Monthly Release Notes - March 2023

Jump to:

 

Cobalt Strike


Cobalt Strike

Version: 4.8

March 7, 2023

New Features
  • Added support for beacon to use system calls.

  • Added new Malleable C2 profile setting stage.syscall_method to set the default system calls method.

  • Added support for picking the system call method at payload generation time.

  • Added support for system calls within sleepmask kit.

  • Added beacon command (syscall-method) to change the syscall method used at runtime.

  • Added patching support to powerpick (bpowerpick) and execute-assembly (bexecute-assembly) for ETW blinding, etc...

  • Added support for beacon guardrails (IP address, user name, server, and domain).

  • Added token store to allow token hot swapping of tokens.

  • Added script ('clearteamserverdata') to help reset team server.

  • Added exit function support to Windows Executable Stageless dialog.

  • Added support to chain multiple commands in a single Mimikatz call.

  • Added support to copy/paste from beacon output pane.

  • Added warning dialog to Spear-Phishing process.

Enhancements
  • Updated Sleep Mask size limit from 8192 to 16384 bytes.

  • Updated 'pth' command to accept a username with spaces in it.

  • Updated teamserver to check authorization expiration daily.

  • Updated stage.obfuscate malleable C2 option to use more robust encryption.

  • Display current token in the UI.

  • Make setting sleeptime more flexible (support seconds, minutes, hours, and days).

  • Sychronize teamserver data during startup (screenshots, keylogs, downloads, and hosted items).

  • Store screenshot and keylogging data on teamserver for subsequent syncing.

  • Allow deleting of downloaded files.

  • Updated Mimikatz to version 2.2.0 20220919.

  • Rebranded Cobalt Strike parent company from HelpSystems to Fortra.

  • Change default naming convention on payload generation dialogs to include bitness (_x86/_x64).

  • Miscellaneous java dependency updates for security.

Fixes
  • Fixed typo in Generate All Payloads dialog.

  • Fixed Pivot beacons not showing as connected after reconnecting.

  • Fixed unresponsive DNS beacons after a teamserver restart.

Back to Top

 

Digital Defense


Frontline Vulnerability Manager

Version 6.5.2.3

March 17, 2023

Enhancements
  • Allow scoping PCI multi-scan reports by specific quarters as windows to query selectable scans.
Fixes
  • Fix asset matching functions in multi-scan reports and provide report option to opt-out.
  • Dates displayed in the interface are not reflecting DST timezone offset.
  • Japanese translated report cover page displays broken HTML.
  • Theme files on report generating task workers aren't always in sync as expected.
  • Business groups incorrectly being associated to AV hosts outside of AV window on insert.
Version 6.5.2.2

March 3, 2023

Enhancements
  • Japanese exception list for translation service.
  • Allow the instant translation service to handle HTML document.
Fixes
  • Themed reports are not working; consistently falling back to the default theme.
  • Theme data cannot be viewed in the UI.
  • PCI Self Service: All items from WAS scan not showing up in PCI compliance report using multi scan.
  • PCI Self Service: 3B items that are changed are not showing the most recent entry in compliance reports.
  • Multi-process functions from stats gerneation are exceeding task worker resource capacities.
  • Hide PCI / PT workflows in WAS when no sub.
  • Add 'Max webapp count' field to 'Web Application PCI Compliance Scanning'.
  • Restricted accounts display partial menus when engaged by Global Admin.
  • Partial scan results are no longer displayed when a WAS scan is errored.
  • Console error opening Scanner Profile detail page.
  • WAPT Subscription - icon missing and moved to bottom of list.
  • Incorrect resource ACL inheritance from Business Groups of Scan Source.
  • Scanner-side update to set WAS scan blocks to 'completed' are causing scans to complete without reconciling.
  • VM insert error from saving JSON object with null byte value in it.

