R81 Jumbo Hotfix Take 106

 

List of Resolved Issues and New Features

Note - This Take contains all fixes from all earlier Takes.

ID

Product

Description

Take 106

Released on 22 October 2024

Take 106 - New Functionality

 

PRJ-36319,

PRHF-21090

Security Gateway

NEW: Implemented support for LDAP queries using Windows Security Identifiers (SIDs) as search criteria.

PRJ-52384,
PMTR-99313

Harmony Endpoint

NEW: Threat Emulation in Endpoint Security Clients version E87.60 and higher now supports the ONE, XAR, and WSF file formats.

Take 106 - Improvements and Resolved Issues

 

PRJ-51534,

PRJ-56315,

PMTR-106774,

PMTR-97312

Security Gateway

UPDATE: Apache HTTPD version was updated from 2.4.55 to 2.4.61 to fix: CVE-2023-31122, CVE-2023-43622, CVE-2024-36387, CVE-2024-38473, CVE-2024-38474, CVE-2024-38475, CVE-2024-38476, CVE-2024-38477, CVE-2024-39573.

PRJ-54681,

PMTR-104266

Mobile Access

UPDATE: Resolved CVE-2024-31497. The Putty version used in the Mobile Access Portal Embedded SSL Network Extender application is upgraded from version 0.80 to version 0.81.

PRJ-55314,
PMTR-104507

Gaia OS

UPDATE: A patch on top of OpenSSL 1.1.1w to fix CVE-2024-2511. Refer to sk182320.

PRJ-56225,

PMTR-106852

Gaia OS

UPDATE: Added a defense mechanism against malicious code injections through special HTTP requests. Resolved CVE-2024-24914. Refer to sk182743.

PRJ-56468,

PMTR-107058

Gaia OS

UPDATE: Resolved CVE-2024-3596 - Blast-RADIUS attacks. Refer to sk182516 > Login to Gaia Portal.

PRJ-52930,
PRHF-32414

Security Management

UPDATE: When deleting a Secondary Multi-Domain Security Management Server, SmartConsole now shows an "After MDS '<MDS name>' is deleted, you should delete the Secondary Domain Servers from the Domains and revoke their certificates" message.

PRJ-52402,

PMTR-99617

Security Management

UPDATE: Added SHA256 fingerprints to certificate objects to mitigate the risk of hash collisions and enhance trust when utilizing the fingerprint, encoded with English words, as a verification mechanism.

PRJ-53937,
PMTR-102275

Security Management

UPDATE: Modified the content of the https://<ip_adress>/license_management/ page.

PRJ-54494,
PMTR-104054

Security Management

UPDATE: JRE is updated from version 8.0_8.10 to version 8.0_8.21.

PRJ-54418,

PRHF-33584

Security Management

UPDATE: Policy installation duration with hundreds of layers is improved by approximately 30%.

PRJ-55659,
PMTR-105539

Security Management

UPDATE: The "set threat-exception" Management API command now includes the "protection-or-site" parameter. When specified, this parameter adds new values to the existing list of protections or sites, instead of overwriting the current entries.

PRJ-50773,
PRHF-30910

Logging

UPDATE: Port 8211 now accepts connections with the cipher ECDHE_RSA_AES_256_GCM_SHA384.

PRJ-47653,
PRHF-29103

Security Gateway

UPDATE: Added ability to increase/decrease DNS cache table size.

PRJ-54297,
PRHF-28332

Security Gateway

UPDATE: Added a new environment variable "IMPLIED_RULES_SET_BEFORE_LAST". It defines if Multi-Portal implied rules should be matched as "before drop" or "before last". The default value is "0", set to "before drop". When the value is set to "1", implied rules will be matched as "before last". Refer to sk180808.

PRJ-47653,

PRHF-29103

Security Gateway

UPDATE: Added ability to increase/decrease DNS cache table size.

PRJ-51172,

PMTR-97400

Security Gateway

UPDATE: Deprecated RC2-CBC cipher for SIC in OpenSSL.

PRJ-55745,

PMTR-104855

Threat Prevention

UPDATE: Added the "trackSettings.forensics" parameter to the "threat-rule" Management API command to enable and disable the "forensics" option in the "Track" column. Syntax example: "mgmt_cli add threat-rule layer 'Standard Threat Prevention' position 1 track-settings.forensics false -r true".

