R82 Jumbo Hotfix Take 60
|
|
Note - This Take contains all fixes from all earlier Takes. |
|
ID |
Product |
Description |
|---|---|---|
|
Take 60 Released on 29 December 2025 |
||
|
Take 60 - Improvements and Resolved Issues
|
||
|
PRJ-63742, |
Gaia OS |
UPDATE: Check Point response to CVE-2019-6109, CVE-2019-6110, CVE-2019-6111. Refer to sk65269. |
|
PRJ-63364, |
Security Management |
UPDATE: Enhanced packet search in SmartConsole with three IP address modes:
|
|
PRJ-63473, PMTR-117101 |
Security Management |
UPDATE: SmartTasks are now supported in the System Domain of Multi-Domain Security Management. This feature enables the automation of system-domain operations, reducing manual tasks and enhancing reliability. Refer to R81.20 Quantum Security Management Administration Guide > Preferences and Management Settings > SmartTasks. |
|
PRJ-63736, |
Security Gateway |
UPDATE: Added a new kernel parameter "up_rulebase_run_implied_rules" (enabled by default - "1"). Setting to "0" disables execution of implied rules in the Access Control Rule Base. |
|
PRJ-61019, |
Security Gateway |
UPDATE: Improved shared memory packet flow and performance. |
|
PRJ-62396, |
Scalable Platforms |
UPDATE: Deleting Virtual System 0 (VS0) from the WebUI causes loss of connection with the cluster. Virtual Systems 0 and 500 are now blocked from deletion in the WebUI to prevent this issue. |
|
PRJ-64247, ODU-3159, PRJ-64545, ODU-3225, PRJ-65176, ODU-3419 |
Automatic Updates - Policy Insights |
UPDATE: Added Take 77, Take 78 and Take 80 of Policy Insights Release Updates. Refer to sk183421. |
|
PRJ-64477, ODU-3143, PRJ-64638, ODU-3259 |
Automatic Updates - Web SmartConsole |
UPDATE: New features and improvements are released in Take 155 and Take 156 via self-updatable package. Refer to sk170314. |
|
PRJ-64548, ODU-3175 |
Automatic Updates - HCP |
UPDATE: Added Update 24 of HealthCheck Point (HCP) Release. Refer to sk171436. |
|
PRJ-64586, PRJ-64743, ODU-3267 |
Automatic Updates - CPView |
UPDATE: Added Take 52 and Take 53 of CPquid (QUID) Release Updates. Refer to sk181458. |
|
PRJ-64905, |
Automatic Updates - CPView |
UPDATE: Added Take 210 of CPotelcol (OpenTelemetry Collector) Release Updates. Refer to sk180522. |
|
PRJ-64829, |
Automatic Updates - Threat Prevention |
UPDATE: Added Update 27 of Autonomous Threat Prevention Management integration Release. Refer to sk167109. |
|
PRJ-60644, |
Security Management |
In some scenarios, the warning "Threat Prevention Policy: For better performance, blade exception rules with the action 'Inactive' should be placed above other exception rules" appears in SmartConsole even though no exception rules violate the recommended configuration. |
|
PRJ-62993, |
Security Management |
Regenerating a token on a Security Gateway Smart-1 Cloud may fail with an unclear validation message "No error in result from fwm command: [gen-pki-cert-req]". |
|
PRJ-62778, |
Security Management |
In rare scenarios, High Availability synchronization may fail with a connectivity error. |
|
PRJ-64740, PMTR-121337 |
Security Management |
When the Dynamic URL List feature is enabled, Security Gateway may crash during policy installation. See the Critical Information section. |
|
PRJ-63544, |
Multi-Domain Security Management |
On the Multi-Domain Security Management Server, when staging is cleared for an IPS protection in the Global Domain, any staging configuration for the same protection in the local Domain (within a Global profile) remains unchanged during policy assignment. |
|
PRJ-63502, |
Multi-Domain Security Management |
In a rare scenario, the FWM process exits during a vsx_util upgrade. |
|
PRJ-63541, |
Multi-Domain Security Management |
In a Multi-Domain Security Management environment, when opening the License tab of a Security Gateway object in SmartConsole, the "Security Gateway was not found" error may be shown. |
|
PRJ-62388, |
Multi-Domain Security Management |
Scheduled automatic purge revisions may result in duplicate purge revisions tasks after restart of a Multi-Domain Security Management Server. |
|
PRJ-64105, PMTR-120043 |
Multi-Domain Security Management |
The Configuration Sharing feature does not work as expected with VSX Gateways on a specific Domain. |
|
PRJ-63314, |
Security Gateway |
The RAD daemon may unexpectedly exit. |
|
PRJ-62826, |
Security Gateway |
When the Gaia Portal accessibility is configured as "According to Firewall policy", access may be denied because of a match on an implied rule with the "Accept" action. |
|
PRJ-63379, PRHF-41472 |
Security Gateway |
Threat Emulation on ICAP Server fails with "There was an Unexpected Internal error, Please try again later". Refer to sk184228. |
|
PRJ-63088, PRHF-40865 |
Security Gateway |
