R81.10 Jumbo Hotfix Take 183

 

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 183

Released on 18 December 2025 and declared as Recommended on 22 February 2026

Take 183 - New Functionality

 

PRJ-60277,
PMTR-114156

Application Control

NEW: This Take introduces the Dynamic URL List feature is an enhancement to the Custom Applications/Sites object (sk165094), allowing to maintain a dynamic list of URLs based on a feed file. Refer to sk183102.

PRJ-62666,
PMTR-116161

Gaia OS

NEW: Hardened the authentication in the Gaia Cloning Group.

Important - After the installation of this Jumbo Hotfix Accumulator Take, you must follow these steps in each current Cloning Group:

  1. Make sure this Jumbo Hotfix Accumulator Take is installed on each Cloning Group Member

  2. On each of the Cloning Group Members, enter a Cloning Group password - enter the current password again or a new password.

  3. On each Cloning Group Member, re-synchronize the Cloning Group.

For more information, see the Gaia Administration Guide > Chapter "System Management" > Section "Cloning Group".

PRJ-62141,
PMTR-116780

CPView

NEW: Added the new Skyline metric "system.traffic.templates". Refer to the Skyline Administration Guide > Skyline Metrics Repository > System > Traffic.

Take 183 - Improvements and Resolved Issues

 

PRJ-63001,
PMTR-117744

Gaia OS

UPDATE: Check Point response to CVE-2025-32728 - The SSH directive "DisableForwarding" fails to disable "X11 Forwarding" and "Agent Forwarding". Refer to sk183394.

PRJ-62101,

PMTR-116716

Harmony Endpoint

UPDATE: Check Point response to Apache Tomcat CVEs on Harmony Endpoint Security Management Server - CVE-2025-31651 and CVE-2025-31650. Refer to sk183615.

PRJ-63740,
PMTR-119534

Gaia OS

UPDATE: Check Point response to CVE-2019-6109, CVE-2019-6110, CVE-2019-6111. Refer to sk65269.

PRJ-63623,
PMTR-119268

Logging

UPDATE: Resolved CVE-2025-2028. Lack of TLS validation when downloading a visualization support data file. Refer to sk183349.

PRJ-61284,
PRHF-39744

Security Management

UPDATE: The upgrade duration for the Security Management Server and Multi-Domain Security Management Server has been reduced by up to 60%.

  • The fix will only be applied if the upgrade to R81.10 Jumbo Hotfix Accumulator Take 183 is done using a Blink image or the Advanced Upgrade method.

PRJ-59283,
PRHF-38115

Security Management

UPDATE: JRE updated from version 8.0_8.26 to version 8.0_8.35.

PRJ-62306,
PMTR-117039

Security Management

UPDATE: Added the "show-only-local-domain" field to API queries to return only objects from the current local Domain.

PRJ-61670,

PMTR-89079

Security Management

UPDATE: Improved the "fw tab" CLI command help by adding descriptive explanations for each option.

PRJ-59693,
MGMTPROD-1385

Security Management

UPDATE: In SmartConsole and Management API, Access, and NAT Policies now support Rule Base search for hitcount values.

PRJ-64183,
PMTR-118961

Security Management

UPDATE: JRE updated from version 8.0_8.35 to version 8.0_8.50

PRJ-62341,
PMTR-115295

CPUSE

UPDATE: Added an HCP test to check whether the CPAC-2-100/25F, CPAC-2-100/25F-B, CPAC-2-40F-B, or CPAC-2-40F-C FW firmware is safe to update from R81.10 to a higher version. Refer to sk182403.

PRJ-60045,
PMTR-110330

Security Gateway

UPDATE: Added an out-of-the-box package for updatable objects that is included with clean installations or Jumbo Accumulator Hotfix Takes (when no other package exists). If the out-of-the-box package is present during policy installation, an update is now initiated in addition to the automatic update.

PRJ-62746,
PRHF-40593

Threat Prevention

UPDATE: Added an option to disable enforcement on internal interfaces when IOC indicators are loaded.

To configure this option, add or modify [IOC] enable_internal_interface=<value> in the file $FWDIR/conf/malware_config (for MDS, additionally in $MDS_FWDIR/conf/malware_config).

PRJ-62471,
PMTR-117312

IPS

UPDATE: HTTP/1.1 requests missing host headers are now processed by the non-compliant HTTP Protection feature (Strict Parsing option). Previously, such requests were dropped immediately. Refer to sk183569.

PRJ-60140,
PMTR-87460,

PRJ-60462,

PMTR-114416

SecureXL

UPDATE: SecureXL Rate Limiting rules for DoS Mitigation now support these parameters with automatic IP range updating enabled by default:

  • "cc:<COUNTRY_CODE>"

  • "asn:<AUTONOMOUS_SYSTEM_NUMBER>"

Refer to sk112454.

PRJ-54572,
PRHF-33808

Gaia OS

UPDATE: In the Gaia Portal, improved the text of the warning displayed when removing permissions from a user in the WebUI.

PRJ-59078,

PMTR-117436

CloudGuard Network

UPDATE: Added support for Data Centers in AWS ap-southeast-5 Malaysia, Thailand, Taipei, and Mexico regions.

PRJ-62682,
PMTR-116747

CloudGuard Network

UPDATE: The Microsoft Azure Network Adapter (MANA) driver is now disabled by default. Refer to sk183754.

PRJ-59064,
PRHF-32989

CloudGuard Network

UPDATE: CloudGuard Controller status in SmartConsole is now automatically updated.

PRJ-61786,
PMTR-101696

Scalable Platforms

UPDATE: CPView now monitors the Quantum Maestro backplane interfaces, Sync, and Chassis Internal Network (CIN) interfaces.