Frontline Agent

Version 1.56.1

March 24, 2023

Current Windows agent version: 1.53.0

Current macOS agent version: 1.55.0

Enhancements
  • Implemented the following new vulnerability checks:

    • 151604 APSB23-23: Security Updates Available for Adobe Photoshop CC (High) - Windows
    • 151603 APSB23-25: Security Updates Available for Adobe ColdFusion (High) - Windows
    • 151782 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low) - Windows
    • 151781 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low) - Windows
    • 151780 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.10.37854 and Earlier (Low) - Windows
    • 151596 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.177 (High) - Windows, Mac
    • 151601 Google Chrome: Multiple Vulnerabilities in Versions Less Than 111.0.5563.64 (High) - Windows, Mac
    • 151597 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.57 (High) - Windows
    • 151602 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.69 (High) - Windows
    • 151605 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 111 (High) - Windows, Mac
    • 151606 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.9 (High) - Windows, Mac
    • 151598 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.8 (High) - Windows
    • 151607 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.9 (High) - Windows
    • 151787 MS23-MAR: Microsoft Office Security Update (High) - Windows, Mac
    • 151788 MS23-MAR: Microsoft Sharepoint Server Security Update (Medium) - Windows
    • 151786 MS23-MAR: Microsoft Windows Security Update (High) - Windows
Fixes
  • Updated Vulnerability Descriptions:
    • 151536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.77 (High)

Frontline NIRV Scanner

Version 4.17.0

March 22, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 151785 AIX Security Advisory: python_advisory4 (High)

  • 151757 Amazon Linux 2 Security Advisory: ALAS-2023-1936 (Low)

  • 151755 Amazon Linux 2 Security Advisory: ALAS-2023-1937 (Low)

  • 151752 Amazon Linux 2 Security Advisory: ALAS-2023-1938 (Low)

  • 151741 Amazon Linux 2 Security Advisory: ALAS-2023-1946 (Medium)

  • 151750 Amazon Linux 2 Security Advisory: ALAS-2023-1947 (Low)

  • 151748 Amazon Linux 2 Security Advisory: ALAS-2023-1948 (Low)

  • 151763 Amazon Linux 2 Security Advisory: ALAS-2023-1949 (Medium)

  • 151765 Amazon Linux 2 Security Advisory: ALAS-2023-1950 (Medium)

  • 151777 Amazon Linux 2 Security Advisory: ALAS-2023-1951 (Low)

  • 151753 Amazon Linux 2 Security Advisory: ALAS-2023-1956 (Medium)

  • 151761 Amazon Linux 2 Security Advisory: ALAS-2023-1957 (Low)

  • 151771 Amazon Linux 2 Security Advisory: ALAS-2023-1959 (Low)

  • 151776 Amazon Linux 2 Security Advisory: ALAS-2023-1960 (Low)

  • 151764 Amazon Linux 2 Security Advisory: ALAS-2023-1961 (Low)

  • 151745 Amazon Linux 2 Security Advisory: ALAS-2023-1962 (Low)

  • 151766 Amazon Linux 2 Security Advisory: ALAS-2023-1963 (Low)

  • 151772 Amazon Linux 2 Security Advisory: ALAS-2023-1964 (Low)

  • 151758 Amazon Linux 2 Security Advisory: ALAS-2023-1965 (Medium)

  • 151751 Amazon Linux 2 Security Advisory: ALAS-2023-1966 (Medium)

  • 151742 Amazon Linux 2 Security Advisory: ALAS-2023-1967 (Medium)

  • 151743 Amazon Linux 2 Security Advisory: ALAS-2023-1968 (Medium)

  • 151768 Amazon Linux 2 Security Advisory: ALAS-2023-1969 (Low)

  • 151749 Amazon Linux 2 Security Advisory: ALAS-2023-1970 (Low)

  • 151756 Amazon Linux 2 Security Advisory: ALAS-2023-1971 (Medium)

  • 151773 Amazon Linux 2 Security Advisory: ALAS-2023-1972 (Medium)

  • 151762 Amazon Linux 2 Security Advisory: ALAS-2023-1973 (Low)

  • 151746 Amazon Linux 2 Security Advisory: ALAS-2023-1974 (Medium)