HTTP parsing fails with the "Illegal header format detected: Invalid header field" error. |
|
PRJ-62883, |
Security Gateway |
In some scenarios, when HyperFlow is enabled, websites that use HTTP2 protocol do not load properly. |
|
PRJ-63487, |
Security Gateway |
Mirror and Decrypt feature may not function as expected when HyperFlow is enabled. |
|
PRJ-63821, PRHF-41922 |
Security Gateway |
In deployments with a large number of Security Gateways, memory usage may reach 98% and Security Gateways may become unresponsive. |
|
PRJ-61197, |
Threat Prevention |
In rare scenarios, the Anti-Virus Software Blade fails to fetch the external intelligence feed because of an authentication failure. |
|
PRJ-63859, PMTR-113368, TPDO-3593 |
Threat Prevention |
In a rare scenario, SmartConsole does not display a notification when the IP reputation feed for the Anti-Bot Software Blade fails to load. |
|
PRJ-63841, |
Identity Awareness |
In Azure Active Directory, access role assignment only evaluates the first 100 group memberships for a user. Group memberships beyond this limit are ignored when determining access roles. Refer to sk183328. |
|
PRJ-56755, |
Identity Awareness |
In a rare scenario, the PDPD daemon may unexpectedly exit while updating identity session timers. |
|
PRJ-63432, PMTR-118983 |
URL Filtering |
In rare scenarios, IoC resources are not loaded or distributed as expected. |
|
PRJ-63886, |
Application Control |
In the Application Layer, an "any-any" rule (from any source to any destination, using any service) with long-lived connections may cause excessive memory usage. Refer to sk184196. |
|
PRJ-61474, PMTR-115790 |
IPS |
In some conditions, the Packet Capture may be missing from IPS logs in SmartConsole. |
|
PRJ-63325, PRHF-41553 |
HTTPS Inspection |
In some traffic flows, packets containing certain headers may be dropped regardless of how the non-compliant HTTP Inspection is configured. |
|
PRJ-64330, |
SecureXL |
When using MDPS with IPv6 disabled on the Security Gateway side, the Security Gateway may leak IPv6 packet buffers instead of dropping them. Refer to sk184419. |
|
PRJ-59483, PRHF-37901 |
SecureXL |
When using DoS Deny List, CPU usage may increase. |
|
PRJ-63602, PMTR-119184 |
SecureXL |
Security Gateway unexpectedly crashes with kernel logs showing segmentation faults in the USIM_86 process. Refer to sk184340. |
|
PRJ-59480, PRHF-38329 |
SecureXL |
When using DoS Deny List, a firewall kernel module memory leak may occur. |
|
PRJ-61341, |
SecureXL |
In some scenarios, there is significant latency when passing traffic through bridge interfaces configured on a Security Gateway when SecureXL User Mode is enabled. |
|
PRJ-60965, |
SecureXL |
Significant latency on a VSX Security Gateway when transmitting non-accelerated or accelerated traffic with Active or Passive Streaming, through multiple Virtual Systems connected by Virtual Switches when SecureXL User Mode is enabled. |
|
PRJ-63415, |
SecureXL |
In a rare scenario, packets with malformed message headers cause the Security Gateway to crash. |
|
PRJ-62489, |
SecureXL |
In some scenarios, the Security Gateway delays offloading a connection to the Quantum LightSpeed hardware accelerated card when SecureXL User Mode (UPPAK) is enabled. |
|
PRJ-63471, PMTR-118999 |
SecureXL |
In some scenarios, a VSX Gateway may not optimally pass traffic from a Virtual System to a Virtual Router or Virtual Switch when connections are accelerated in SecureXL. |
|
PRJ-62914, |
SecureXL |
In some scenarios, after an update of the OS route configuration, there may be a significant delay in traffic passing through the Security Gateway when SecureXL works in the User Mode (UPPAK). Refer to sk182740. |
|
PRJ-63857, |
SecureXL |
When tunnel is established and traffic is running, the USIM process may exit every 15-20 minutes and cause a failover of the second member. |
|
PRJ-63777, PMTR-119562 |
SecureXL |
VPN cluster members may crash after a cluster failover with BGP enabled and the exit of the USIM process. |
|
PRJ-63172, |
SecureXL |
In some scenarios, when a Security Gateway, running in SecureXL User Mode (UPPAK), receives IPv6 Neighbor Discovery Protocol (NDP) packets from the network, it may not properly forward or process them correctly. |
|
PRJ-61977, |
Gaia OS |
When taking snapshots of the Security Group Members, some of the Members may crash, the dmesg_dumps shows multiple messages occurred before the crash "the active connections feature is currently enabled in the SmartView Tracker and due to high load it is making sync too slow to function properly. Therefore, 319489 active connection updates were dropped and no sync updates were lost". |
|
PRJ-64107, |
Routing |
Running the "set igmp interface <ifname> last-member-query-interval <value>" command may fail with a syntax error. |