PRJ-62938,

ODU-2936,

PRJ-62171,

ODU-2754,

PRJ-63520,

ODU-3064,

PRJ-63711,

ODU-3111,

PRJ-64475,

ODU-3143,

PRJ-64636,

ODU-3259,

PRJ-65286,

ODU-3387

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 143, Take 147, Take 149, Take 150, Take 155, Take 156, Take 157 via self-updatable package. Refer to sk170314.

PRJ-62646,

ODU-2848

Automatic Updates - CPView

UPDATE: Added Take 75 of CPviewExporter Release Updates. Refer to sk180521.

PRJ-63263,

ODU-2952,

PRJ-64546,

ODU-3175

Automatic Updates - HCP

UPDATE: Added Update 23 and Update 24 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-62643,

ODU-2856,

PRJ-63516
ODU-3040,

PRJ-64903,
ODU-3275

Automatic Updates - CPView

UPDATE: Added Take 192, Take 201 and Take 210 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-62737,
ODU-2594,

PRJ-64827,

ODU-3235

Automatic Updates - Threat Prevention

UPDATE: Added Update 26 and take 27 of Autonomous Threat Prevention Management integration Release. Refer to sk167109.

PRJ-63898,
ODU-3127,

PRJ-64586,

ODU-3199,

PRJ-64741,

ODU-3267

Automatic Updates - CPView

UPDATE: Added Take 50, Take 52, Take 53 of CPquid (QUID) Release Updates. Refer to sk181458.

PRJ-63336,

ODU-2960

Automatic Updates - Scalable Platforms

UPDATE: Added Take 18 of Scalable Platforms (Maestro and Chassis) Release Updates. Refer to sk183156.

PRJ-61357,
PRHF-39806

Security Management

In some scenarios, a cluster object may not be listed in the "Uninstall Threat Prevention Policy" window.

PRJ-62991,
PRHF-41249

Security Management

Regenerating a token on a Security Gateway Smart-1 Cloud may fail with an unclear validation message "No error in result from fwm command: [gen-pki-cert-req]".

PRJ-61316,
PRHF-39827

Security Management

Fetching branches from an LDAP Server fails with "Failed to connect to LDAP Server. Please ensure that the administrator's credentials are correct and try again" when the LDAP Server does not support anonymous bind (when a client connects to an LDAP server without providing any credentials). To enable the ability, refer to sk183461.

PRJ-61475,
PRHF-40016

Security Management

In rare scenarios, the CPRLIC process may exit with core files generated to the /var/log/dump/usermode/ directory on the Security Management Server.

PRJ-60149,
PRHF-38525

Security Management

In some scenarios, Virtual Security Gateways lose their licenses. This causes Site to Site VPN and Remote Access VPN services to go down, while general internet access remains functional. SmartUpdate may not load.

PRJ-59083,
PRHF-37999

Security Management

Policy installation is delayed because of the FWM process load. Refer to sk183563.

PRJ-62553,

PRHF-40800

Security Management

In SmartConsole, if the Task pane has no tasks to show, it incorrectly shows an "Error retrieving results" message.

PRJ-61291,
PRHF-39777

Security Management

The $MDS_FWDIR/log directory may contain multiple api_status_UUID.json files.

PRJ-61288,
PRHF-39256

Security Management

In rare scenarios, login to the Security Management Server may fail with timeout.

PRJ-62021,
PRHF-40184

Security Management

In SmartConsole, deleting a license in the Licenses tab of a Security Cluster object fails with the "Domain Management Server licenses cannot be removed from the Domain Management Server level" error.

PRJ-59089,
PRHF-37685

Security Management

Administrators with LSM write permissions cannot delete LSM Gateway objects without also having write permissions for Others/Common Objects.

PRJ-57081,
PRHF-36096

Security Management

In some scenarios, the PostgreSQL database fully utilizes disk space on the Security Management Server.

PRJ-61320,
PRHF-39817

Security Management

Reassigning Global Policy takes a few hours after updating IPS Snort protections.

PRJ-61667,
PRHF-39885

Security Management

In some scenarios, SmartConsole disconnects when installing policy if there are 50 installation targets or more.

PRJ-62233,
MGMTPROD-436

Security Management

When adding an application to an Access Control rule with service set to "None" and track set to "Log", the "set-access-rule" Management API command triggers an error: "You must enable the Granularity option 'Session' for the Track option 'Log' if the rule specifies an application or a Contact Type".

PRJ-57300,
PRHF-35813

Security Management

In rare scenarios, the UserCheck policy is not updated during the Accelerated Policy installation.

PRJ-59664,
PRHF-37860

Security Management

Compliance scan finishes successfully but does not show any data in SmartConsole.

PRJ-62663,
PRHF-41094

Security Management

When Global Domain Assignment removal fails with the "Global Domain Assignment failed: object XXX could not be deleted because it is referenced by other objects" error, only a partial list of the referencing objects is displayed in the error message.

PRJ-57312,
PRHF-36228

Security Management

In some scenarios, the "where-used" Management API command with details-level set to "full" may fail with a "generic_internal_error" message, if the queried object is part of a Threat Prevention Exception Group.

PRJ-62312,
PRHF-40748

Security Management

The FWM daemon may leak and then exit.

PRJ-62091,
PRHF-40268

Security Management

In SmartConsole, when viewing the License tab of a Security Gateway object, multiple duplicated VSEC licenses with the same signature may be shown.

PRJ-61897,

PRHF-40211

Security Management

After editing an Interoperable Device object, the number of changes of the current session presented in SmartConsole may be inaccurate.

PRJ-62242,
PMTR-116383

Security Management

In rare scenarios, the FWM process on the Security Management Server may unexpectedly exit, creating a core dump file because of the incorrect license update.