  • 151769 Amazon Linux 2 Security Advisory: ALAS-2023-1975 (Low)

  • 151778 Amazon Linux 2 Security Advisory: ALAS-2023-1976 (Low)

  • 151770 Amazon Linux 2 Security Advisory: ALAS-2023-1977 (High)

  • 151775 Amazon Linux 2 Security Advisory: ALAS-2023-1978 (High)

  • 151760 Amazon Linux 2 Security Advisory: ALAS-2023-1979 (Low)

  • 151747 Amazon Linux 2 Security Advisory: ALAS-2023-1980 (Low)

  • 151754 Amazon Linux 2 Security Advisory: ALAS-2023-1981 (Low)

  • 151774 Amazon Linux 2 Security Advisory: ALAS-2023-1982 (Low)

  • 151759 Amazon Linux 2 Security Advisory: ALAS-2023-1983 (Low)

  • 151744 Amazon Linux 2 Security Advisory: ALAS-2023-1984 (Low)

  • 151767 Amazon Linux 2 Security Advisory: ALAS-2023-1985 (Low)

  • 151779 Amazon Linux 2 Security Advisory: ALAS-2023-1986 (Low)

  • 151740 Amazon Linux Security Advisory: ALAS-2023-1684 (Low)

  • 151739 Amazon Linux Security Advisory: ALAS-2023-1685 (High)

  • 151733 Amazon Linux Security Advisory: ALAS-2023-1686 (Medium)

  • 151736 Amazon Linux Security Advisory: ALAS-2023-1687 (Medium)

  • 151737 Amazon Linux Security Advisory: ALAS-2023-1688 (Medium)

  • 151729 Amazon Linux Security Advisory: ALAS-2023-1689 (Low)

  • 151730 Amazon Linux Security Advisory: ALAS-2023-1690 (Low)

  • 151735 Amazon Linux Security Advisory: ALAS-2023-1692 (Low)

  • 151727 Amazon Linux Security Advisory: ALAS-2023-1693 (Low)

  • 151726 Amazon Linux Security Advisory: ALAS-2023-1694 (Low)

  • 151728 Amazon Linux Security Advisory: ALAS-2023-1695 (Medium)

  • 151734 Amazon Linux Security Advisory: ALAS-2023-1696 (Medium)

  • 151731 Amazon Linux Security Advisory: ALAS-2023-1697 (Low)

  • 151732 Amazon Linux Security Advisory: ALAS-2023-1698 (High)

  • 151738 Amazon Linux Security Advisory: ALAS-2023-1699 (Low)

  • 151725 Amazon Linux Security Advisory: ALAS-2023-1700 (Low)

  • 151604 APSB23-23: Security Updates Available for Adobe Photoshop CC (High)

  • 151603 APSB23-25: Security Updates Available for Adobe ColdFusion (High)

  • 151784 Cisco Security Advisory: CISCO-SA-IOX-8WHGN5DL (High)

  • 151783 Cisco Security Advisory: CISCO-SA-NXOS-CLI-CMDINJECT-EUQVK9U (Medium)

  • 151617 ELSA-2023-0946: openssl security and bug fix update (Low)

  • 151627 ELSA-2023-0951: kernel security and bug fix update (Medium)

  • 151612 ELSA-2023-0952: python-setuptools security update (Low)

  • 151636 ELSA-2023-0953: python3.9 security update (Low)

  • 151623 ELSA-2023-0954: systemd security update (Low)

  • 151626 ELSA-2023-0957: lua security update (Medium)

  • 151614 ELSA-2023-0958: vim security update (Low)

  • 151633 ELSA-2023-0959: tar security update (Low)

  • 151613 ELSA-2023-0965: php security update (Low)

  • 151616 ELSA-2023-0970: httpd security and bug fix update (Low)

  • 151609 ELSA-2023-0978: git security update (Medium)

  • 151610 ELSA-2023-1067: pesign security update (Medium)

  • 151622 ELSA-2023-1068: libjpeg-turbo security update (Medium)