PRJ-48029,
PRHF-29471

Threat Emulation

UPDATE: The maximum size for files uploaded to Threat Emulation can now be configured using the Threat Emulation API. Set the "max_api_request_data_size" attribute to specify the new limit.

PRJ-53917,
PRHF-32600

URL Filtering

UPDATE: When URL Filtering operates in Background Mode and encounters an unclassified connection, instead of being approved automatically, such connection is now accepted or rejected based on Access Rule Base execution, and listed under the "unknown" category.

PRJ-54136,

PMTR-103001

SSL Inspection

UPDATE: Added a log for connections rejected because of short Server certificate public key size (RSA 1024 bits or less, ECDSA 256 bits or less).

PRJ-54339,
SNX-99

SSL Network Extender

UPDATE: SSL Network Extender is updated to version 80008409.

PRJ-51530,
PMTR-97036

Mobile Access

UPDATE: The Mobile Access Portal is no longer compatible with the Chrome browser on iOS and Android mobile devices.

PRJ-55727,
PMTR-105631

VPN

UPDATE: VPN connections are now synchronized to all members of the Security Group by default. The default value of the "vpn_sync_to_all" kernel parameter is set to "1".

PRJ-54670,
PMTR-104379

VoIP

UPDATE: SIP over UDP requests and responses may be dispatched to different firewall instances when a single-direction rule is defined in the Rule Base, potentially causing returned SIP traffic to be dropped as an unknown connection. To address this, a new global parameter "sip_forward_if_needed" is introduced (disabled by default). When enabled, the Security Gateway forwards responses to the appropriate request instances. Refer to sk182667.

PRJ-55915,
ODU-1819

CloudGuard Network

UPDATE: Added Take 21 of Public Cloud CA Bundle. Refer to sk172188.

PRJ-56191,

PRJ-55685,

PRJ-55299,

PRJ-56681,

PRJ-57027,

PRJ-57261,

ODU-2035,

ODU-2019,

ODU-1955,

ODU-1755,

ODU-1779,

ODU-1787

Automatic Updates - Web SmartConsole

UPDATE: New features and improvements are released in Take 104, Take 111, Take 114, Take 118, Take 119, Take 120 via self-updatable package. Refer to sk170314.

PRJ-56055,

PRJ-55580,

PRJ-57329,

ODU-1979,

ODU-1803,

ODU-1923

Automatic Updates - HCP

UPDATE: Added Update 18 and Update 19 of HealthCheck Point (HCP) Release. Refer to sk171436.

PRJ-55912,
ODU-1849

Automatic Updates - CPView

UPDATE: Added Take 97 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522.

PRJ-50934,
PRHF-31120

Security Management

SmartConsole may freeze when selecting a client under Security Gateway object > Identity Awareness tab > RADIUS Accounting Settings.

  • Requires additional configuration and R81 SmartConsole Build 569 or higher. Refer to sk181630.

PRJ-53452,
PRHF-32750

Security Management

Upgrade of the Multi-Domain Security Management Server may fail with the error "Folder object not found".

  • The fix requires the upgrade to be done using a Blink image or the Advanced Upgrade method.

PRJ-54003,
PRHF-33311

Security Management

In rare scenarios, the Management Server upgrade fails during the import stage with "an eclipse error has occurred enable logging on EclipseLinkExceptionHandler to see full error".

  • The fix will only be applied if the upgrade to this Jumbo Hotfix Take is done using a Blink image or via the Advanced Upgrade method.

PRJ-51119,
PRHF-31318

Security Management

In rare scenarios, if a Star VPN Community object is created, publish operations may fail.

PRJ-50842,
PRHF-31188

Security Management

Export of a list of objects from the Global Object Explorer fails with the "Export policy is not supported when rule name is in a format of UUID" error message.

PRJ-53505,
PRHF-32561

Security Management

After upgrading, administrators with read/write permissions to edit Security Gateways and Clusters may lack IPS permissions and are unable to perform certain management tasks, such as enabling or disabling blades.

