R81.10 Jumbo Hotfix Take 177

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 177

Released on 23 June 2025

Take 177 - Improvements and Resolved Issues

 

PRJ-60770,

HEC-868,

PMTR-114867

Diagnostics

UPDATE: Added the ability to monitor the CPU cores that run CoreXL SND (Secure Network Dispatcher) instances separately from the CPU cores that run CoreXL Firewall instances. The monitoring of CPU cores handling CoreXL SND instances was improved. It is possible now to:

  • view the exact number of CPU cores running SND instances that are under load, instead of seeing it as a percentage of total CPU cores.

  • configure the load threshold for CPU cores running CoreXL SND instances.

  • configure the load duration for SND CPU cores.

When these parameters are configured, the load on SND CPUs triggers a failover at a different time and under different load conditions compared to Firewall CPUs. Refer to the R81.10 ClusterXL Administration Guide > Advanced Features and Procedures > ClusterXL Failover based on the Load on ClusterXL SND Instances.

PRJ-48562,
PRHF-29060

Security Management

UPDATE: Added a tool to extract data from the API logs to get the API usage information. Refer to sk181906.

PRJ-61386,
PRHF-39859

Security Management

UPDATE: On Security Management Servers, environment variables set using the override_server_setting.sh script now apply to all processes. Refer to sk165938.

PRJ-44441,
PMTR-79655

Multi-Domain Security Management

UPDATE: In Multi-Domain Security Management, allowed GUI Clients can now be defined by IP address with netmask or by IP address ranges using the "mdsconfig" command. Previously, it was available only in the "cpconfig" options.

PRJ-53197,
PRHF-31159

Logging

UPDATE: Added a mechanism to prevent log display delays, when SmartView reports show "No data found" in some widgets. Refer to sk181209.

PRJ-59879,
PRHF-38023

Security Gateway

UPDATE: Improved processing of ICMP packets in the Security Gateway.

PRJ-58813,
PRHF-37100

Security Gateway

UPDATE: Added a kernel parameter "domo_reverse_lookup_disabled" to disable reverse DNS lookups to avoid rare incorrect matches in scenarios involving non-Fully Qualified Domain Name (non-FQDN) Domains.

  • "domo_reverse_lookup_disabled 1" to disable reverse DNS lookups.

  • "domo_reverse_lookup_disabled 0" to enable reverse DNS lookups (the default value).

PRJ-57077,
PRHF-35181

Security Gateway

UPDATE: RAD extended flow information is now logged into a cyclic CSV file - $FWDIR/log/rad_events/rad_flows.csv. This enhancement provides visibility into RAD connections, helping to monitoring and troubleshooting. Refer to sk183108.

PRJ-58554,
FMW-2292,

PMTR-110440

Security Gateway

UPDATE: Support TLS 1.3 for the RAD process requests. To activate it, change the TLS version to "TLSv1_3". Refer to sk178505.

PRJ-50209,
PMTR-96165

Security Gateway

UPDATE: Improved the FW Monitor command output syntax. Refer to sk30583.

PRJ-54140,
PRHF-31274

SSL Inspection

UPDATE: HTTPS Inspection statistics are now available through SNMP requests.

PRJ-58752,
PRHF-36873

Mobile Access

UPDATE: Added support for the Mobile Access Portal "WebSocket" applications to work in environments with asymmetric network bandwidth (the download speed is faster than the upload speed) between external and internal networks. Refer to sk95311.

PRJ-51314,

PMTR-98157

Harmony Endpoint

UPDATE: Harmony Endpoint Management Server Anti-Malware (E2) updater now supports Linux packages. Previously, Linux packages were available for download and installation only through other tools.

PRJ-57213,
PMTR-110740

CloudGuard Network

UPDATE: Traffic between an external network host and an internal network host is now accelerated when a static NAT is configured to translate a cluster member's IP address or specific high port to an internal host IP address or specific service port. This scenario is relevant in Check Point CloudGuard Network Security Azure High Availability deployments, where traffic passes through a Load Balancer.

  • To enable acceleration, add the following kernel parameter to the $FWDIR/boot/modules/fwkern.conf file - "accel_dnat_to_cluster=1".

  • The change can also be applied immediately to the running FW1 process without requiring a reboot: "fw ctl set int accel_dnat_to_cluster 1".

PRJ-59995,

ODU-2227

Automatic Updates - Smart-1 Cloud

UPDATE: Added Update 8 of Quantum Smart-1 Cloud. Refer to sk166056.

PRJ-61757,

ODU-2722,

PRJ-61495,

ODU-2618,

PRJ-60328,

ODU-2403,

PRJ-60787,

ODU-2443,

PRJ-61122,

ODU-2491

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 134, Take 135, Take 136, Take 140, Take 142 via self-updatable package. Refer to sk170314.

PRJ-61148,

ODU-2483

Automatic Updates - HCP

UPDATE: Added Update 22 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-61571,
ODU-2674

Automatic Updates - CPView

UPDATE: Added Take 179 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-61562,
ODU-2682

Automatic Updates - CPView

UPDATE: Added Take 44 of CPviewExporter Release Updates. Refer to sk180521.

PRJ-61565,
ODU-2690

Automatic Updates - CPView

UPDATE: Added Take 47 of CPquid (QUID) Release Updates. Refer to sk181458.

PRJ-56781,

PRHF-35847

Diagnostics

In SmartConsole, in the Gateways & Servers view, under Device & License Information of a Security Gateway or Cluster object, or in CPView and SNMP traps, the value of "new connection rate" for OID .1.3.6.1.4.1.2620.1.1.26.11.6.0 is incorrect.

