Initializing". Refer to sk182615.

PRJ-57266,

PMTR-108660

Security Gateway

DoS protection and connection rate limiting configurations may fail to effectively enforce rules.

PRJ-56184,
PRHF-31197

Security Gateway

When enabling MDPS using the "set mdps mgmt plane on" command, the "Failed to commit transaction on database" error is shown instead of a message explaining that the management interface should be configured first.

PRJ-56506,
PMTR-107344

Security Gateway

When using HTTP/2 through a proxy, the Security Gateway may incorrectly add carriage return and newline characters (\r\n) to the X-Forwarded-For (XFF) header. This causes the header to become invalid and results in a connection failure. This issue only occurs when the Gateway is configured as a proxy.

PRJ-56100,
PMTR-106586

Security Gateway

The server.log file of the ICAP Server is filled with "Failed to scan web object" entries. This is a cosmetic issue.

PRJ-56909,
PRHF-35918

Security Gateway

The FWK process may unexpectedly exit after policy installation failure.

PRJ-57960,
PRHF-36794

Security Gateway

In some specific HTTP/2 traffic scenarios, a valid connection may fail.

PRJ-53322,
PRHF-32698

Security Gateway

PPPoE interface fails to restart when it is disconnected from the Server side. Refer to sk182154.

PRJ-58089,
PMTR-109845

Security Gateway

When the autodebug feature is enabled, the RAD service may consume high CPU and trigger "RAD service not available" alert logs.

PRJ-50697,
PRHF-30983

Security Gateway

Running the "g_tcpdump mcap" with "-C" flag fails with the file matching or captured packets merging error.

PRJ-58186,
DO-1376

Security Gateway

The "dynamic_objects cfo_show" command may fail when the Security Gateway is under heavy load.

PRJ-57597,
FMW-2980

Security Gateway

In some scenarios, the FWK process may exit when traffic is inspected by Content Awareness.

PRJ-58204,
PRHF-36513

Security Gateway

Incorrect Rule Base parameters synchronization logic may lead to the FWK process exit.

PRJ-54401,
PRHF-33615

Security Gateway

In rare scenarios, after an upgrade, the FWK process may unexpectedly exit because of memory corruption.

PRJ-50629,
PRHF-29467

Security Gateway

GTP-U traffic may be dropped because of incorrect message type handling.

PRJ-52410,
PRHF-31919

Security Gateway

The PDPD process memory consumption may be high when using an Azure AD object.

PRJ-57827,
PRHF-36779

Security Gateway

In some scenarios, an HTTP format size protection exception is not applied to the HTTP/2 flow.

PRJ-57566,
PMTR-109178

Internal CA

In a rare scenario, when running the cpca_client utility, the CPCA process on the Security Management Server may exit.

PRJ-56402,
PRHF-35372

Internal CA

The "cpca_dbutil print" command may delete the provided output file content if the input file does not exist.

PRJ-50231,
PRJ-50232

Threat Prevention

URL-based IoC containing percent-encoded characters may not be properly enforced due to parsing errors.

PRJ-57134,
PMTR-90069

Threat Prevention

When SSH Deep Packet Inspection (SSH DPI) is enabled, a bypass log entry may not be generated if no Threat Prevention blade is active on the connection. This is a cosmetic issue.

PRJ-43888,
PMTR-96294

Threat Prevention

Anti-Bot and Anti-Virus may still block traffic to URLs listed in IoC feeds even though these Software Blades are disabled in the Security Gateway/ Cluster object.

PRJ-49856,
PRHF-30600

Threat Prevention

In a rare scenario, Anti-Virus blade prevents benign traffic due to improper parsing of URL observables in IoC feeds. Refer to sk181519.

PRJ-56871,
PRHF-35636

Identity Awareness

In rare scenarios:

  • The PDPD process may become unresponsive during termination.

  • PDP to PEP Identity synchronization fails on the PEP side when Identity Sharing is configured with PUSH Identity Sharing.

Refer to sk182613.

PRJ-58025,

PRHF-37011

Identity Awareness

IDA Captive Portal may not be available after Jumbo Hotfix Accumulator installation or after an upgrade using the Blink image. Refer to sk172324.