  • 151631 ELSA-2023-1090: samba security update (Medium)

  • 151638 ELSA-2023-1091: kernel security and bug fix update (Medium)

  • 151624 ELSA-2023-1093: pesign security update (Medium)

  • 151634 ELSA-2023-1095: zlib security update (Low)

  • 151639 ELSA-2023-1140: curl security update (Low)

  • 151632 ELSA-2023-1141: gnutls security and bug fix update (Low)

  • 151620 ELSA-2023-12143: sudo security update (Medium)

  • 151635 ELSA-2023-12150: pcs security update (Low)

  • 151640 ELSA-2023-12152: openssl security update (Low)

  • 151625 ELSA-2023-12160: Unbreakable Enterprise kernel security update (Medium)

  • 151615 ELSA-2023-12195: virt:kvm_utils2 security update (Medium)

  • 151637 ELSA-2023-12196: Unbreakable Enterprise kernel security update (Medium)

  • 151628 ELSA-2023-12199: Unbreakable Enterprise kernel security update (Medium)

  • 151611 ELSA-2023-12200: Unbreakable Enterprise kernel-container security update (Medium)

  • 151641 ELSA-2023-1252: nss security update (Medium)

  • 151619 ELSA-2023-1332: nss security update (Medium)

  • 151630 ELSA-2023-1333: firefox security update (Medium)

  • 151621 ELSA-2023-1335: openssl security update (Medium)

  • 151629 ELSA-2023-1336: firefox security update (Medium)

  • 151618 ELSA-2023-1337: firefox security update (Medium)

  • 151608 ELSA-2023-18908: ol8addon security update (Medium)

  • 151782 Foxit PDF Editor: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low)

  • 151781 Foxit PDF Reader: Multiple Vulnerabilities in Version 12.1.0.15250 and Earlier (Low)

  • 151780 Foxit PhantomPDF: Multiple Vulnerabilities in Version 10.1.10.37854 and Earlier (Low)

  • 151601 Google Chrome: Multiple Vulnerabilities in Versions Less Than 111.0.5563.64 (High)

  • 151602 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.69 (High)

  • 151605 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 111 (High)

  • 151606 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.9 (High)

  • 151607 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.9 (High)

  • 151787 MS23-MAR: Microsoft Office Security Update (High)

  • 151788 MS23-MAR: Microsoft Sharepoint Server Security Update (Medium)

  • 151786 MS23-MAR: Microsoft Windows Security Update (High)

  • 151651 RHSA-2023:0808: firefox security update (Medium)

  • 151656 RHSA-2023:0810: firefox security update (Medium)

  • 151644 RHSA-2023:0812: firefox security update (Medium)

  • 151665 RHSA-2023:0817: thunderbird security update (Medium)

  • 151667 RHSA-2023:0821: thunderbird security update (Medium)

  • 151658 RHSA-2023:0824: thunderbird security update (Medium)

  • 151678 RHSA-2023:0832: kernel security and bug fix update (Medium)

  • 151683 RHSA-2023:0833: python3 security update (Low)

  • 151681 RHSA-2023:0835: python-setuptools security update (Low)

  • 151648 RHSA-2023:0837: systemd security and bug fix update (Low)

  • 151671 RHSA-2023:0838: samba security update (Medium)

  • 151657 RHSA-2023:0839: kpatch-patch security update (Medium)

  • 151660 RHSA-2023:0842: tar security update (Low)

  • 151661 RHSA-2023:0848: php:8.0 security update (Low)

  • 151652 RHSA-2023:0852: httpd:2.4 security and bug fix update (Low)

  • 151687 RHSA-2023:0854: kernel-rt security and bug fix update (Medium)

  • 151686 RHSA-2023:0855: pcs security update (Low)

  • 151666 RHSA-2023:0902: webkit2gtk3 security update (Medium)

  • 151689 RHSA-2023:0903: webkit2gtk3 security update (Medium)

  • 151688 RHSA-2023:0946: openssl security and bug fix update (Low)