PRJ-52898,

PRHF-30884

Security Management

Log queries fail with the error "Problems have occurred during search" when Domain migration is in progress. This occurs specifically during the execution of "export-management" or "import-management" Management API commands.

PRJ-53500,
PRHF-32764

Security Management

In some scenarios, SmartConsole may unexpectedly disconnect.

PRJ-52887,
PRHF-32372

Security Management

"Mapping of Data Center [xxxx] failed. Next mapping is in 300 seconds" errors in the CME logs show failed attempts to scan deleted data centers.

PRJ-56148,

PRHF-35183

Security Management

When Compliance is enabled, the FWM process may unexpectedly exit and generate a core dump. Refer to sk182507.

See the Important Notes section.

PRJ-56854,

PRHF-34283

Security Management

In some scenarios, the FWM process may unexpectedly exit and generate a core dump every few days, when Compliance is enabled and the scheduled full scan is not configured according to sk182507.

PRJ-52432,
PRHF-31953

Security Management

When Global Domain Assignment fails with the "More than one object named 'XXX' exists" error, not all duplicate objects are listed.

PRJ-53893,
PRHF-32890

Security Management

In rare scenarios, the API status shows "Automatic Start: Disabled" even though the automatic start was not disabled manually.

PRJ-53339,
PRHF-32639

Security Management

When a Domain object in a policy is set with a backslash in the suffix, policy installation fails with the "Unterminated string&CURRENTVERCMP" error.

PRJ-49581,
PRHF-30453

Security Management

In some scenarios, when searching objects in SmartConsole, not all relevant results are highlighted.

PRJ-48935,
PRHF-30136

Security Management

The "set simple-cluster" Management API command with the "vpn-settings.vpn-domain" parameter succeeds, but the VPN Domain is not set.

PRJ-55333,

PRHF-33993

Security Management

In rare scenarios, login to SmartView web application using the Domain IP address or Domain name fails.

PRJ-55521,
PMTR-85279

Security Management

In rare scenarios, the CPD process may exit with core dumps.

PRJ-55330,

PRHF-34049

Security Management

If the $FWDIR/conf/fwm.adtlog file is not valid, the FWM process leaves unused file descriptors, which may affect the Security Management Server performance.

PRJ-56163,
PMTR-106542

Security Management

In some scenarios, the "set-exception-group applied-threat-rules.position" Management API command may add the exception group to an incorrect position.

PRJ-53258,
PRHF-32595

Security Management

When exporting a policy to a CSV file, the process fails silently if any rule within the policy has a name or comment in UID format. No clear error message is provided to indicate the cause of the failure.

PRJ-55479,
PRHF-33889

Security Management

In rare scenarios, when Application Control is enabled, cloning a policy may fail due to timeout.

PRJ-54657,
PRHF-33941

Security Management

Several Management API commands, such as "show-package" and "install-policy", may fail if running them after the deletion of a cluster member.

PRJ-56710,
PRHF-35700

Multi-Domain Security Management

In some scenarios, cpmiquerybin core files may appear in /var/log/dump/usermode/ on the Security Management Server.

PRJ-53550,
PRHF-32881

Multi-Domain Security Management

When a Domain name (for example, "XXX") is a subset of another Domain name (for example, "XXX-YYY"), the "mdsstop" command may fail to stop a Domain named "XXX-YYY".

PRJ-50779,
PRHF-31148

Multi-Domain Security Management

In a Multi-Domain Security Management environment, there may be synchronization timeout errors, and automatic revisions purge may fail.

PRJ-57442,
PMTR-107206

SmartConsole

In some scenarios, opening new tab in SmartConsole Logging & Monitoring tab fails with "HTTP error 500 - problem accessing smartview/embedded. Reason: Server Error". Refer to sk182732.

PRJ-42133,

PRHF-25935

CPView

In a rare scenario, when running the CPView utility, the Security Gateway may crash.

PRJ-55951,
PRHF-30878

Logging

In rare scenarios, CPU consumption on the Security Management Server is high and logs are not displayed.

PRJ-46847,

PRJ-46579

Logging

RAD error messages may be printed to the fwk.elg file during cpstop:cpstart on the Security Gateway. The issue is cosmetic only.