PRJ-63198,
PMTR-118466

Security Management

In rare scenarios, the FWM process may not start automatically after an unexpected exit.

PRJ-60642,
PRHF-39082

Security Management

In some scenarios, the warning "Threat Prevention Policy: For better performance, blade exception rules with the action 'Inactive' should be placed above other exception rules" appears in SmartConsole even though no exception rules violate the recommended configuration.

PRJ-60373,

PRHF-38836

Security Management

VMcore crashes may occur with core dumps of the LOG_INDEXER, LOG_EXPORTER, and JAVA processes on the Security Management Server, causing high CPU utilization.

PRJ-60525,

PRHF-38743

Security Management

When running the "mgmt_cli -r true gaia-api/set-ntp target pocsms enabled true --format json" Management API command, the output is not the same as running it directly from Gaia API. Refer to sk184510.

PRJ-62549,

PMTR-117467

Security Management

In rare scenarios, the Security Management Server fails to start after performing a "Revert to Revision" operation.

PRJ-62636,
PRHF-40995

Security Management

After an IPS update, reassigning global policies may take a long time.

PRJ-61804,
PRHF-40186

Security Management

In rare scenarios, discarding an old session fails with an "An internal error has occurred" message.

PRJ-63488,
MGMTTECH-516

Security Management

Security Management Server upgrade may fail when running out of memory.

PRJ-59980,
PRHF-38312

Security Management

When migrating a Security Management Server to a Multi-Domain Security Management Server more than once, the operation fails with the "got at least one duplicate UID in requested list" error.

PRJ-60487,
PRHF-39032

Security Management

In some scenarios, when Configuration Sharing is enabled, audit logs may show failed login attempts to the CPM Server after publishing changes.

PRJ-61643,
PMTR-115879

Security Management

In rare scenarios, CME (Cloud Management Extension) fails to run because of the "show-simple-gateway" Management API command failure. The CME logs show such entries: "Product - CMESeverity - criticalDescription - Error during synchronization with Security Gateways. Error details: Failed to scan for gateway instances in the cloud account".

PRJ-60212,
PRHF-38893

Multi-Domain Security Management

In rare cases, Security Gateway licenses are not displayed in SmartUpdate when connected at the Multi-Domain Security Management level, despite being visible at the Domain level.

PRJ-63542,
PMTR-119007

Multi-Domain Security Management

On the Multi-Domain Security Management Server, when staging is cleared for an IPS protection in the Global Domain, any staging configuration for that same protection in the local Domain (within a Global profile) remains unchanged during policy assignment.

PRJ-62127,
PRHF-26970

Multi-Domain Security Management

Running the "mds_backup" command with "-v" flag may fail with "setenv: Too many arguments" error.

PRJ-63539,

PRHF-41609

Multi-Domain Security Management

In a Multi-Domain Security Management environment, when opening the License tab of a Security Gateway object in SmartConsole, the "Security Gateway was not found" error may be shown.

PRJ-63791,

PRHF-41803

Multi-Domain Security Management

On Multi-Domain Security Management Servers, custom Compliance Software Blade Best Practices may differ between the Multi-Domain Security Management level and the Domain level.

PRJ-63103,
PMTR-118295

CPView

In a VSX environment, the CPVIEWD daemon may exit and produce a core dump file.

PRJ-47564,

PRHF-29330

CPView

In CPView, under Network > Traffic in Concurrent Connections table, the amount of non-TCP connections is higher than shown in the output of the "fw ctl pstat" and "fw tab -t connections -s" command. The issue is cosmetic only.

PRJ-63596,

PRHF-41369

CPView

VSX CPU Usage calculation on multi-core devices may be incorrect.

PRJ-62752,

PRHF-41169,

PMTR-117799,

PRHF-41238

CPView

The CPVIEW_SERVICES process may exit because of incorrect database handling.

PRJ-59192,
PRHF-38042

Logging

When viewing certain reports in SmartView, the "No data found" error may appear even when matching logs exist.

PRJ-61928,
PMTR-105087

Logging

In some scenarios, exporting logs to a CSV file at the Multi-Domain Security Management level generates an incomplete file with empty lines, and a log_indexer core dump may be found on the Server.

PRJ-63917,

PRHF-41964

Security Gateway

Certain User Space processes (for example, PDPD) become unresponsive when working in Firewall Kernel Space Mode. Refer to sk184028.

PRJ-60003,
PRHF-38733

Security Gateway

Policy installation may fail when an updatable object is processed incorrectly.

PRJ-47909,
PRHF-29290

Security Gateway

Intermittent drops of transmission packets for "Streaming Engine: TCP Invalid Retransmission" causing HTTP loading issues. Refer to sk181282.

PRJ-63312,
PRHF-41539

Security Gateway

The RAD daemon may unexpectedly exit.

PRJ-62130,

PRHF-40631

Security Gateway

The FWK memory leak may occur during FTP connections with high file volume. Refer to sk183662.

PRJ-56831,

PRHF-35857

Security Gateway

Potential memory leak in the CPD process.

PRJ-60989,

PMTR-110282

Security Gateway

In some scenarios, when SecureXL is working in User Mode (UPPAK) mode, QoS service is unable to start, displaying the "QoS is not responding. Verify that QoS is installed on the gateway" error. Refer to sk183752.

PRJ-64038,

PMTR-118032

Security Gateway

In a rare scenario, when running "cpstart;cpstop", the Security Gateway may crash.

PRJ-63377,

PRHF-41472

Security Gateway

Threat Emulation on ICAP Server fails with "There was an Unexpected Internal error, Please try again later". Refer to sk184228.

PRJ-63086,

PRHF-40865

Security Gateway

HTTP parsing fails with the "Illegal header format detected: Invalid header field" error.