PRJ-57034,
PRHF-35374

Security Management

In some scenarios, deleting a Security Gateway object fails if the Security Gateway is a participant in Global VPN Community.

PRJ-57719,
PRHF-36549

Security Management

Inserting the "\n" character in the name of a rule fails with an unclear error message not indicating the cause of the failure.

PRJ-61174,
PMTR-90911

Security Management

In SmartConsole, the CSV export file of Access Policy NAT rules may contain incorrect hit count data.

PRJ-58849,
PRHF-37388

Security Management

In rare scenarios, a core file of the CPRLIC process is generated.

PRJ-57137,

PRHF-36149

Security Management

In some scenarios, the Security Management Server with a proxy configured is unable to connect to Infinity Portal after changing the proxy settings.

PRJ-57537,
PRHF-36475

Security Management

In some scenarios, the "show packages" Management API command with "details-level full", fails with "Null Pointer exception: null".

PRJ-58446,
PRHF-37393

Security Management

In rare scenarios, Revert to Database Revision is stuck at 10%.

PRJ-58716,
PRHF-37561

Security Management

Changes to a SmartConsole administrator's Authentication Server (RADIUS or TACACS) may occasionally fail to take effect.

PRJ-46670,
PMTR-63558

Security Management

In the Management API, when setting "scan-malicious-links.max-bytes" to a value greater than 10,000 bytes, the API returns a "generic_error".

PRJ-59095,
PRHF-37788

Security Management

Management Server operations may be slow because of some API commands, and multiple core dumps may be generated.

PRJ-58470,
PRHF-37430

Security Management

Creating a Threat Prevention Exception from a log fails with the "Failed to add exception" error when the "File Name" field in the log contains a Windows directory separator ("\").

PRJ-57816,
PMTR-107227

Security Management

In some scenarios, Web SmartConsole session gets disconnected after several minutes.

PRJ-48281,
PRHF-29640

Security Management

Execution of the "set access-rule" and "add access-rule" API commands takes a long time to complete. Refer to sk181349.

PRJ-58522,
PRHF-37446

Security Management

In rare scenarios, login to SmartConsole may fail with the timeout.

PRJ-58339,
PRHF-37251

Security Management

In rare scenarios, login to SmartConsole using LDAP, TACACS or RADIUS authentication fails with a timeout.

PRJ-58899,
PRHF-37631

Security Management

After an IPS update, reassigning global policies may take a long time.

PRJ-57395,
PRHF-36340

Security Management

In rare scenarios, when more than one Security Blade is enabled on the Security Gateway, Install Policy Presets may fail after purging all revisions.

PRJ-58918,
PRHF-37819

Security Management

In rare scenarios, policy installation fails with "Policy installation had failed due to an internal error".

PRJ-58501,
PRHF-37445

Security Management

Renaming a Secondary Security Management Server that was promoted to Primary fails.

PRJ-58525,
PRHF-37141

Security Management

In some scenarios, policy state directories are synchronized between Active and Standby Security Management Servers, leading to high disk space usage.

PRJ-56520,

PRHF-35230

Security Management

In rare scenarios, the first packet of a connection is incorrectly dropped when a non-FQDN object is used in the Rule Base.

PRJ-58572,
PRHF-37436

Security Management

Global Policy Reassignment fails with the"org.postgresql.util.PSQLException: ERROR: more than one row returned by a subquery used as an expression" error printed in the cpm.elg file.

PRJ-57628,
PRHF-36614

Security Management

In rare scenarios, Infinity Portal shows the "Failed to update Infinity Portal with objects from your on-premises Management Server. Contact Check Point Support" error.

PRJ-58915,

PRHF-37822

Security Management

Policy Installation may not be accelerated after modifying a host in a rule with the inline layer action.

PRJ-57305,
PRHF-36241

Security Management

If a custom login message exceeds 1000 characters, the login output file, which contains the sid and other session data, cannot be parsed as expected. Using the "mgmt_cli" with the "-s" parameter results in the "Failed to parse login output file" error.

PRJ-59598,
PRHF-38330

Security Management

In rare scenarios, Global Policy Assignment fails with an "IPS update is currently running in local domain" message, although IPS update is not running in that Domain.

PRJ-60694,

PRHF-39191,

PMTR-114757

Security Management

Login using a TACACS Server created with the "add tacacs-server" Management API command, fails with "authentication to server failed".

PRJ-59023,
PRHF-37832

Security Management

Access Policy installation may take a long time when updatable objects are used in the policy.

PRJ-55936,
PRHF-34898

Security Management

Packet mode search or search within Object Explorer for IP address ranges may not work correctly on the Standby Security Management Server.

PRJ-59629,
PRHF-38384

Security Management

In a rare scenario, December date comments in the IPS User Settings view may display incorrect year.

PRJ-59339,
PMTR-111778

Security Management

When a Security Gateway object is deleted, its license may still appear as attached even though the Security Gateway Object no longer exists.

PRJ-59306,
PRHF-38068

Security Management

In some scenarios, the "Log Servers" tab in the Logs & Monitor view of SmartConsole is not visible. Refer to sk183154.

PRJ-57321,
PRHF-36147

Security Management

When modifying the URL definition type in an Application Site object using the "set application-site" Management API command with the "urls-defined-as-regular-expression" parameter, the type of pre-existing URLs remains unchanged.