PRJ-51442,
PRHF-31195

Logging

The traffic field in the SmartEvent "Application and URL Filtering" report, specifically in the "High Bandwidth Applications" section, is incorrectly displaying data in petabytes (PB) instead of the expected gigabytes (GB).

PRJ-50693,
PRHF-31105

Logging

In some scenarios, viewing a Forensics report in Threat Hunting fails with the "Unable to load report" error. Refer to sk181800.

PRJ-51428,
PRHF-31388

Logging

In some scenarios, in Multi-Domain Management environments with over 300,000 network objects, the LOG_INDEXER process repeatedly exits if the procedure from sk164452 is not applied.

PRJ-51515,
PRHF-31567

Logging

Log searches for the same time period may return more results in SmartConsole compared to SmartView.

PRJ-51274,

PRHF-31323,

PRJ-53217,

PRHF-32587

Logging

When adding a table widget to a SmartView report:

  • The "Missed Malware Activity" and "Spyware Action" fields may not be possible to pick.

  • The "Malware Action" filter may appear twice in the picker. Refer to sk182049.

PRJ-51692,
PRHF-31777

Logging

In some scenarios, after removing an existing Log Exporter instance, the creation of a new instance appears successful in SmartConsole. However, the new Log Exporter object is not actually generated.

PRJ-52462,
PRHF-31160

Logging

In SmartView, filtering logs by "event_type" may fail with the "Query failed" error.

PRJ-54059,
PMTR-102031

Logging

In rare scenarios, empty log list may be displayed when selecting a log file to view in SmartConsole.

PRJ-50260,
PRHF-30848

Logging

In SmartView, some countries are not displayed in the countries picker.

PRJ-33619,
PRHF-20992

Logging

Log Exporter may unexpectedly exit when using a non-RSA certificate.

PRJ-44793,
PRHF-27521

Logging

In rare scenarios, the FWD process on the Security Gateway may reach out of memory and produce a core dump file of around 3GB.

PRJ-52939,

PRHF-32194

Logging

In the Logs view, the "TCP-other" and "UDP-other" services are displayed as generic service IDs, for example, "cp_tcp_A936BBAC_EBC3_4F18_B3CC_A63365F07477".

PRJ-54062,
PMTR-102780

Logging

In rare scenarios, the CPSEMD process on the SmartEvent Server may unexpectedly exit, creating a core dump file.

PRJ-48770,
PRHF-30060

Logging

The "show logs" Management API command may show partial information for the fields with multiple values.

PRJ-50614,
PRHF-29955

Logging

The FWD process may exit and cause issues with opening packet capture files on remote members.

PRJ-51968,
PMTR-99054

Security Gateway

The CPWD daemon does not restart automatically.

PRJ-53073,
PMTR-96269

Security Gateway

In some occasions, redundant errors appear in logs: "fw_inspect_ghtab_bl_ld_sync: invalid FW_INSPECT_GHTAB_BL_LD_SYNC_TABLE_ID".

PRJ-48815,
PRHF-30025

Security Gateway

After deploying a new license to a Multi-Domain Log Module (MLM), all Customer Log Modules (CLMs) generate alert logs about missing license/contracts stating "No valid license was found".

PRJ-46888,
PRHF-29024

Security Gateway

Incorrect value in the "fwisusfw" register causes improper CPU affinity and dynamic balancing initialization in User Space Firewall mode after an upgrade. Refer to sk182004.

PRJ-52677,
PRHF-31821

Security Gateway

Running GTP traffic may cause a crash on a Security Gateway without a GTP license.

PRJ-54413,
PRHF-33710

Security Gateway

In a VSX Cluster environment, the CPVIEWD daemon may cause a high CPU.

PRJ-56166,

PMTR-98475

Security Gateway

The RAD process exits and creates a core file on the Security Gateway.

PRJ-45949,

PRHF-28371

Security Gateway

During policy installation, Rule Base internal error drops may be shown in the SmartConsole logs. Logs related to "dynobjs" may be printed in Messages.

PRJ-48103,

PRHF-29616

Security Gateway

Outages may occur when the FWD process exits or restarts and Security Group member goes down triggering Scalable Chassis failover.

PRJ-55938,
PRHF-34652

Security Gateway

A minor memory leak in a process related to the Unified Access Policy Rule Base.