PRJ-62015,
PRHF-40483

Security Gateway

The RAD daemon may unexpectedly exit on VSX Gateways.

PRJ-63819,

PRHF-41922

Security Gateway

When a Security Gateway is configured in Bridge Mode, a memory leak may occur.

PRJ-62561,
PRHF-41025

Security Gateway

ICAP Server may fail to process multipart HTTP requests (when request body is split into multiple parts, each with its own headers and content).

PRJ-59449,
PRHF-38172

Security Gateway

An application may fail to match correctly when URL Filtering is configured in Hold Mode.

PRJ-61857,
PRHF-40380

Security Gateway

When configuring NAT64 rules for specific targets, the rules may fail to apply. Return traffic may be dropped.

PRJ-60295,
PRHF-28489

Security Gateway

In rare scenarios, the Security Gateway may drop the traffic with "up_manager_fw_handle_first_packet: cmi_context_exec_with_chain_connkey() failed". Refer to sk182506.

PRJ-60124,
PRHF-38574

Security Gateway

When Mirror and Decrypt features are enabled, the Security Gateway may experience unexpected reboots. The crashes are caused by "put_cred_rcu()" errors with negative usage values and memory leaks in the ARP cache.

PRJ-60755,

PMTR-114362

Security Gateway

In rare scenarios, the local connection route may be incorrect when the ICAP client is active.

PRJ-60752,
PRHF-39368

Security Gateway

Non-HTTP connections may be incorrectly dropped because of a missing Host header when the Gateway operates as a proxy.

PRJ-61907,
PMTR-116366

Security Gateway

Missing cleanup when template connection creation fails prevents the system from exiting new connection context mode, causing subsequent connection operations to write incorrectly to the cache instead of the connection table.

PRJ-61863,
PRHF-40249

Security Gateway

In rare scenarios, the WSDNS daemon may exit instead of shutting down gracefully.

PRJ-61058,
FMW-4633

Security Gateway

VSEC licenses may be automatically deleted and re-added on the Security Management Server (SmartCenter in Azure), creating duplicate license strings with mismatched signatures and causing intermittent "License with CK already exists" errors.

PRJ-62105,
PRHF-40509

Security Gateway

The Clone Policy Package task in SmartConsole fails with the "The object name must not contain whitespace characters at the beginning or the end" error. Refer to sk161294.

PRJ-62371,
PMTR-117120

Security Gateway

The Security Gateway may crash when checking if a local outbound packet's interface is excluded from outbound traffic processing while SecureXL User Mode (UPPAK) is enabled.

PRJ-62119,
PRHF-40597

Security Gateway

The SAML authentication flow may fail on a VSX Gateway.

PRJ-62527,
PRHF-39339

Security Gateway

After upgrading the Security Gateway to R81.20 Jumbo Hotfix Accumulator Take 92, Remote Access IPSec VPN connections using Endpoint Security VPN E88.60 fail. Authentication succeeds, but all client connections through the Security Gateway are dropped by the Cleanup Rule.

PRJ-61051,
PRHF-39655

Security Gateway

After a system restarts (for example, reboot or cprestart), FWD-related sub-processes such as VPND and PDP may not run. Refer to sk183446.

PRJ-57280,
PRHF-36273

Security Gateway

The update_license_conf script incorrectly parses the allowed cores count, setting "ALLOWED_CORES=-1" and causing Check Point Virtual Machine system corruption and daemon failures when CPU increases.

PRJ-59201,
PRHF-37975

Security Gateway

In a rare scenario, the FWK process may unexpectedly exit and bring down the Security Gateway.

PRJ-58760,
PRHF-37638

Security Gateway

Incorrect bonds may be shown in the Data Plane when using MDPS and running the "show configuration bonding" command.

PRJ-60127,
PRHF-38666

Security Gateway

When the Mirror and Decrypt feature is enabled, the SKB memory leak may occur.

PRJ-60577,
PRHF-38995

Security Gateway

In rare cases, failovers may occur because the FWK process unexpectedly exits.

PRJ-61487,
PRHF-39983

Security Gateway

In a rare scenario, the FWK process may restart unexpectedly.

PRJ-59155,
PRHF-37774

Security Gateway

Security Gateways with default MDPS task settings using proxy can fetch CPUSE updates and licenses successfully. On MPLANE updatable objects are not updated while everything works on DPLANE.

PRJ-61447,
PRHF-39840

Security Gateway

When handling interface statistics, the CPD or FWK processes may unexpectedly restart with an error related to IOCTL printed in logs. Refer to sk183544

PRJ-62918,
PMTR-117427

Security Gateway

Infinite routing loop may occur because of TTL handling in SecureXL Medium Path. Refer to sk183728.

PRJ-62829,
PRHF-41229

Mobile Access

In rare scenarios, Mobile Access SmartConsole Logs may not match views/queries, including the "MAC address" or "Methods" field names.

PRJ-61617,
PRHF-40065

Threat Prevention

The testing of external IoC feed connectivity from SmartConsole fails because of improper retrieval of configuration values.

PRJ-63021,
PMTR-117719

Threat Prevention

In a rare scenario, the DLPU process may exit during traffic inspection when holding a connection.

PRJ-60585,
PRHF-38756

Identity Awareness

Users on shared Servers (MUH v1 and v2) cannot access resources they should have permission to use. When this happens, the Security Gateway fails to recognize the user's identity and does not apply the correct access permissions. Refer to sk183268.

PRJ-60981,
PRHF-39261

Identity Awareness

Entra ID (Azure ID) authorization may fail when more than one tenant is configured for authorization and the "fetch-user-groups" or "fetch-machine-groups" mode is enabled.