  • 151662 RHSA-2023:0951: kernel security and bug fix update (Medium)

  • 151673 RHSA-2023:0952: python-setuptools security update (Low)

  • 151659 RHSA-2023:0953: python3.9 security update (Low)

  • 151655 RHSA-2023:0954: systemd security update (Low)

  • 151677 RHSA-2023:0957: lua security update (Low)

  • 151646 RHSA-2023:0958: vim security update (Low)

  • 151674 RHSA-2023:0959: tar security update (Low)

  • 151669 RHSA-2023:0965: php security update (Low)

  • 151645 RHSA-2023:0970: httpd security and bug fix update (Low)

  • 151647 RHSA-2023:0974: pcs security update (Low)

  • 151685 RHSA-2023:0978: git security update (Medium)

  • 151643 RHSA-2023:0979: kernel-rt security and bug fix update (Medium)

  • 151684 RHSA-2023:1008: kpatch-patch security update (Medium)

  • 151654 RHSA-2023:1067: pesign security update (Medium)

  • 151664 RHSA-2023:1068: libjpeg-turbo security update (Low)

  • 151682 RHSA-2023:1090: samba security update (Medium)

  • 151668 RHSA-2023:1091: kernel security and bug fix update (Medium)

  • 151690 RHSA-2023:1092: kernel-rt security and bug fix update (Medium)

  • 151680 RHSA-2023:1093: pesign security update (Medium)

  • 151675 RHSA-2023:1095: zlib security update (Low)

  • 151650 RHSA-2023:1101: kpatch-patch security update (Medium)

  • 151676 RHSA-2023:1140: curl security update (Low)

  • 151670 RHSA-2023:1141: gnutls security and bug fix update (Low)

  • 151672 RHSA-2023:1252: nss security update (Medium)

  • 151649 RHSA-2023:1332: nss security update (Medium)

  • 151653 RHSA-2023:1333: firefox security update (Medium)

  • 151642 RHSA-2023:1335: openssl security update (Medium)

  • 151679 RHSA-2023:1336: firefox security update (Medium)

  • 151663 RHSA-2023:1337: firefox security update (Medium)

  • 151705 [USN-5638-4] Expat vulnerabilities (Medium)

  • 151697 [USN-5739-2] MariaDB regression (Medium)

  • 151712 [USN-5767-3] Python vulnerability (Medium)

  • 151694 [USN-5778-2] X.Org X Server vulnerabilities (Medium)

  • 151723 [USN-5806-3] Ruby vulnerability (Medium)

  • 151696 [USN-5807-2] libXpm vulnerabilities (Medium)

  • 151708 [USN-5810-4] Git vulnerabilities (Medium)

  • 151718 [USN-5855-2] ImageMagick vulnerabilities (Medium)

  • 151691 [USN-5871-1] Git vulnerabilities (Medium)

  • 151710 [USN-5871-2] Git regression (Medium)

  • 151692 [USN-5872-1] NSS vulnerabilities (Medium)

  • 151693 [USN-5873-1] Go Text vulnerabilities (Medium)

  • 151695 [USN-5880-1] Firefox vulnerabilities (Medium)

  • 151707 [USN-5880-2] Firefox regressions (Medium)

  • 151699 [USN-5882-1] DCMTK vulnerabilities (Medium)

  • 151698 [USN-5883-1] Linux kernel (HWE) vulnerabilities (Medium)

  • 151700 [USN-5886-1] Intel Microcode vulnerabilities (Medium)

  • 151703 [USN-5888-1] Python vulnerabilities (Medium)

  • 151713 [USN-5892-2] NSS vulnerability (Medium)

  • 151701 [USN-5897-1] OpenJDK vulnerabilities (Medium)

  • 151702 [USN-5898-1] OpenJDK vulnerabilities (Medium)

  • 151706 [USN-5900-1] tar vulnerability (Medium)

  • 151704 [USN-5903-1] lighttpd vulnerabilities (Medium)

  • 151709 [USN-5904-1] SoX vulnerabilities (Medium)