PRJ-52772,
PRHF-32213

Security Gateway

In rare scenarios, the FWK process may unexpectedly exit.

PRJ-49900,
PRHF-30541

Security Gateway

Kernel Memory usage increases persistently each day on a Security Gateway/Security Group when CGNAT is enabled. Refer to sk182140.

PRJ-53626,
PMTR-102177

Security Gateway

A memory issue may occur in a cluster environment, when SIP inspection is enabled.

PRJ-51437,
PMTR-98446

Security Gateway

A rare race condition may be triggered by the timing and packet patterns of VoIP traffic, and, as a result, the FWK process may restart.

PRJ-55516,

PMTR-105145

Security Gateway

  • In some scenarios, the Security Gateway may crash with a vmcore in /var/log/crash or fwk core in /var/log/dump/usermode/.
  • The "kernel: xxxxx: tx_timeout" error is printed in /var/log/messages.
  • PSL drops packets with "PSL Drop: psl_build_pslip failed" message, potentially impacting network performance and streaming capabilities.

See the Important Notes section.

PRJ-54527,
PMTR-103857

Security Gateway

In some scenarios, the Security Gateway offloads connections to SecureXL in error when the initial route lookup could not find a route for it.

PRJ-54626,
PRHF-33768

Security Gateway

In some scenarios, adding sequential IP addresses as MDPS task addresses may fail.

PRJ-55577,

PMTR-104837

Security Gateway

A buffer overflow may occur in the HTTP flow, affecting the FWK process.

PRJ-57106,

PRHF-36116

Security Gateway

Memory leak may occur in SecureXL templates. Refer to sk182648.

See the Important Notes section.

PRJ-53808,
PRHF-33037

Security Gateway

The Security Gateway may crash after a failure in policy installation.

PRJ-56642,
PMTR-107570

Security Gateway

In rare scenarios, the FWK process may unexpectedly exit when the IPS / Application Control / Anti-Virus / Anti-Bot is active and the HyperFlow feature is enabled.

PRJ-52645,
PRHF-31996

Internal CA

CRL fetch may fail when passing through a Security Gateway with deep inspection, even if the connection hold is quickly released. CPCA closes the connection prematurely.

PRJ-48308,
ACCESS-680

Threat Prevention

In rare scenarios, when Anti-Virus, Threat Extraction and Threat Emulation are enabled, some connections that were on hold are dropped.

PRJ-53910,
PMTR-102756

Threat Prevention

SSH DPI may not work because of incorrect parsing of the client hello from a non-standard SSH client.

PRJ-56094,

PMTR-106568

Threat Prevention

SSH Deep Packet Inspection (SSH DPI) fails to start inspection if IPS is enabled while all other Threat Prevention products are disabled.

PRJ-50699,
PRHF-30997

Threat Prevention

Anti-Virus fails to parse IoC feeds that contain IPv6 addresses.

PRJ-51055,
PRHF-31189

Threat Prevention

Threat Prevention policy installation may fail because of invalid JSON format in the IoC feed feature configuration file. Refer to sk181650.

PRJ-55765,

PMTR-104381

Threat Prevention

In rare scenarios, policy installation may fail after an upgrade of a VSX Gateway.

PRJ-55987,

PMTR-104285

Threat Prevention

In a rare scenario, Threat Prevention policy installation may fail after an over-the-air (OTA) package update of TP_CONF_SERVICE. Refer to sk182572.

PRJ-53199,
PMTR-97508

Threat Prevention

In some scenarios, policy installation and IPS package updates may take a very long time to finish and cause traffic drops.

PRJ-56330,
MBS-18307

Threat Prevention

In a rare scenario, the Security Gateway may crash during traffic inspection when holding a connection.

PRJ-51490,

PRHF-31582

Threat Emulation

When using ICAP, filename handling occasionally fails. As a result Threat Emulation may not be able to process this specific file.

PRJ-46347,

PRHF-27721

Threat Emulation

The ICAP client may send the file name under "Content-Disposition" in an unsupported format written as "filename*=" instead of "filename=", and the Threat Emulation does not process such files.

PRJ-46488,
PRHF-28698

Identity Awareness

Policy Enforcement Point (PEP) logs show a username after the user session is expired. Refer to sk181553.