PRJ-55625,
PRHF-34401

Security Management

The "vsx-run-operation" Management API command may fail on the Multi-Domain Security Management Server. Refer to sk182524.

PRJ-60517,
PMTR-114274

Security Management

VPN certificate renewal may generate certificates with 2K key sizes instead of the 3K size specified in Global Properties.

PRJ-60468,
PRHF-38859

Security Management

Deleting a user that is used in a user group with more than 1000 users may cause SmartConsole to time out.

PRJ-60760,
PRHF-39098

Security Management

In rare scenarios, after deleting Data Center objects:

  • Login to the Security Management Server may fail with timeout.

  • Publish operations may take a long time.

PRJ-60431,
PRHF-38563

Security Management

Virtual System routes and interfaces may not be synchronized to the Standby Security Management Servers.

PRJ-57973,
PRHF-36695

Security Management

In some scenarios, the Postgres database on the Standby Security Management Server is growing after every High Availability synchronization. Refer to sk182868.

PRJ-54441,
PRHF-33411

Security Management

In some scenarios, when exporting the Gateways and Servers View to CSV, the resulting file may contain an extra empty column. Refer to sk182233.

PRJ-60697,
PRHF-39297

Security Management

The Management API command "set simple-gateway name 'XXX' usercheck-portal-settings.enabled {false|true}" fails to properly enable or disable User Check for Security Gateway objects. When running this command, the change is not applied to the Security Gateway configuration, and the "Enable UserCheck for active blades" setting in SmartConsole remains unchanged.

PRJ-61041,
PRHF-39465

Security Management

In rare scenarios, accelerated policy installation fails to initialize, the full Access Policy installation is executed instead and it may take up to 20 minutes.

PRJ-60959,
PRHF-38808

Security Management

In rare scenarios, in multi-site Multi-Domain Security Management environments, operations across two or more Servers, such as Global Domain Assignment, IPS and Application Control update may fail.

PRJ-58350,
PRHF-37197

Security Management

In some scenarios, policy installation fails with the "/opt/<xxxxx>-R81.20/conf/Policy-name.pf" line N: ERROR: syntax error Error compiling IPv6 flavor. Operation ended with errors" error.

PRJ-60321,

PMTR-114256

Multi-Domain Security Management

Multiple errors "T_get_event: cannot register socket %d (%d sockets already registered for %s)" are printed in $MDSDIR/log/ in.msd.

PRJ-58845,
PRHF-34721

Multi-Domain Security Management

In a Multi-Domain Security Management environment with a VSX Gateway, such operations as login to SmartConsole, Global Domain Assignment, Domain creation or deletion may take longer than expected or fail with a timeout message "Task failed".

PRJ-56975,
PRHF-35998

Multi-Domain Security Management

In some scenarios, in the Multi-Domain Security Management Server, certain previously utilized global objects may remain hidden from both the SmartConsole's Object Explorer View and the "show unused-objects" Management API command.

PRJ-39629,
PRHF-23903

Multi-Domain Security Management

In a Multi-Domain Security Management environment, RADIUS authentication may be sent with an incorrect IP address. Refer to sk180723.

PRJ-58872,
PRHF-37752

Multi-Domain Security Management

In certain scenarios, when Cluster objects are used in a Multi-Domain Security Management Server with Domains that have Global Domain Assignments, an upgrade may fail with "Tried to persist object OBJ_ID with domain 1e294ce0-367a-11e3-aa6e-0800200c9a66 while active domain is DOMAIN_ID".

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or with the Advanced Upgrade method.

PRJ-58775,
PRHF-37360

Multi-Domain Security Management

In a Multi-Domain Security Management environment, an audit log is not created after changing the "Parent rule for Domain's policy" Domain layer.

PRJ-58979,
PRHF-37890

Multi-Domain Security Management

In some scenarios, the "SIC Error for EntitlementManager: Peer sent wrong DN" error is printed in cpd.elg on a VSX Gateway.

PRJ-57776,
PRHF-36292

Multi-Domain Security Management

In some scenarios, on a Multi-Domain Security Management Server, implied rules are not logged for clusters managed by Domains with Global Domain Assignment.

PRJ-59623,

PRHF-38414

Multi-Domain Security Management

In rare scenarios, Domain creation fails with "Failed to create Domain server '<Domain Server Name>'. The connected administrator has no permission to create a Domain-Server on the specified Domain".

PRJ-59769,
PMTR-112934

Compliance

In rare scenarios, the "Blades" widget in the Compliance Blade Overview page is blank.

PRJ-58241,
PMTR-110065

CPView

After rebooting a Multi-Domain Security Management Server, the CPView (sk101878) and Skyline (sk178566) tools do not return data (for example, when running the"cpview -m", "cpview -t", "cpview -s" commands).

PRJ-58324,

PRHF-37340

CPView

CPView shows incorrect interface data on some VSX Gateways.

PRJ-55406,
PRHF-34152

Logging

In rare scenarios, the description of IPS Logs in the Logs view may be unclear. Refer to sk182386.

PRJ-59346,
PMTR-111094

Logging

In the cloud environments (Smart-1 Cloud and EPMaaS), logs query may fail because of the AWS certificate change.

PRJ-61429,
PRJ-61394

Logging

The "cp_log_export" command produces the correct output but displays a false error alert beforehand. This is a cosmetic issue.

PRJ-60537,
PRHF-38647

Security Gateway

In a rare scenario, after an upgrade, the Security Gateway may crash with a vmcore.