|
PRJ-62457, |
VPN |
An unprintable character symbol may appear next to the username in the "Log In" logs when connecting with the configured "Fetch Username from Subject DN.CN" parsing. |
|
PRJ-61385, |
VSX |
In a VSX setup, when Dynamic Balancing is enabled and an Elephant Flow is running, only one firewall instance may remain active to handle the rest of the traffic. |
|
PRJ-63936, |
VSX |
When installing a new policy on Virtual Systems, the installation succeeds, although the error "VSX INSTALL ERROR: Failed to extract FW1 policy details! Skipping state directory overwrite" is displayed. |
|
PRJ-64096, PRHF-38127 |
VSX |
In large scale environments, the "cpstat vsx" commands sometimes take a long time to execute or fail. |
|
PRJ-62886, |
VSX |
In rare scenarios, policy installation may fail after an upgrade in VSX environments. |
|
PRJ-64281, PMTR-120135 |
VSNext |
The FWK process may exit with core dumps during VS creation or deletion. |
|
PRJ-65178, PMTR-121938 |
VSNext |
When deploying a Check Point ElasticXL Cluster in VSNext mode, Virtual System Load Sharing may assign the same MAC address to multiple Virtual System WRP interfaces, causing network connectivity issues or MAC address conflicts. |
|
PRJ-64052, PMTR-118935 |
VSNext |
On VSNext ElasticXL setups with more than one Virtual System and IPv6 enabled, SSH disconnections occur because of wrong MAC address assignment to WRP interfaces. |
|
PRJ-65193, HEC-2089 |
VSNext |
Modifying the number of CoreXL Firewall instances on a Virtual System (VS) or VSX Gateway may result in Security Policy installation issues or loss of policy configuration. |
|
PRJ-63508, |
CloudGuard Network |
Registration of an updated Data Center asset to the Security Management Server may fail. |
|
PRJ-62008, SDWANGW-4494 |
SD-WAN |
In rare scenarios, policy installation causes traffic matched by the "prefer local breakout" rule to be incorrectly routed through the underlay private link instead of the overlay. |
|
PRJ-62762, PMTR-117824, SDWANGW-4233 |
SD-WAN |
In rare scenarios, new connections may continue matching "Prioritize Local Breakout" despite low ISP quality that should trigger a switch to backhaul. |
|
PRJ-62652, |
Scalable Platforms |
When running the "fw ctl iflist" command, there is a discrepancy between the expected network interfaces and what the kernel actually detects. This may lead to connectivity issues. |
|
PRJ-62622, PRHF-42228 |
Scalable Platforms |
OTV switches drop unknown unicast packets (packets with destination MAC addresses not present in the MAC address table) instead of forwarding them, resulting in traffic loss. |
|
PRJ-63905, |
Scalable Platforms |
When multiple subordinate interfaces in the Sync bond are not dedicated Sync interfaces, MAC address duplicates may occur, causing communication failures between cluster members. |
|
PRJ-60967, |
Scalable Platforms |
In rare scenarios, "asg stat -i chassis_monitor" returns "0" even when the cluster did not start, causing "distutil" to incorrectly update the MHO topology. This can result in a traffic impact when a cluster member recovers from a FWK process exit. |
|
PRJ-59668, |
Scalable Platforms |
After enabling Maestro Fastforward on a Security Group, traffic matching relevant rules is routed to the default Security Gateway instead of the correct nexthop because the static route is missing from /etc/mlx_routing.json on the Maestro Orchestrator. The Orchestrator shows 200 routes and fails to pick up the interface's routes, despite the interface topology is configured as "according to routes" in SmartConsole. |
|
PRJ-64036, |
Scalable Platforms |
The Insights tool may not represent data on Virtual Systems. |
|
PRJ-62924, |
Scalable Platforms |
Scalable Platforms in the VSNext mode do not support Cluster Load Sharing (two or more Security Group Members on the same Site). |
|
PRJ-64117, PMTR-120412 |
Scalable Platforms |
On VSNext ElasticXL setups with IPv6 enabled, multiple WRP interfaces may be assigned the same link-local address, potentially causing network connectivity issues and routing failures. |
|
PRJ-63786, PMTR-110923 |
Scalable Platforms |
When running the "show asset all" command on setups with ElasticXL enabled, Disk Model, Serial, and Capacity outputs are not displayed. |
|
PRJ-63556, |
Scalable Platforms |
Running the command "ccutil ssm_exec 1 'show system uptime'"generates no output. |
|
PRJ-64495, |
Scalable Platforms |
The gClish command "set cluster configuration image auto-clone state" may not be propagated to Security Group Members. |
|
PRJ-63853, |
Carrier Security |
GTP traffic may not be well balanced, some CPU cores may be overloaded while others are underutilized, leading to performance issues. |