PRJ-47009,
PRHF-28783

Content Awareness

Disk space may not be cleared as expected when Content Awareness is the only enabled blade.

PRJ-63884,

PRHF-41980

Application Control

In the Application Layer, an "any-any" rule (from any source to any destination, using any service) with long-lived connections may cause excessive memory usage. Refer to sk184196.

PRJ-62790,
PMTR-115931

URL Filtering

The FW_FULL process may exit in the Dynamic URLs list update flow.

PRJ-62255,
PMTR-116639

URL Filtering

In rare scenarios, the FWK process may crash when the URL Filtering Software Blade is enabled.

PRJ-62441,
PRHF-40727

IPS

Security Gateway blocks the download of files larger than 4 GB with the log "Application Control - HTTP parsing error occurred" in SmartConsole. Refer to sk183681.

PRJ-60938,
PRHF-38863

IPS

The FWK process may unexpectedly exit during the HTTPS inspection flow, which requires the RAD service categorization.

PRJ-58057,
PRHF-36813

IPS

In rare scenarios, the source IP address shown in the IPS detection log is invalid. Refer to sk182914.

PRJ-61472,

PMTR-115790

IPS

In some conditions, the Packet Capture may be missing from IPS logs in SmartConsole.

PRJ-62810,
PRHF-41088

IPS

When using Gateway as a Proxy "Non-transparent" and HTTPS Inspection is set to "inspect" with "X-Forward-For header", video playback on YouTube fails.

PRJ-61301,
PRHF-39517

Anti-Virus

In a rare scenario, the memory consumption of the DLPU process continuously increases.

PRJ-44981,

PRHF-27785

Anti-Virus

In rare scenarios, the Anti-Virus Software Blade cache may reach its capacity.

PRJ-63024,

PMTR-116661

Anti-Virus

In some scenarios, the Anti-Virus Software Blade reaches a timeout when inspecting Domains because of latency in the RAD daemon.

PRJ-60841,

PMTR-114946

Anti-Virus

False threat alerts may appear in Anti-Virus logs for benign traffic (action: accept). This is a cosmetic issue with no security impact.

PRJ-63060,
PMTR-118347

Anti-Virus

In a rare scenario, the Security Gateway may crash during traffic inspection.

PRJ-63323,

PRHF-41553

HTTPS Inspection

In some traffic flows, packets containing certain headers may be dropped regardless of how the non-compliant HTTP Inspection is configured.

PRJ-62835,

PRHF-39978

Mobile Access

Mobile Access Software Blade may incorrectly terminate Guacamole-based clientless RDP/SSH sessions due to client idleness.

PRJ-59743,
PRHF-38554

ClusterXL

In a ClusterXL setup, a rare performance issue may be caused by policy installation failure.

PRJ-61108,
PMTR-115083

ClusterXL

A rare race condition occurs during "cpstart" command execution in VSX environments that prevents proper sync interface installation, specifically in the cluster flow process, causing synchronization problems between cluster members.

PRJ-61738,
PMTR-115808

ClusterXL

An FWK core file is generated when configuring a Bridge Group with more than two interfaces.

PRJ-62685,
PRHF-40994

ClusterXL

Modifying the number of CoreXL instances in a VSLS cluster containing three or more members causes traffic interruption on the updated Virtual System.

PRJ-60347,
PMTR-113063

ClusterXL

In cluster environments using Bonds and VLANs, the ClusterXL Monitoring command "cphaprob stat" (Expert Mode) and the Clish command "show cluster state" may display an incorrect failover reason when an interface disconnects or a link goes down.

PRJ-57443,
PRHF-36348

ClusterXL

Virtual System in a VSX VSLS Cluster does not fail over when a cluster interface goes down. Refer to sk182734.

PRJ-59764,
PRHF-38539

ClusterXL

If both bond subordinate interfaces are down, the output of "cphaprob show_bond bond" command is corrupted.

PRJ-60778,
PMTR-110618

ClusterXL

The ROUTED daemon may incorrectly initialize as Subordinate rather than Master after a "cpstop;cpstart" command when executed on the sole Active member in a cluster configuration.

PRJ-57367,
PRHF-36165

ClusterXL

In VSX environments, deleting a Virtual System interface through SmartConsole fails to remove certain bindings, causing the interface to be automatically re-added.

PRJ-51584,
PMTR-98639

ClusterXL

ClusterXL Standby member stays down with a message "Reason for state change: FULLSYNC PNOTE - Connection terminated by remote member". Refer to sk182660.

PRJ-62300,

PMTR-115027

ClusterXL

In ClusterXL High Availability (HA), in some scenarios, the Active cluster member stops sending Cluster Control Protocol (CCP) heartbeats, and the Standby member may misinterpret this as an Interface Active Check (IAC) failure.

PRJ-60376,
PMTR-114234

SecureXL

When printing the Deny list on a Security Gateway during Threat Prevention policy installation after deleting a large IoC feed from Security Management, an uninformative IOCTL error is displayed instead of a proper error message. The issue is cosmetic only.

PRJ-60396,
PRHF-39028,

PRJ-60382,
PRHF-38461

SecureXL

In an asymmetric UDP traffic scenario (Client-to-Site VPN and Site-to-Site VPN distributed to different members), the connection may not get accelerated.

PRJ-63857,
PMTR-119616

SecureXL

When tunnel is established and traffic is running, the USIM process may exit every 15-20 minutes and cause a failover of the second member.

PRJ-60843,

PRHF-39251

SecureXL

In some scenarios, the Security Gateway may crash when IoC feed contains an IPv6 address.

PRJ-59485,

PRHF-37901

SecureXL

When using DoS Deny List, CPU usage may increase.