PRJ-60201,
PRHF-38844

Security Gateway

In a rare scenario, VoIP Traffic fails after the initial call when SecureXL operates in User Mode (UPPAK). Refer to sk183218.

PRJ-60947,
PRHF-39471

Security Gateway

In a rare scenario, the CPD daemon may exit on the Security Gateway.

PRJ-60534,
PRHF-38638

Security Gateway

In some scenarios, in a cluster environment, when URL Filtering is enabled, there may be traffic disruption.

PRJ-59893,
PRHF-38438

Security Gateway

The VSX Security Gateway may crash when an external interface connected to the Virtual Router or Virtual Switch starts flapping.

PRJ-60944,
PRHF-39464

Security Gateway

The CPD or FWK process may unexpectedly restart when handling the interface statistics.

PRJ-60444,
PRHF-38975

Security Gateway

RADIUS authentication fails when a response packet contains the Message-Authenticator attribute. Refer to sk183244.

PRJ-60425,
PMTR-114342

Security Gateway

In rare scenarios, the FWK process may unexpectedly exit when the IPS Blade logs triggered protections.

PRJ-60802,

PRHF-38473

Security Gateway

The FWK process exits with core dumps and error messages in $FWDIR/log/fwk.elg:"malware_res_rep_match_dns_response: check_dns_response_activate() failed".

PRJ-60528,
PRHF-38547

Security Gateway

In a rare scenario, the Security Gateway may crash during email inspection.

PRJ-57738,

PRHF-36496

Security Gateway

Local connections originating from the Security Gateway may fail to refresh their timeout values.

PRJ-61153,

PRHF-39691

Security Gateway

A rare issue in HTTP/2 multiplexing may lead to traffic disruption. Refer to sk183441.

PRJ-59544,
PRHF-38154

Security Gateway

In some scenarios, the "Use of undefined constant session" warning is frequently printed in the SAML Portal's error_log file.

PRJ-60410,
PRHF-39061

Security Gateway

Policy installation fails with the error message: "All the rules in layer "<Name of Layer>" contain only expired time objects. See sk155253 for more details".

PRJ-58632,
PRHF-37150

Security Gateway

On a Security Group Member, one of the Security Gateways using Virtual System Load Sharing (VSLS) may become unresponsive.

PRJ-51957,
PMTR-69146

Security Gateway

A race condition may occur during the first Access Control install policy and cause log IDs to be invalid.

PRJ-59784,

PRHF-38340

Security Gateway

The FWK process may unexpectedly restart when running the memory detection leak procedure.

PRJ-59076,
PRHF-37910

Security Gateway

In a specific scenario, the RAD process may restart because of incorrect memory handling.

PRJ-56295,
PMTR-106906

Security Gateway

The FWK process on the Security Gateway may exit when processing the HTTP traffic.

PRJ-59547,

PRHF-38160

Security Gateway

In certain scenarios, the $SAMLPORTAL_HOME/logs/error_log file may continuously grow, potentially consuming a significant amount of disk space.

PRJ-59605,

PRHF-38380

Security Gateway

In a specific scenario, file downloads intermittently stop until resumed manually because of HTTP parsing issues and Content Awareness parsing failures.

PRJ-57717,
PMTR-100187

Security Gateway

The "fileapp_parser_get_attribs: call orig_get_attrib failed" error is printed in the $FWDIR/log/fwk.elg file.

PRJ-60288,

PRHF-38919

Security Gateway

Memory handling issue, causing the FWK process to unexpectedly restart.

PRJ-59129,
PRHF-38022

Security Gateway

The DHCPv6 relay drops reply messages from the DHCPv6 server rather than forwarding them to the clients.

PRJ-41827,
PRHF-25598

Security Gateway

When a NAT-T tunnel is set up between VPN peers, packets having UDP encapsulation added to the headers are not transmitted out of the PPPoE interface as they should be. VPN connection appears to be established but does not actually pass traffic.

PRJ-59112,
PRHF-37640

Security Gateway

Some Access Control Rule Base flows may increase CPU utilization .

PRJ-57515,

PMTR-82478

Security Gateway

The FWK process may occasionally exit because the Security Gateway requests incorrect network interface statistics.

PRJ-58388,

PRHF-36744

Security Gateway

The DSD process (Dynamic Split Daemon) may exit when the "affinity" command input is large.

PRJ-58626,

PRHF-36742

Security Gateway

In a Maestro environment with configured Virtual System Load Sharing (VSLS) Mode, one of the Security Gateways on an SGM may be unresponsive until it is restarted several times.

PRJ-58742,
PRHF-37487

Security Gateway

In a rare scenario, when the Anti-Virus Blade and the ICAP Server are enabled, there may be high CPU usage.

PRJ-59345,
PRHF-37361

Security Gateway

In a rare scenario, an outage may occur in an Azure environment after one cluster member crashes and recovers.

PRJ-58215,
PRHF-37208

Security Gateway

A rare race condition may cause a Security Gateway to restart when updating the statistics.

PRJ-59814,
PRHF-38598,

PRJ-50281,
PRHF-26394

Security Gateway

In rare scenarios, the CPD process may unexpectedly exit, generating a core dump.

PRJ-58391,
PRHF-36652

Security Gateway

In some scenarios, a memory leak may occur in the FWK process.

PRJ-57674,
PRHF-36647

Security Gateway

A stability issue where the ICAP Server may unexpectedly restart when processing traffic from a Security Gateway with Threat Emulation enabled.

PRJ-59117,
PMTR-110235

Security Gateway

In a rare scenario, the RAD daemon may exit during large memory allocation operations.