PRJ-57044,
PRHF-36045

Identity Awareness

In a rare scenario, the PDPD process may unexpectedly exit during policy Installation.

PRJ-57643,
PRHF-36542

Identity Awareness

In a rare scenario, when fetch_by_SID is enabled, the PDPD process repeatedly exits. Refer to sk182745.

PRJ-56811,
SDWANGW-712

Application Control

An application may not be matched to an Application Control rule.

PRJ-55651,
PRHF-34020

Application Control

In some scenarios, a custom application does not match a URL Filtering rule.

PRJ-57763,
PRHF-33315

IPS

In some scenarios, the DNS Tunneling IPS protection does not function as expected. Refer to sk178487.

PRJ-54398,
PRHF-33607

IPS

In a rare scenario, the FWK may unexpectedly exit because of a memory allocation issue.

PRJ-56280,
PRHF-35095

DLP

The DLPU process may exit with a core dump file.

PRJ-57967,
PRHF-36711

DLP

The DLP blade may not block the password-protected files of a specific type, although it should.

PRJ-58168,
PRHF-37164

Anti-Virus

In a specific scenario involving a long-lived SMTP connection, the memory usage allocated by the Anti-Virus blade steadily increases over time.

PRJ-58285,
PMTR-109114

Anti-Virus

In a rare scenario, when the Anti-Virus blade is enabled, the Security Gateway may crash during traffic inspection.

PRJ-56634,
PMTR-107128

ClusterXL

In a cluster environment, proxy flow error may cause repeated log messages in the fwk.elg file: "de_allocate_port: fwx_alloc_global_del failed (second try)".

PRJ-54382,
PMTR-102723

SecureXL

A Maestro Security Group Member may fail to initialize after enabling IPv6 and is stuck with pull_config pnote.

PRJ-57610,
PRHF-36204

SecureXL

In some scenarios, after an update of the OS route configuration, there may be a significant delay in traffic passing through the Security Gateway when SecureXL works in the User space (UPPAK) mode. Refer to sk182740.

PRJ-57680,
PRHF-36561

SecureXL

A memory leak may occur in the SIM process when using DOS/Rate Limiting rules.

PRJ-56399,
PMTR-107175

SecureXL

When modifying MTU settings on LightSpeed Line Card interfaces with SecureXL working in User mode (UPPAK) and not re-enabling both ports immediately after the change, persistent interface binding errors may be printed in the /var/log/usim_x86.elg file, such as "Failed to bind hairpin Tx 2 to Rx 3 (64 - all ports)".

PRJ-57799,
PMTR-109570

SecureXL

Policy installation failures may cause "fwaccel dos" commands to stop working.

PRJ-56418,
PMTR-107014

Gaia OS

Miscalculation of disk space may cause snapshot to fail.

PRJ-46984,
PRHF-27944

Gaia OS

When working with SNMP traps, Clish may become slow and unresponsive.

PRJ-54255,
PRJ-54254

Gaia OS

When Gaia's backup retention policy is configured with a maximum of one backup or a disk space allocation smaller than the backup file size, the backup process hangs and requires a device reboot. This also may cause the CONFD daemon to exit.

PRJ-54154,
PRHF-33439

Gaia OS

When querying VLAN interfaces, instead of returning the ifType specifically for the VLAN interface itself, the SNMP walk returns the ifType of the underlying physical interface that the VLAN is associated with.

PRJ-58163,
PRHF-37102

Gaia OS

The ROUTED daemon fails to start when a VTI is configured with a local IP address that matches the next-hop address used in the static route configuration. Refer to sk182848.

PRJ-53603,
PRHF-32577

Gaia OS

Capturing with Check Point Traffic Capture Tool (cppcap) from all devices may lead to high CPU usage and potential performance issues.

PRJ-57989,
PRHF-36805

Routing

The "iphelper" (IP Broadcast Helper) service may trigger high CPU utilization because of a recursive packet broadcasting loop between network interfaces.

PRJ-57984,
ROUT-3189

Routing

Static routes may get permanently deleted from the kernel during rapid interface configuration changes when there is a large number of routes.