PRJ-59482,

PRHF-38329

SecureXL

When using DoS Deny List, a firewall kernel module memory leak may occur.

PRJ-64144,

PMTR-120092

SecureXL

In a Maestro setup, the USIM process may exit under high load when handling encrypted VPN traffic with the other Security Gateway.

PRJ-61965,
PRJ-61915

SecureXL

The USIM process may crash during route updates when the Hardware Acceleration offloading connection is active.

PRJ-62199,
PMTR-116890

SecureXL

SecureXL does not immediately send packets to the appropriate handler when it receives packets from a Virtual Router or Virtual Switch and fails to forward them to the connected Virtual System. This delay causes significant routing delays and potential routing errors on VSX Security Gateways.

PRJ-63469,

PMTR-118999

SecureXL

In some scenarios, a VSX Gateway may not optimally pass traffic from a Virtual System to a Virtual Router or Virtual Switch when connections are accelerated in SecureXL.

PRJ-62758,
PMTR-104579

SecureXL

Local TCP traffic may encounter "out-of-state" connection issues.

PRJ-62262,
PMTR-109269

SecureXL

The USIM core file may be generated when rebooting the Security Gateway.

PRJ-60895,
PMTR-111305

SecureXL

When SecureXL User Mode (UPPAK) is enabled, there can be a significant latency on a Security Gateway when opening an FTP data connection.

PRJ-62419,

PMTR-115630

SecureXL

In some scenarios, the Security Gateway may crash.

PRJ-63413,
PMTR-118686

SecureXL

In a rare scenario, packets with malformed message headers cause the Security Gateway to crash.

PRJ-62889,
PRHF-40086

SecureXL

In cluster environments, on the Active member, the USIM_x86 process may experience frequent core dumps, causing Security Gateway instability.

PRJ-63168,

PMTR-118447,

FMW-6167

SecureXL

Large packets cause performance slowdown.

PRJ-61339,

PMTR-115628

SecureXL

In some scenarios, there is significant latency when passing traffic through bridge interfaces configured on a Security Gateway when SecureXL User Mode (UPPAK) is enabled.

PRJ-28868,

STRM-499

SecureXL

In rare scenarios, Fast Accel flow may result in SecureXL Kernel Space Mode (KPPAK) crash.

PRJ-63775,

PRJ-63771,

PMTR-119562

SecureXL

VPN cluster members may crash after a cluster failover with BGP enabled and the exit of the USIM process.

PRJ-62487,

PMTR-111667

SecureXL

In some scenarios, the Security Gateway delays offloading a connection to the Quantum LightSpeed hardware accelerated card when SecureXL User Mode (UPPAK) is enabled.

PRJ-62912,
PMTR-118130

SecureXL

In some scenarios, after an update of the OS route configuration, there may be a significant delay in traffic passing through the Security Gateway when SecureXL works in the User space (UPPAK) mode. Refer to sk182740.

PRJ-62832,
PRHF-41024

SecureXL

Adding SecureXL DOS/Rate Limiting rule with AS numbers or country codes fails on VSX. Refer to sk183992.

PRJ-63832,
PMTR-119339

SecureXL

Running the "fwaccel dos rate get" command with the "-u" option fails.

PRJ-62284,
PMTR-114792

SecureXL

When adding a Rate Limiting rule using invalid format through the "fwaccel dos rate add" command with "-i" flag, the error is displayed but the rule is created although it should not.

PRJ-61614,
PMTR-116026

SecureXL

The USIM process may exit when multiple routes are using the same nexthop and the nexthop is not yet resolved

PRJ-57692,
PMTR-109360

SecureXL

Multiple "radix_get_value" messages may appear in fwk.elg log files.

PRJ-61621,

PMTR-116027

SecureXL

Rate Limiting policy installation (when the Rate Limiting policy is updated or country code data is updated) may take a long time.

PRJ-62958,
PMTR-117546

SecureXL

The USIM process may exit when viewing the fg_conn table using the "fwaccel tab -t" command.

PRJ-59178,
PRHF-37771

Routing

The multicast stream may not resolve correctly in VSX topologies. Packets are dropped with the "IP multicast routing failed (missing OS route)" message.

PRJ-52994,
PRHF-31534

Routing

In a specific scenario, where SSM static groups are configured on an interface, after a failover, these IP addresses do not appear as Outgoing Interfaces (OIFs).

PRJ-63116,
PRHF-41346

Routing

ASE LSAs for routes sharing the same prefix but having different mask lengths may not be re-originated correctly when a topology change restores previously unreachable routes to a reachable state.

PRJ-62109,

PRHF-40540

Routing

A memory leak occurs in the ROUTED daemon when CoreXL is running OSPF and handling large numbers of LSAs combined with frequent route flaps.

PRJ-61916,
PRHF-40237,

PMTR-116423

VPN

In VSX environments with VS and VR configurations, when Policy-Based Routing (PBR) is configured on the Virtual Router, Remote Access VPN traffic bypasses the PBR table and uses the default route instead.

PRJ-43416,

PMTR-89314

VPN

The VPN granular encryption link is deleted when changing Security Gateway role.

PRJ-59303,
PMTR-111436

VPN

IKE related core files may be generated when passing traffic through a VPN tunnel.

PRJ-60075,
AAD-5014

VPN

Rare VPN connectivity issues caused by Encryption Domain overrides in communities with third-party Gateways.

PRJ-61967,
PRHF-40481

VPN

The VPND or IKED daemon may exit during IKEv2 negotiation.

PRJ-61223,
PRHF-39785

VPN

In a rare scenario, the FWK process may exit during VPN traffic decryption and routing when the PPPoE interface is enabled.