PRJ-58418,
PRHF-37014

Security Gateway

Android devices' HTTP HEAD requests to Google services are blocked by Security Gateway proxy, generating excessive logs that impact Security Gateway performance through high CPU usage. Refer to sk182990.

PRJ-58629,
PRHF-36749

Security Gateway

In a rare scenario, the FWK process may exit because of memory corruption.

PRJ-55825,
PRHF-34607

Threat Prevention

The Anti-Virus Blade incorrectly classifies the .pqx files as .zip files, resulting in failure logs.

PRJ-56413,

PRHF-35304

Threat Prevention

In rare scenarios, the Packet Capture field is missing from Threat Prevention logs in SmartConsole. Refer to sk182597.

PRJ-57867,
AAD-2659

Threat Prevention

In rare scenarios, SSH connections may be dropped when SSH Deep Packet Inspection (SSH DPI) is activated on the Security Gateway.

PRJ-57976,
PRHF-36739

Threat Extraction

In a rare scenario, a script related to CPView may take a long time to execute and the SCRUBD process becomes unresponsive.

PRJ-61765,

PMTR-116315

Threat Extraction

The Threat Extraction Software Blade may inadvertently delete some system files on the Security Gateway. Refer to sk183512.

PRJ-55327,
PRHF-33276

Threat Emulation

In rare scenarios, the Threat Emulation Blade may fail to correctly classify the file type.

PRJ-60248,

PRHF-38820

Identity Awareness

PDP to PEP Identity synchronization may fail on the PDP side if an alternative IP address for PEP communication is configured, as described in sk60701.

PRJ-56046,

PRHF-35030

Identity Awareness

Identity Broker Subscriber configured with local Access Role recalculation incorrectly deletes external groups during new Identity publishing, causing missing access roles and improper enforcement for CISCO ISE identity sessions.

PRJ-58458,
PRHF-37149

Application Control

Web protections may not properly block HTTP requests without a Host header.

PRJ-58635,

PRHF-37064

Application Control

The fwk.elg file may be flooded with the Application Control information messages "appi_clobs_observer_convert_context_dependent_ex: application id (60341234) has unknown context id and won't be free", "appi_clobs_observer_convert_context_dependent_ex: unknown exists: current cmi context = 181 ; removed dependent context = 720". This is a cosmetic issue.

PRJ-58755,
PRHF-37462

URL Filtering

In some scenarios, when URL Filtering Blade analyzes web requests, the RAD error may appear in /var/log/messages: "rad_kernel_urlf_request_serialize: string len =XXXX bigger than max 4096".

PRJ-57180,

PRHF-36126

URL Filtering

URL Filtering may not classify a site in a specific rare scenario when the Security Gateway is configured as a proxy.

PRJ-59574,
PRJ-59452

IPS

In rare scenarios, a memory leak in the FWK process may occur when IPS is active.

PRJ-56474,
PRHF-35174

IPS

In some scenarios, a Security Gateway is not listed as an option for the Threat Prevention uninstall, even though the Threat Prevention Blade is disabled on the Security Gateway object.

PRJ-56515,
PRHF-35504

DLP

DLP policies may not correctly block password-protected and unprotected files during Google Drive uploads, despite the Content Awareness Blade configuration.

PRJ-59379,
PRJ-59376

Anti-Virus

In some scenarios, the user configurations are overwritten in the RAD configuration file.

PRJ-58003,

PRHF-36322

Anti-Virus

In rare scenarios, Security Gateways with the Content Awareness Blade enabled may fail to properly process certain .zip file formats, resulting in "Failed to process files" errors during the Anti-Virus inspection.

PRJ-49483,
PRHF-30036

Anti-Virus

When Anti-Virus is enabled, files are not downloaded with the "Failed writing the file" error printed in logs, and the block page is not displayed.

PRJ-53156,
PRHF-32596

Anti-Virus

In specific scenarios, the Anti-Virus file type classification engine incorrectly identifies Microsoft Office documents as zip archives, leading to improper handling of these files.

PRJ-59855,
PRHF-38565

Anti-Virus

In some failure scenarios, the Anti-Virus Blade does not report the failure in a SmartConsole log.

PRJ-58654,

PRHF-37376

Anti-Virus

RAD queries fail, generating "wrong status code in reply" errors logged in $FWDIR/log/rad_events/Error/* files. Refer to sk183009.

PRJ-58839,

PMTR-105936

Anti-Bot

When the Security Gateway with FIPS mode is enabled, running the Anti-Virus and Anti-Bot Blades updates with the "fw update -b AB -b AV -f" command fails.

PRJ-59222,

PRHF-38081

Anti-Bot

In some scenarios, a SmartConsole log with the Anti-Bot Blade entries may appear when the Anti-Bot Blade is disabled in the profile.

PRJ-60661,

PMTR-114734

Anti-Bot

In rare scenarios, the RAD process may unexpectedly exit.

PRJ-46240,
PMTR-87652

Mobile Access

In a VSX environment, the WebSocket applications in Mobile Access may fail to resolve their destination addresses through DNS when the DNS configuration at the global level differs from the DNS configuration of a local Virtual System.

PRJ-60104,
PRHF-38755

Mobile Access

The HTTPD process periodically exits when accessing the Mobile Access Blade Citrix application because of the memory leak in the Citrix proxy implementation.

PRJ-60614,

PRHF-39184

Mobile Access

The Mobile Access Portal hosted on a Security Gateway R81.20 or lower becomes unresponsive, and CVPND core files are generated after the Security Management Server is upgraded to version R82.