PRJ-53588,
PRHF-32655

Identity Awareness

In Azure Active Directory, access role assignment only considers a user's first 100 group memberships. Any groups beyond this limit are disregarded when determining user access roles.

PRJ-51339,
PRHF-29801

Identity Awareness

In some scenarios, the PEPD process may consume a high CPU because of a high rate of identity propagation.

PRJ-35859,
PMTR-76453

Identity Awareness

Microsoft Azure Active Directory does not fetch users in the Access Role object and shows "The user directory is still initializing". Refer to sk175983.

PRJ-56512,
PMTR-100177

Application Control

The fwk.elg file may be flooded with the "DNS_DATA_SOURCE failed on context 201, executing context 366 exception" messages. Refer to sk182606.

PRJ-55458,

PRHF-34098

URL Filtering

In scenarios where there is a heavy load on the machine, the RAD queue can fill up and get clogged by unhandled requests, causing an outage and traffic disruption.

PRJ-56622,

PMTR-107215

IPS

IPS may drop an IPv6 TCP local connection.

PRJ-54429,
PRHF-33644

IPS

In a rare scenario, when IPS is enabled and logging on a rule that involves IPS is enabled, physical memory usage may rapidly increase.

PRJ-43102,
PMTR-87284

DLP

Multiple internal errors, including file metadata retrieval failures and parsing errors, may be printed in the DLPDA logs.

PRJ-50979,
PRHF-31207

Anti-Virus

Anti-Virus may enforce observables from IoC feeds although they were deactivated in SmartConsole.

PRJ-53126,
PRHF-32438

Anti-Virus

The DLPU process may unexpectedly exit due to uninitialized memory when Anti-Virus scans files. Refer to sk182030.

PRJ-56040,
PRHF-34907

Anti-Virus

In some scenarios, the Anti-Virus logs on a VSX Gateway may display an incorrect origin IP address.

PRJ-54194,

PRHF-31001

Anti-Bot

Anti-Bot may generate error logs with the "Failed to Decrypt CP Site Response" reason. Refer to sk182494.

PRJ-52977,
PRHF-32251

Mobile Access

Enabling the "cvpnd" debug causes the reverseproxy_ssl_debug.log file size to continue growing even after the "reverse proxy" debug is off.

PRJ-51152,
PMTR-92065

Mobile Access

Web Application names column width is too narrow to fit in the Mobile Access Portal. Refer to sk181774.

PRJ-54443,

PMTR-103889

Mobile Access

HTTPS access to the Mobile Access Portal may be down.

PRJ-54639,
PMTR-90199

Mobile Access

The HTTPD process of the Mobile Access Portal may exit with a core dump file.

PRJ-56220,

PRHF-35271

Mobile Access

The "citrixStrictTicketEnforcement" parameter set in the configuration file may not work as expected.

PRJ-42807,
PRHF-24122

ClusterXL

Cluster members may crash, generating vmcores in /var/log/crash.

PRJ-54168,
PMTR-103483

ClusterXL

In rare scenarios, in a cluster environment, the CPDiag tool may crash.

PRJ-55632,

PRHF-27989

ClusterXL

After modifying a bond, the Monitored VLANs may disappear. Refer to sk180724.

PRJ-54329,
PRHF-33511

SecureXL

In rare scenarios, the Security Gateway crashes when the interface goes down right before it transmits packets out.

PRJ-54426,
PMTR-102834

SecureXL

In some scenarios, the VSX Gateway does not initialize the Virtual System correctly when connected to a Virtual Router or Virtual Switch.

PRJ-54321,
PMTR-103651

SecureXL

In some scenarios, traffic with Passive or Active Streaming configuration may not correctly pass through a Virtual Router on a VSXGateway.

PRJ-53059,
PMTR-101152

SecureXL

During the deny list update process, there is a temporary gap where no IP addresses are blocked, allowing unwanted traffic to pass through the Security Gateway unfiltered.

PRJ-54423,
PMTR-102759

SecureXL

In some scenarios, the VSX Gateway may fail to properly reroute traffic originating from a Virtual Switch.

PRJ-56009,

PRHF-34987

SecureXL

In a rare scenario, a memory leak in the adp kernel module may occur during multicast routing assert failures.