PRJ-60691,
PMTR-114063

VSX

In rare scenarios, in a VSX environment, after a Virtual System (VS) starts, it becomes stuck in Down state with a "FullSync" pnote.

PRJ-50960,

PMTR-97170

VSX

Creating a Virtual System (VS) with an IPv6-only interface (without configuring IPv4) succeeds without any warning or error. However, after the VS is created and modified, pushing the configuration fails with "In a VSX cluster, IPv6-only interfaces are not supported. Virtual System Processing Completed with Errors".

PRJ-60522,

PRHF-38972

VSX

In a rare scenario, when handling SSL traffic, the FWK process may exit with a core dump.

PRJ-62076,

PMTR-107936

VSX

After enabling Mobile Access Software Blade on a Virtual System, Mobile Access services do not run, and the Mobile Access portal cannot be reached. Refer to sk183256.

PRJ-63952,

PRJ-63818

VSX

In a rare scenario, the FWM process may exit on the Security Management Server managing VSX Gateways/Clusters.

PRJ-62226,
PMTR-110683

VSX

The "vsx-provisioning-tool" CLI command returns asynchronous task IDs before it is ready for monitoring, causing Terraform and similar automation tools to immediately fail when attempting to track task status.

PRJ-64094,

PRHF-38127

VSX

In large scale environments, the "cpstat vsx" commands sometimes take a long time to execute or fail.

PRJ-57171,
PRHF-36133

VSX

After an upgrade, the "q_mng -o" command may show different amounts of cores than it was configured in affinity settings prior to the upgrade.

PRJ-62634,
PRHF-40410

VSX

Services fail after Virtual System failover in Maestro dual-site environment using the Same Virtual MAC feature. Refer to sk183956 and sk184194.

PRJ-64094,

PRHF-41027

Gaia OS

The Security Management Server hangs during a Backup operation because of endless SSH handshake retry, making it impossible to access via SSH or CLI.

PRJ-62336,

PRHF-40826

Gaia OS

LLDP data formatting issues when querying using SNMP. Refer to sk183733.

PRJ-61194,
PRJ-61193

Gaia OS

The output of "cppcap" command (sk141412) with the "-i" flag prints "Failed to capture X packets".

PRJ-57173,
PRHF-36109

Gaia OS

In rare scenarios, when using IP Aliasing, deleting an interface by IP address reference may incorrectly delete the wrong IP address because of incorrect error handling.

PRJ-59655,

PRHF-38449

Gaia OS

The 1.3.6.1.4.1.2620.1.6.7.5.1.5 SNMP OID (multiProcUsage) reports wrong values when HyperFlow is enabled.

PRJ-58038,

PRHF-36803

Gaia OS

SNMP OID .1.3.6.1.4.1.2620.1.6.7.5.1.5.X falsely reports high CPU due to malformed calculation. Refer to sk182784.

PRJ-59920,
PRHF-38669

Gaia OS

In rare scenarios, users may be disconnected from SmartConsole, and an FWM process core dump is generated.

PRJ-61812,
PRHF-40409

Gaia OS

SNMP Agent may report a wrong value for VLAN Interface Speed.

PRJ-62382,
PRHF-40893

Gaia OS

SNMP data types under the ASG MIB tree ( for Scalable Platform Security Groups) may be incorrect.

PRJ-58019,
PRHF-36770

Gaia OS

Backup may fail when using some special characters in the Remote Security Manager Server password.

PRJ-61591,
PRHF-40115

Gaia OS

  • The sysLocation OID (1.3.6.1.2.1.1.6.0) returns "UNKNOWN", even though the value is configured in the SNMP settings and exists in the Gaia database (/config/active).

  • When editing sysLocation or sysContact using the SNMP configuration interface, the Gaia database is updated, but the SNMP configuration file is not updated.

PRJ-62995,

PRHF-41344

Gaia OS

The "show syslog logs" Clish command returns the "cat: /var/log/messages*: No such file or directory" error even though these files exist.

PRJ-62733,
PMTR-117714

Gaia OS

When using Resource Separation on MDPS on Maestro, and the Security Gateway is under extreme load, policy installation fails, although the Resource Separation should handle the load.

PRJ-62533,

PRHF-40972

Gaia OS

Gaia Portal Session Cookie missing the SameSite attribute. Security scanners and penetration tests flag the missing SameSite attribute as a vulnerability. Refer to sk183645.

PRJ-62039,

PRHF-40558

Gaia OS

The MONITORD process unexpectedly exits on Security Gateways. Refer to sk184076.

PRJ-63260,

PRHF-29936

Gaia OS

The LLDP Clish "lldpneighbors" command may have a corrupted output in case of extensive data. Refer to sk182065.

PRJ-61975,
PRHF-40429

Gaia OS

When taking snapshots of the Security Group Members, some of them may crash, the dmesg_dumps shows multiple messages occurred before the crash "the active connections feature is currently enabled in the SmartView Tracker and due to high load it is making sync too slow to function properly. Therefore, 319489 active connection updates were dropped and no sync updates were lost".

PRJ-63582,

PRHF-41381

Gaia OS

SNMP query for "vsxStatusInterfaceRxBytes" and "vsxStatusInterfaceTxBytes" OIDs returns "0". Refer to sk183871.

PRJ-62220,
PRHF-40517

CloudGuard Network

If the User Center connection fails, contracts may be retrieved incorrectly, resulting in erroneous contracts getting pushed to the Security Gateway.

PRJ-62796,
PRHF-41139

CloudGuard Network

In the Smart-1 Cloud environment, in the Gateways & Servers view, newly provisioned CloudGuard Autoscaling Security Gateways may be shown as disconnected.

PRJ-63297,

PRHF-41389

CloudGuard Network

The CloudGuard Network Central License utility fails to distribute the license, if there are duplicate entries of the license on the Security Management Server.