PRJ-60291,

PRHF-38847

ClusterXL

A race condition may occur during startup when the ROUTED daemon does not receive all cluster Virtual IP addresses, causing static routes to disappear.

PRJ-60543,
PRHF-38704

ClusterXL

In ClusterXL High Availability setup, a crash may occur on both the primary and secondary members, causing network outages.

PRJ-60297,

PMTR-98413

ClusterXL

In rare scenarios, the FWK process exits during a cluster failover.

PRJ-59888,
PRJ-59583

ClusterXL

The FWK process may exit after enabling or disabling the "Same VMAC" feature. Refer to sk165674.

PRJ-52523,
PRHF-32026

ClusterXL

When attempting to configure the minimum number of required subordinate interfaces for Bond Load Sharing, the settings are not applied.

PRJ-59491,

PMTR-111453

ClusterXL

During cluster startup with routing separation enabled, a mismatch between routing and firewall process initialization can trigger premature full synchronization pnotes when the routing process is not fully synchronized.

PRJ-59211,
HEC-1195

ClusterXL

In High Availability Bridge Mode ClusterXL environments, the management interface of a Standby member becomes inaccessible. Refer to sk183124.

PRJ-61022,
PMTR-115089

SecureXL

In rare scenarios, when SecureXL works in User Mode, running the "reset_gw" or "vsx_util reconfigure" commands may cause the Security Gateway to crash.

PRJ-61215,

PRHF-39512

SecureXL

The Security Gateway with SecureXL in User Mode (UPPAK) may crash under load during bond interface state flapping.

PRJ-59501,
PRHF-38095

ClusterXL

In rare scenarios, after enabling Bridge Mode, a cluster member may stuck in a boot loop.

PRJ-61024,

PRJ-61004

SecureXL

SecureXL in User Mode (UPPAK) may restart when adding or removing VLAN interfaces and the Security Gateway is under high load.

PRJ-60068,
PMTR-111505

SecureXL

Running the "tcpdump" command on all interfaces (for example, "tcpdump -peni any") on machines with SecureXL in User mode while under heavy traffic load may cause the system to hang. Refer to sk183222.

PRJ-60721,

PMTR-114790

SecureXL

The Security Gateway may crash when connected to the Smart-1 Cloud Management Server and a maas_tunnel interface is repeatedly added and deleted.

PRJ-58079,
PMTR-68784

SecureXL

Packet drops may occur if the same multicast packet is received on multiple interfaces.

PRJ-53630,
PRHF-32840

SecureXL

High volumes of RST packets may cause CPU spikes, resulting in incoming network packet drops on SND instances.

PRJ-60254,

PMTR-113688

SecureXL

SecureXL in User Mode (UPPAK) may restart when the Security Gateway is under high load and cpWatchDog triggers a reboot.

PRJ-59361,
PMTR-111468

SecureXL

When SecureXL is in User Mode (UPPAK), in a VSX environment with many virtual systems, the WebUI may not be accessible when it reaches its internal connection limit.

PRJ-60684,

PRHF-39209

SecureXL

The packets may not be accelerated because of a routing issue.

PRJ-60473,

PMTR-114373

SecureXL

The Hardware Acceleration offloaded connection may break when the route is updated, affecting the offload flow and slowing down operations.

PRJ-60158,

PRHF-38880

SecureXL

Routing related connectivity and stability issues may occur when SecureXL operates in User Mode (UPPAK). Refer to sk183181.

See the Critical Information section.

PRJ-60308,

PMTR-114110

SecureXL

The USIM_x86 may potentially exit because of a race condition when a route is simultaneously used by multiple SND cores.

PRJ-61181,
PRHF-39695

SecureXL

Multicast traffic is dropped when the Packet-Broker operates in Monitor Mode with Promiscuous Mode disabled.

PRJ-61212,
PMTR-115308

Routing

If BFD (Bidirectional Forwarding Detection) timing parameters, such as "min-rx-interval", are modified during an active BFD session deletion process, and a new BFD session is established before the deletion fully completes (deletion typically requires up to 2 hours), the newly created session inherits the previous timing configuration rather than applying the updated timing settings.

PRJ-61329,
PMTR-115613

Routing

When working in User Mode (UPPAK), SecureXL may crash when multiple SND cores perform simultaneous next hop lookup for the same nexthop.

PRJ-58780,
ROUT-3107

Routing

The ROUTED daemon may exit with a coredump file during IBGP synchronization.

PRJ-60236,

PRHF-37606

Routing

In rare cases, when an internal BGP (iBGP) peer disconnects during a graceful restart, BGP may fail to advertise all routes. However, the missing routes still appear under "adj-rib-out" with a next hop of "0.0.0.0."

PRJ-59286,

PMTR-111756

Routing

SecureXL may drop traffic with "cphwd_send_packet Reason: F2P outbound processing failed (CPAS)". Refer to sk183194.

PRJ-58786,
PRHF-37697

Routing

Duplicate entries in the kernel routing table can occur when iBGP peers disconnect and reconnect, causing the same routes to be added multiple times rather than properly replaced.

PRJ-59243,
ROUT-3336

Routing

The ROUTED daemon asserts when enabling eBGP multihop on a directly connected interface.

PRJ-60099,
HAAN-880

Routing

BGP sessions may terminate upon receiving a BGP Update containing an AS_SET Path Attribute when Peer Local AS was configured on the Security Gateway.