PRJ-51109,

PMTR-97788

SecureXL

SYN Defender configuration in Inspection Settings on the Security Management Server may not be applied on Accelerated Policy installation.

PRJ-56805,
PMTR-84843

SecureXL

When the VSX Gateway is created, the parameter that determines whether VSX mode is enabled or disabled is not set in SecureXL configuration until a reboot is performed.

PRJ-56523,
PMTR-101893

Routing

In a ClusterXL environment, a race condition may occur when BGP Graceful Restart is incorrectly configured. If the feature is enabled for some peers but not others, it may lead to permanent loss of network routes.

PRJ-55342,
PMTR-104736

Routing

OSPFv2 graceful restart mechanism fails on broadcast and point-to-multipoint networks due to the omission of an "IP-Address" field in the grace LSA.

PRJ-54601,
PMTR-104146

Routing

Routing BFD sessions using IPv6 global addresses on single-hop interfaces fail to recover after the network interface is administratively disabled and re-enabled.

PRJ-53826,
PMTR-95640

Routing

A multicast outage may occur during failovers caused by interface flaps.

PRJ-53854,
PRHF-33138

Routing

ROUTED process assert failure may take place when LSA from a neighbor's retransmission list is freed if that LSA belongs to the max age hold tree that is flooded at max age.

PRJ-54406,
PRHF-33153

Routing

A multicast outage may occur after a failover triggered by incomplete processing of cluster synchronization messages.

PRJ-53170,
PMTR-99623

Routing

The ROUTED process may unexpectedly exit because of an OSPF assertion failure.

PRJ-53173,

PMTR-101331

Routing

Graceful Restart may end prematurely in OSPF NSSA areas.

PRJ-56431,

PMTR-107256

Routing

Dynamic Routing outage in a Security Group during the Zero Downtime (MVC) Upgrade to R81.20, during the Downgrade from R81.20, or during the installation / uninstall of the R81.20 Jumbo Hotfix Accumulator. Refer to sk182556.

PRJ-56052,
PRHF-35042

Gaia OS

Adding multiple VPN tunnels via Clish in Transaction Mode fails, while adding them individually succeeds.

PRJ-56119,
PRHF-35200

Gaia OS

The "Unable to connect to the server, Press OK to reconnect" error is displayed when opening the Network Interfaces tab in the Gaia Portal. Refer to sk182560.

PRJ-55304,
PRHF-32694

Gaia OS

The "cpviewd: unable to read from gpio_nuvoton driver module. snmpd: unable to read from gpio_nuvoton driver module" messages may be printed in /var/log/messages.

PRJ-52414,

PRHF-31929

Gaia OS

SNMP query for OID 1.3.6.1.4.1.2620.1.6.7.5.1.5 (CPU utilization per CPU core) and the "cpstat os -f cpu" command may return an incorrect value. Refer to sk182447.

PRJ-54435

Gaia OS

After a Jumbo Hotfix Accumulator upgrade, login notifier may be enabled, although it was disabled before the upgrade.

PRJ-54178,
PMTR-103543

Gaia OS

Removing unused built-in user called "cp_ender" that may appear in Gaia OS after an upgrade. Refer to sk182185.

PRJ-41989,
PRHF-25144

Gaia OS

Trap names duplications in chkpnt.mib and chkpnt-trap.mib may cause incorrect values when using SNMP traps.

PRJ-51349,
PRHF-31438

VPN

Remote Access VPN connections in Maestro environments may be dropped with the "out-of-state" reason.

PRJ-55486,
PRHF-30493

VPN

During high-frequency encryption of packets over a VPN tunnel, the Security Gateway may assign the same sequence number to multiple packets. This causes the receiving VPN peer to mistakenly identify these legitimate packets as replay attacks and drop them.

PRJ-53847,
PRHF-33098

VPN

After an update, if in VPN if configured with Permanent Tunnels enabled, RAM utilization may increase.

PRJ-55291,
PMTR-103968

VPN

Configuring a Large Scale VPN (LSV) with IPv6 and establishing a VPN tunnel may cause the FWK process to exit.

PRJ-53011,

PMTR-100991

VPN

The FWK process may crash when establishing multiple VPN tunnels simultaneously at peak rates.