PRJ-63954,
PRHF-41452

CloudGuard Network

Registration of an updated Data Center asset to the Security Management Server may fail.

PRJ-59517,

PMTR-111921

SD-WAN

A Virtual System may lose connectivity on the Backup and the Standby member when route-based traffic is configured with specific SD-WAN configurations in VSX environments.

PRJ-48287,
PRHF-29918

QoS

Security Gateway may have an unexpected behavior when receiving VPN connection QoS outbound flows without assigned interfaces.

PRJ-62407,
PMTR-117173

Scalable Platforms

Security Group members may reboot because of cp-nano database entries. The /var/log/configuration_reboot_reason.log may show "process:cp-nano-watchdog" when database entries exist only on the local member or only on the SMO member.

PRJ-58373,

PMTR-110163

Scalable Platforms

In rare scenarios, Security Group members may fail to receive their Gaia database from the Single Management Object (SMO). When this occurs, gClish commands related to these missing Security Group configurations may fail.

PRJ-59778,
PMTR-111817

Scalable Platforms

Policy installation may fail on newly added Security Group members because an updatable object package is missing.

PRJ-58048,
PRHF-37015

Scalable Platforms

When handling multiple shared uplinks across numerous interfaces, errors related to LACP bond uplink updates may be printed in logs.

PRJ-57215,

PMTR-107934

Scalable Platforms

Using a Multicast packet over a VPN tunnel may result in high SND CPU usage.

See the Critical Information section.

PRJ-62656,
PMTR-115891

Scalable Platforms

Temporary loss of link, an unexpected failover or reboot may occur when changing ring size on backplane interfaces using ethtool for Maestro SecureXL User Mode (UPPAK) deployments.

PRJ-32957,

PMTR-75265

Scalable Platforms

Clish may generate a core dump file after running the "set blade-range all" command.

PRJ-33027,

PMTR-75230

Scalable Platforms

The chassis_admin script may fail when all members on the site are in Down state.

PRJ-61343,
PRHF-39863

Scalable Platforms

The "asg diag verify" command reports inconsistent OSPFv3 routes for Security Gateway Modules on Quantum Maestro. Refer to sk179931.

PRJ-62536,
PMTR-117435

Scalable Platforms

The CPVIEWD daemon may exit on a VSX Gateway.

PRJ-62572,
PMTR-117483

Scalable Platforms

Security Group members changing from ACTIVE state to READY state may cause traffic impact.

PRJ-62802,
PMTR-117683

Scalable Platforms

In Maestro Security Group or Scalable Chassis Security Group with VSX with many Virtual Systems (VSs), boot may take a long time when the database file (/config/active) is very large (200,000 lines or more).

PRJ-48417,
PRHF-23287

Scalable Platforms

After adding a custom command in Gaia gClish with the "add command", the custom command is available only on the Single Management Object (SMO). Refer to sk178671.

PRJ-59789,
PMTR-105687

Scalable Platforms

On the Mobile Access Portal, SAML authentication does not display the login fields in a Maestro Security Group in the VSX. Refer to sk182548.

PRJ-47990,
PMTR-91235

Scalable Platforms

If L4 is disabled, the data connection may be dropped if it is redirected to a different IP address than the control connection.

PRJ-60969,
PRHF-39103

Scalable Platforms

In rare scenarios, "asg stat -i chassis_monitor" returns "0" even when the cluster did not start, causing "distutil" to incorrectly update the MHO topology. This can result in a traffic impact when a cluster member recovers from a FWK process exit.

PRJ-64591,

PMTR-121110

Scalable Platforms

In rare scenarios, in a Maestro setup, traffic interruption may occur after Security Gateway reboots when the Gaia Database is corrupted.

PRJ-63616,

PRHF-41710

Scalable Platforms

The "Invalid property name for chassis" error is displayed when changing the "alert_threshold packet_rate_total_threshold_low_ratio" value.

PRJ-63474,

PMTR-119026

Scalable Platforms

Installing policy to the Maestro Security Group under extreme load with Resource Separation may fail.

PRJ-54676,
PMTR-91449

Scalable Platforms

In a Maestro environment, BFD (Bidirectional Forwarding Detection) sessions may flap, slowing down the connections.

PRJ-64399,
PMTR-120751

Scalable Platforms

A configuration issue may cause link flapping on bonded uplink interfaces when using Maestro with SecureXL User Mode (UPPAK) enabled. The bond interface may fail to establish connectivity, with the physical interface reporting link status as up but showing unknown speed values.

PRJ-64502,
CST-399

Carrier Security

Policy installation fails with an internal error when the Security Gateway policy includes rules that match a specific Access Point Name (APN) for GTPv0 or GTPv1 traffic.

PRJ-35181,
PRHF-21006

Carrier Security

GTPv1 traffic may be dropped with code description "Invalid IE length value", "GTP info: Parsing IE type 133 failed".

PRJ-59054,
PRHF-37439

Carrier Security

The Security Gateway may crash after dropping corrupt GTP-C (control traffic) packets.

PRJ-63851,
PRHF-31869

Carrier Security

GTP traffic may not be well balanced, some CPU cores may be overloaded while others are underutilized, leading to performance issues.

PRJ-56450,

PRHF-31961

Carrier Security

SAM rules fail to gracefully terminate PDP context when the timer expires.

PRJ-56446,

PRHF-31901

Carrier Security

Running to "snmpwalk" or "stattest" command for any of GX OIDs results in the "No Such Instance currently exists at this OID" error.

PRJ-59937,
PRHF-38620

Carrier Security

Security Gateway drops GTP traffic with the log "Message includes unexpected information element type". Refer to sk106469.