PRJ-60018,

ROUT-2303,

PMTR-113526,

PRHF-38771

Routing

When configuring a per-peer local address in BGP, IPv6 local address validation fails.

PRJ-58952,
PMTR-86085

Routing

Netflow logs appear in /var/log/messages, although netflow is not enabled. Refer to sk109038.

PRJ-60121,
PRHF-38736

Routing

The ROUTED process core dump file may be generated because of an assertion failure in the OSPF code.

PRJ-58773,
PRHF-37444

Routing

The ROUTED process may exit when processing OSPF network updates in a cluster environment. This occurs because of a timing issue in the routing protocol synchronization process.

PRJ-60743,
PMTR-114835

Routing

In some scenarios, BGP routing updates may not be processed properly.

PRJ-57125,
PMTR-108327

VPN

VPN traffic may be dropped when there is Large Scale VPN (LSV) peer.

PRJ-57169,
PMTR-104228

VPN

BGP peering over Route-based VPN may fail because Azure cluster members use their own IP address as source instead of the Virtual IP address, preventing proper routing protocol establishment.

PRJ-61821,

PRHF-40371

VPN

After an upgrade, Site to Site VPN tunnels (IKEv2) fail to establish. Logs show the "Auth exchange: Sending notification to peer: Invalid syntax" and "INVALID_KE_PAYLOAD" errors for IKE traffic.

PRJ-60805,
PRHF-29605

VSX

In a VSX High Availability Cluster, ns_relay core dumps may be generated and multiple TCP errors are printed in ns_relay.elg logs, such as: "<TCP ERROR> receive_buffer: recv returned -1", "<TCP ERROR> tcp_srv_connect_aux: connect failed".

PRJ-58318,
PRHF-37066

VSX

Virtual Router advanced routes may be assigned incorrect priorities in policy-based routing configurations.

PRJ-58332,
PRHF-37228

VSX

The "fw stat" command output may not display the correct policy name for a Virtual System.

PRJ-58247,
PRHF-37106

VSX

SNMP counters may return incorrect data on VSX.

PRJ-47768,
PMTR-93189

VSX

The FWM core dump file is created when running the "vsx_util vsls" command on a VSX cluster without Virtual Systems configured.

PRJ-55477,
PRHF-34244

VSX

In rare scenarios, an entry in the FDB (bridge forwarding table) may be incorrectly marked as "Do not update". This can cause a traffic outage lasting several minutes after a Virtual System fails over from one member to another. This issue only affects users who are using both VSLS with VS distribution and a vSwitch.

PRJ-47093,
PRHF-27999

VSX

In a VSX environment, the Security Gateway may crash when removing an interface from topology.

PRJ-57292,

PRHF-36254

VSX

Output of the "dynamic_split -p" command shows "Dynamic Split is currently off (Stopped due to State Verification failure)" on a VSX Gateway. Refer to sk181231.

PRJ-34723,

PRHF-14346

VSX

Broadcast storm may occur on Virtual Systems running in Bridge mode (IPv4/IPv6). Refer to sk180993.

PRJ-58789,

PRHF-37719

VSX

The "vsx_util view_vs_conf" command output may show "N/A" for a Gateway when an object in the Domain shares the same name as the Virtual System object.

PRJ-57348,
PRHF-36278

VSX

A static route to 0.0.0.0, regardless of the subnet mask, is incorrectly treated as the default route (0.0.0.0/0) and does not appear in the VSX Gateway's routing table. Refer to sk182742.

PRJ-53235,
PMTR-97794

VSX

Policy installation fails after converting VSX ClusterXL from High Availability to Load Sharing Mode using the "vsx_util convert_cluster" command.

PRJ-50471,
PRHF-30581

Gaia OS

In rare scenarios, a Security Gateway may unexpectedly restart when deleting interfaces of an 802.3ad bond interface.

PRJ-53286,
PMTR-71096

Gaia OS

RADIUS and TACACS users may not be able to reconnect with "Unable to get user permissions".

PRJ-58411,

PRHF-37416

Gaia OS

Exporting logs using the "backup -l" command may fail.

PRJ-57913,
PMTR-86473

Gaia OS

In Gaia Job Scheduler, when running a user-defined command, it may be replaced with "dummyCommand".

PRJ-58934,
PMTR-102731

Gaia OS

The "show interface" command fails to display loopback interface configurations, and the "CliError( ) called without module or error code" error is printed when attempting to view or modify loopback interfaces on the Security Gateway.

PRJ-58801,
PRHF-37713

Gaia OS

When attempting to create cloning groups on an R82 Security Gateway, the "Error - Home directory for 'cadmin' cannot be in /home/cadmin directory" error is printed. Refer to sk182989.

PRJ-59986,

PRHF-38501

Gaia OS

Multiple SNMP OIDs return incorrect data types. Refer to sk183166.

PRJ-61660,

ODU-2714

Gaia OS

The Redis Server does not start after installing the Gaia API Build 299. Refer to sk143612.

PRJ-58698,
PRHF-37362

Gaia OS

In a Maestro environment with RADIUS users, accessing the Gaia Portal for MHO causes an "ERR_EMPTY_RESPONSE" error and may cause the Gaia Portal (WebUI) not to respond.

PRJ-59010,
PRHF-37820

Gaia OS

In a Maestro environment, an error message about short string length may be incorrectly displayed when setting an expert password string that includes the colon ":" character on the Security Gateway.

PRJ-60458,

PMTR-114441,

VSECPC-10081

CloudGuard Network

The CloudGuard Network Central License utility incorrectly distributes licenses to Azure Virtual vWAN Gateways that already have licenses included during deployment.