  • 151711 [USN-5905-1] PHP vulnerabilities (Medium)

  • 151714 [USN-5928-1] systemd vulnerabilities (Medium)

  • 151715 [USN-5943-1] Thunderbird vulnerabilities (Medium)

  • 151716 [USN-5945-1] Protocol Buffers vulnerabilities (Medium)

  • 151717 [USN-5953-1] IPython vulnerabilities (Medium)

  • 151719 [USN-5954-1] Firefox vulnerabilities (Medium)

  • 151720 [USN-5959-1] Kerberos vulnerabilities (Medium)

  • 151721 [USN-5960-1] Python vulnerability (Medium)

  • 151722 [USN-5963-1] Vim vulnerabilities (Medium)

  • 151724 [USN-5965-1] TigerVNC vulnerability (Medium)

Fixes

Updated Vulnerability Descriptions:

  • 151536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.77 (High)
Version 4.16.0

March 3, 2023

Enhancements

Updated authenticated scanning checks and network explicit checks listed:

  • 151595 AIX Security Advisory: libxml2_advisory4 (High)

  • 151585 ELSA-2023-0808: firefox security update (Medium)

  • 151594 ELSA-2023-0810: firefox security update (Medium)

  • 151580 ELSA-2023-0812: firefox security update (Medium)

  • 151591 ELSA-2023-0817: thunderbird security update (Medium)

  • 151589 ELSA-2023-0821: thunderbird security update (Medium)

  • 151582 ELSA-2023-0824: thunderbird security update (Medium)

  • 151581 ELSA-2023-0832: kernel security and bug fix update (Medium)

  • 151578 ELSA-2023-0833: python3 security update (Low)

  • 151584 ELSA-2023-0835: python-setuptools security update (Low)

  • 151592 ELSA-2023-0837: systemd security and bug fix update (Low)

  • 151590 ELSA-2023-0838: samba security update (Medium)

  • 151583 ELSA-2023-0842: tar security update (Low)

  • 151586 ELSA-2023-0848: php:8.0 security update (Low)

  • 151587 ELSA-2023-0852: httpd:2.4 security and bug fix update (Low)

  • 151593 ELSA-2023-0902: webkit2gtk3 security update (Medium)

  • 151588 ELSA-2023-0903: webkit2gtk3 security update (Medium)

  • 151579 ELSA-2023-12137: pcs security update (Low)

  • 151596 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.177 (High)

  • 151597 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.57 (High)

  • 151598 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.8 (High)

  • 151574 VMware vRealize Log Insight Detected (Info)

Fixes

Updated Vulnerability Descriptions:

  • 151572 APSB23-11: Security Updates Available for Adobe Photoshop CC (High)
  • 151573 APSB23-12: Security Updates Available for Adobe InDesign (High)

  • 151536 Google Chrome: Multiple Vulnerabilities in Versions Less Than 110.0.5481.77 (High)

  • 151539 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.70 (High)

  • 151538 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 109.0.1518.78 (High)

  • 151537 Microsoft Edge (Chromium): Multiple Vulnerabilities in Versions Less Than 110.0.1587.41 (High)

  • 151569 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox 110 (High)

  • 151570 Mozilla Firefox: Multiple Vulnerabilities in Versions Less Than Firefox ESR 102.8 (High)

  • 151571 Mozilla Thunderbird: Multiple Vulnerabilities in Versions Less Than Thunderbird 102.7.1 (High)

  • 151567 MS23-FEB: Microsoft Exchange Server Security Update (High)

  • 151562 MS23-FEB: Microsoft Internet Explorer Security Update (High)

  • 151564 MS23-FEB: Microsoft Office Security Update (High)

  • 151568 MS23-FEB: Microsoft Sharepoint Server Security Update (Medium)

  • 151565 MS23-FEB: Microsoft SQL Server Security Update (High)

  • 151563 MS23-FEB: Microsoft Windows Security Update (High)

  • 151440 SSL Connection: TLS Diffie-Hellman Export Cipher Downgrade "Logjam" Vulnerability (Trivial)

Back to Top

 

Digital Guardian


There are currently no updates.