PRJ-55553,
PRHF-34063

VPN

Policy installation fails with "ERROR: Duplicate keys <0000001b, ac130265, ac130265> in table vpn_routing_correction" when duplicating keys in a VPN table and "Encryption domain per community" is configured. Refer to sk182353.

PRJ-57999,
PRHF-36849

VPN

Capsule VPN connectivity failures may occur after a configuration change of the VPND daemon table parameters.

PRJ-56171,
PRHF-35251

VPN

An ECDH object may be deleted before its associated event is completed processing.

PRJ-53462,
PRHF-31882

VPN

In some scenarios when Link Selection (LS) is configured, traffic outage may occur after policy installation.

PRJ-56497,
PRHF-35416

VPN

There is no audio during the first 5 seconds of each VoIP call. Refer to sk182730.

PRJ-56803,
PRHF-34632

VPN

SSL Network Extender (SNX) traffic on Maestro may be dropped with "vpnk_tcpt invalid negative tunnel id". Refer to sk182806.

PRJ-54557,
PRHF-33826

VPN

Policy installation in large scale VPN environments may take a long time.

PRJ-57941,
PMTR-108894

VPN

When configuring machine authentication without an LDAP server, the computer is authenticated during the connection with the RA VPN. However, the logs in SmartConsole do not display the "Authenticated machine ..." message as expected.

PRJ-56913,
PRHF-35806

VSX

In SmartConsole, in the Device and License Information view, the Compliance Blade license status may incorrectly display "Quota Exceeded" when Virtual Routers or Virtual Switches are present.

PRJ-54637,
PRHF-33880

VSX

The "vsx_util convert_cluster" command may fail and cause the FWM process to exit with a core file.

PRJ-57393,
PRHF-29543

VSX

Newly pushed VSX configuration on Maestro may not be synchronized on all Security Group Members, causing DOWN state.

PRJ-57744,
PRHF-36734

VSX

In a rare scenario, the FWM process may exit when running the VSX creation wizard.

PRJ-57057,

PRHF-34508

VSX

After a Jumbo Hotfix upgrade, the Mail Transfer Agent may fail on all Virtual Systems except one.

See the Critical Information section.

PRJ-49285,
PRHF-30172

Harmony Endpoint

Exclusions for Anti-Bot policy created through the WebUI do not correctly handle Cyrillic characters.

PRJ-54334,
PMTR-96560

Scalable Platforms

When different Network Interface Card models are attached among Maestro Security Group members, it may trigger unnecessary reboots.

PRJ-37792,
PMTR-80635

Scalable Platforms

When Maestro Hyperscale Orchestrator (MHO) is not reachable, the "mq_mng -s" command becomes unresponsive.

PRJ-57641,
PRJ-58110

Scalable Platforms

Activation of downgraded Security Group members may fail, preventing the rollback process performed using the "sp_upgrade --revert" command.

PRJ-57638,
PMTR-100964

Scalable Platforms

Security Group Member may be in Down state during the license distribution to Maestro Security Group members. Refer to sk181245.

PRJ-57479,

PMTR-109043

Scalable Platforms

During a Maestro upgrade, if one of the Security Gateway members becomes unresponsive or enters a DETACH/LOST state, policy installation from SmartConsole fails.

PRJ-58037,
MBS-14520

Scalable Platforms

Using the "#" character in the Message of the Day (MOTD) banner message causes SGMs to fail during boot.

PRJ-57471,
PRHF-36424

Scalable Platforms

In rare scenarios, Interface Active check may cause a Security Gateway crash when probing a local network.

PRJ-48695,
PMTR-94043

Scalable Platforms

After upgrade:

  • Output of the "asg diag verify" command shows in the "System Components" section that the status of the "Software Provision" test is "Failed".

  • Output of the "asg diag print <ID of "Software Provision">" command shows a shell script code.

  • Output of the "asg_provision" command shows a shell script code.

PRJ-56442,
PRHF-31476

Carrier Security

When Carrier Security is enabled, GTP-U packets are incorrectly matched against GTP rules instead of a non-GTP UDP rule, causing drops with the "Unestablished tunnel" error.