PRJ-54698,
PMTR-104415

Scalable Platforms

Local connections from members at a standby site may fail when using the Same VMAC feature and a VPN Tunnel Interface (VTI) is configured.

PRJ-59843,
PRHF-38430

Scalable Platforms

In a Security Group in VSX mode, if an interface's link state changes during boot, there may be a delay in updating the link state. This delay can cause traffic interruption on that interface.

PRJ-60451,
HEC-914

Scalable Platforms

After a reboot, IPv6 addresses configured on data interfaces disappear from the "ifconfig" output when the Same VMAC feature is enabled in SmartConsole.

PRJ-56584,
PRHF-35421

Scalable Platforms

Connections with fragmented packets drop with the "Virt Defrag Timeout" error. Refer to sk182559.

PRJ-43617,
PMTR-79736

Scalable Platforms

After setting up a new VSX Gateway and enabling blades, VSX internal error is printed: "Virtual System Processing Completed with Errors Pushing network configuration to Virtual System operation has finished with errors. Refer to the messages retrieved during the VSX push configuration stage and make sure that the configuration you are trying to push is legal".

PRJ-58302,
PRHF-37070

Scalable Platforms

In a Maestro environment, migrating a Virtual System between Security Groups may cause a member to crash.

PRJ-58875,
PRHF-28979

Scalable Platforms

When running the "enabled_blades" command multiple times simultaneously, the command output may be incorrect. Refer to sk181024.

PRJ-59653,

PMTR-82807

Scalable Platforms

In Maestro Security Group, new contracts on the SMO, updated from the User Center, may not be distributed to the required members automatically as expected.

PRJ-59166,

FMW-3410

Scalable Platforms

The "ws_mux_host_only_active_pass: ERROR: There is not enough data in stream to pass" error may be printed in logs. This is a cosmetic issue.

PRJ-57607

Scalable Platforms

Connecting the ssm_sync port of a Maestro Orchestrator from one physical site (site ID 1) to the ssm_sync port of another Maestro Orchestrator at a different physical site (site ID 2) may result in traffic disruptions.

PRJ-47624,
PRHF-29470

Scalable Platforms

DNS configuration may not be pulled to other Security Gateway Members (SGMs) from the Single Management Object (SMO).

PRJ-58487,
PMTR-109895

Scalable Platforms

Upon contract renewal, non-SMO members in the Maestro Security Group may not get the updated contract automatically.

  • The fix requires this Jumbo Hotfix Accumulator Take to be installed on all the members of the group.

PRJ-59358,
PRJ-58161

Scalable Platforms

IP broadcast helper cannot forward the packets if the IP address of the "relay to" is not directly connected to the Security Gateway.

PRJ-52527,
PMTR-98152

Scalable Platforms

When a new user is added via the gClish command "add user" or through the WebUI, an unnecessary reboot of members in the Security Group occurs when configuration pulling is triggered (after a member goes down and up).

PRJ-58086,
PRHF-36586

Scalable Platforms

Configured proxy ARP may not work as expected, when the "Same VMAC" feature is enabled.

PRJ-59060,
PMTR-106842

Scalable Platforms

Changing the bond mode on Scalable Platform Security Group members may cause a MAC address mismatch on the bond interface because of bond slaves reordering that does not match the database. Refer to sk182488.

PRJ-60474,

PMTR-110389

Scalable Platforms

The "asg_dr_verifier" script fails when OSPF Graceful Restart is configured with a grace period.

PRJ-58323,
PRJ-58735

Scalable Platforms

In a Maestro environment, a Security Gateway may enter a reboot loop because of sync issues of the settings.fwset file.

PRJ-46078,
PMTR-90934

Scalable Platforms

After a Jumbo Hotfix upgrade a single site is displayed as active, but the assigned load value is 0%. Refer to sk182454.

PRJ-58344,
PRHF-37291

Scalable Platforms

In rare scenarios, the "asg perf" command fails because of the incorrect (negative) value of the number of connections per second (CPS) that are forwarded from SecureXL to the Firewall kernel in the slow path.

PRJ-57191,
PRJ-58961

Scalable Platforms

Import an R82 upgrade package may fail with "[ERROR] Failed to transfer package to several members, Import was aborted" because of timeout which occurs while copying the package to all Security Group members.

PRJ-59371,

PRHF-38206

Scalable Platforms

VPN tunnels may be disconnected because of an error in processing IKE (Internet Key Exchange) packet flow.

PRJ-59875,

PMTR-113194

Scalable Platforms

A reboot loop with a generated configuration pnote may be triggered when Security Group hostname contains strings with "mq" or "otlp".

PRJ-60673,

PRHF-38834

Scalable Platforms

Running "cpstop" on a specific Virtual System may cause traffic interruption in dual site deployments.

PRJ-44776,

PMTR-90651

Scalable Platforms

Incorrect entry order in the /etc/passwd file (admin user entry appearing after root user entry) causes adding Security Group Member with the "member / m" command to hang/fail. Refer to sk180183.

PRJ-60050,

PRHF-38689

Scalable Platforms

One member in a Maestro Security Group may be reported as down and inaccessible, the /var/log/messages and fwk.elg logs indicate:

  • "State change: ACTIVE -> DOWN | Reason: VSX PNOTE due to problem in Virtual System X",

  • "used greatest stack depth: 9544 bytes left",

  • Errors related to unknown/invalid parameters and kernel policy copy failures.