Back to Top

 

Document Management (RJS)


DeliverNow

Version: 1.2.19

March 9, 2023

New Features
  • Added PDF Compressor output option.
  • Added ability to send test emails from administrative interface.
Enhancements
  • Added additional configuration settings for TLS and expanded the logging to include an option to generate a full report of mail server communication.

Back to Top

 

GoAnywhere


GoAnywhere MFT

Version 7.1.3

March 9, 2023

Enhancements
  • Updated the Fortra license agreement

  • Updated the SFTP client to be compliant with RFC-4253

  • Updated attributions file.

Fixes
  • Fixed an issue that prevented queued jobs from being processed if a queued job was restricted to a specific system and that system was down or the system was up, but the name had changed.

  • Fixed an issue that occurred when attempting to view audit log details from the Trigger Log page.

  • Fixed an issue where users were unable to log in or save an edited user due to a resource being used as a WebDocs directory.

  • Fixed an issue in Resource Change History that prevented changes from being audited.

  • Fixed an issue involving Web User default secure mail password.

  • Fixed an issue where SAML authentication was mishandling newline characters.

  • Fixed an issue with the GoAnywhere upgrader where the embedded Derby database would fail to upgrade when upgrading GoAnywhere from a version before 6.3.0.

  • Fixed an issue where the database connection pool was not respecting configured values related to pool size.

GoAnywhere Gateway

Version 3.0.1

March 7, 2023

  • Updated the attributions file for Fortra rebranding.

  • Updated the GoAnywhere Gateway license agreement for Fortra rebranding.

  • Added configurable trust settings.

  • Fixed an issue with license responses.

  • Java 11 is now required for Gateway starting in version 3.0.1

Outlook Plugin

Version 3.3.0

March 14, 2023

  • Added the ability for users to use GoAnywhere Mail Templates from Outlook plugin.

  • Added multilingual support in the Outlook plugin. The plugin currently supports English, Spanish, German, French, Japanese, Chinese, Danish, Dutch, Hungarian, Italian, Indonesian and Portuguese.

Back to Top

 

Halcyon


Network Server Suite

Version 11.3

March 9, 2023

New Features
  • Enterprise Console: Users can now reset their status when they log on after their connection terminated unexpectedly.

  • Enterprise Console: A new section has been added to Device Manager to allow SNMPv3 Users to be maintained.

  • Windows 11 is fully supported.

Enhancements
  • Enterprise Console: The total number of alerts and actions can now be viewed within Enterprise Server Options.

  • Enterprise Console: Users can now view archived alerts which were written to *.eca files in previous versions of the software.

  • Enterprise Console: The Device Manager user interface has been modernized.

  • Enterprise Console: Several redundant SNMP properties have been removed from Device Manager.

  • Enterprise Console: Two new buttons have been added to the device filtering selection when viewing closed alerts to enhance device selection.

  • Enterprise Console: The default connection timeouts within Device Manager have been decreased to thirty seconds.

  • Enterprise Console: Generic failed login messages are now displayed within the Enterprise Console.

  • CCM: A new JAMS template has been added to the default set of templates.

  • CCM: The new VIOS Monitoring v2.0 template has been added to the default templates file (Default.csf). On a new install, the template will be listed underneath the AIX templates group. For upgrades, the templates might need to be imported for it to be displayed.

  • NSS: The NSS Trap Receiver has been enhanced to support SNMP v3.

  • Windows Agent: Windows agents can now continuously monitor for up to 48 hours if there are connection issues to CCM.

  • Unix Agent: UNIX agents will now continue monitoring for up to 48 hours without confirmation from CCM that they are still authorized to run.

Fixes
  • Enterprise Console: The content of Instant Alert message actions will no longer revert to the default settings when the service restarts.

  • Enterprise Console: Emails are no longer duplicated when you have a message type of 'Default' as well as 'Email' selected on an Instant Alert Message action.