PRJ-49208,

PRHF-30241

VPN

Remote Desktop Protocol (RDP) connections may frequently disconnect when network traffic is routed through a combination of medium path, Quality of Service (QoS) controls, and VPN.

PRJ-50088,

PMTR-90101

VPN

By default, the VPN permanent tunnel is configured to use "tunnel test" instead of "DPD". This configuration may cause inaccurate permanent tunnel status reporting when connecting to third-party devices.

PRJ-56038,

PRJ-55986

VPN

During high-volume VPN tunnel initiations, several packets may be dropped with "encrypted packet too big".

PRJ-51018,
PRHF-31136

VPN

Duo management reports display incorrect access source locations due to Security Gateways providing inverted IP addresses during the two-factor authentication challenge response process. Refer to sk181783.

PRJ-53713,
PRHF-32719

VPN

Tunnel testing fails after an upgrade. Refer to sk182267.

PRJ-53382,
PMTR-101269

VPN

IPv6 non-VPN traffic may be dropped with "Clear text packet should be encrypted".

PRJ-52828,
PMTR-96593

VPN

In a rare scenario, in a Maestro environment, the first packet of the VPN tunnel is lost or has a large delay.

PRJ-50155,

PMTR-93643

VPN

When working with iOS devices, after establishing a VPN connection and subsequently disconnecting devices, the "vpn tu tlist" command may display an incorrect device connection status, indicating that a device is still connected.

PRJ-54679,

PMTR-104230

Multi-Portal

Under a special routing configuration, an active Cluster member may accept portal traffic (on TCP ports 80 and 443) destined to a Standby member IP address.

PRJ-55885,
PMTR-106172

VSX

Deleting a Virtual System ID (VSID) that does not exist may trigger the "cpstop" command. Stopping all Check Point services on VS0 can disrupt the entire VSX environment.

PRJ-53116,
PMTR-99343

VSX

In a VSX Cluster with IPv6 enabled, after an upgrade, VS's without IPv6 address may fail to install the Access policy.

PRJ-54596,
PRHF-33572

VSX

In rare scenarios, the CPD process of the default Virtual System on a VSX Gateway (VS0) gets stuck.

PRJ-56671,

PRHF-35637

VSX

Memory corruption may occur when a bond interface is configured, leading to a Security Gateway crash with a vmcore or a boot loop.

PRJ-57815,
PRHF-17665

VSX

Multi-Queue configuration does not survive reboot on VSX. Refer to sk173950.

PRJ-47806,
PRHF-29624

CloudGuard Network

In the Kubernetes Data Center, the Import window may be stuck in "Initializing" state.

PRJ-44695,
PRHF-27834

Scalable Platforms

When running the "asg resource" command, the SSD overall health check is displayed as "PASSED" with the "Unknown_Attribute on Member X_XX is below/getting towards low threshold (val: 0/ thresh: 0)" warning. The issue is cosmetic only.

PRJ-55568,
PMTR-105246

Scalable Platforms

Traffic outage after policy installation on a Maestro Security Group in the VSX mode that works in the Dual Site configuration. Refer to sk182379.

PRJ-53081,
PMTR-97118

Scalable Platforms

Redundant "MHO_stateAgent[3230]: QuidAddon: System not ready yet - attempting to re-init" messages in the /var/log/messages file.

PRJ-29746,
PMTR-70976

Scalable Platforms

When configuring backup-scheduled/snapshot recurrence via gClish shell with "The <name> job already exists. Please choose another name. Backup schedule failed. The backup will not be scheduled".

PRJ-49846,
PRHF-30436

Scalable Platforms

Site to Site VPN traffic may be interrupted after installing policy with VSLS.

PRJ-57437,

PRHF-36390

Scalable Platforms

In a Maestro environment with the "vpn_sync_to_all" parameter enabled, connection going through a Site to Site VPN to a remote location, may be dropped with "First packet isn't SYN".

See the Important Notes section.

PRJ-50624,
PRHF-29180

Carrier Security

  • ClusterXL Active member changes the status to "LOST".

  • Kernel segfault error is printed in /var/log/messages.

  • The CPD daemon and CPVIEW_SERVICE exit.