  • Enterprise Console: Sending an ad hoc email from the client now includes alert comments.

  • Enterprise Console: An issue where false positive Ping Monitor failures were sent to windows servers after upgrading from version 10.3 has been resolved.

  • Enterprise Console: Messages written to the ActionMonitor.hlf file, for command actions, now have substitution variables resolved as expected, if used.

  • CCM: Fixed the issue "Error Retrieving SystemUpTime Integer Value From ServerData" when adding a CPU, Filesystem and Memory criteria within Linux agents.

  • CCM: The ability to test criteria for Unix agents from CCM has been reinstated.

  • CCM: Following an update to software components, a fix has been applied to convert milliseconds to seconds when executing TCP criteria for Windows agents.

  • NSS: The NSS installer can now be launched directly from a root directory.

  • Windows Agent: Auto-closing of alerts in the Windows agent was sometimes delayed. This has been fixed.

  • Windows Agent: The NSS Windows Agent installer no longer interacts with the Restart Manager to prevent the 'Files In Use' dialog from displaying a long list of unrelated applications.

  • Unix Agent: Fixed an issue within Unix agents with malformed reporting records allowing Advanced Reporting Suite to seamlessly collect this data.

  • Unix Agent: The NSS Unix Agent's Log File monitor has been enhanced to handle log file entries with special characters to avoid reading errors such as "utf-8 codec can’t decode byte 0xc3".

  • AIX Agent: Multiple criteria now load correctly for the AIX Error Report monitor.

  • AIX Agent: The NSS AIX Agent has been updated to ignore connections from port scanner applications.

  • Linux Agent: Since version 11.2 the Linux version of HALUSM has interrogated the process table at the thread level. This meant that a very small number of applications which assigned threads names with embedded spaces could trigger parsing errors. From version 11.3, HALUSM is more robust against this behavior in its interrogation of the process table content.

  • Linux Agent: A fix to the parsing of facility specifiers for syslog (for example the argument to the "-s" option) means that they are now be interpreted as intended, even if specified in lower case or with the "LOG_" prefix missing.

Task Supervisor

Version 4.3

March 9, 2023

New Features
  • Users are now able to delete Owners, Resources, Schedules and Ad Hoc Schedules. A second confirmation message will be displayed prior to deleting all data relating to the record being deleted.

  • The Task Supervisor web site has been enhanced to use the https protocol.

  • Windows 11 is fully supported.

Enhancements
  • Transport Layer Security (TLS) 1.2 support has been added to the installer for connections to Microsoft SQL Server.

  • A security update has been actioned to prevent Cross-Site Scripting (XSS) attacks.

  • A security update has been actioned to show generic failed login messages.

  • The web application has been enhanced to prevent cross-site request forgery.

  • The filtering on the Scheduled Tasks page has been enhanced.

  • The SMTP Components used to send email messages have been updated and now support SSL/TLS.

  • Password recovery now uses generic messages.

  • The web application has been updated to target .NET Framework 4.6.2 which addresses security vulnerabilities.

Fixes
  • Fixed an issue with minute recurring scheduled tasks failing to take daylight savings into account.

  • Fixed an issue with date selection jumping when viewing scheduled tasks.

  • The "Tasks Outstanding" report no longer includes minute recurring tasks that were deleted.

  • Fixed an issue when adding a new task if the first group has no schedules defined.

  • The Task Supervisor installer can now be launched directly from a root directory.

Code Uploader

Version 11.3

March 9, 2023

Fixes
  • Fixed timeout issues reported against license codes that were correctly applied on the IBM i.

Back to Top

 

IBM Partnership


Backup, Recovery, and Media Services (BRMS)

Version: PTF 7.5 SI82234, 7.4 SI82233, 7.3 SI82232

March 14, 2023

Enhancements

In version 7.3 and later:

  • BRMS SQL services have been added for BRMS Networking, Maintenance Policy functions, and copy control group support. These new services give users SQL procedures to set up a BRMS network, control maintenance options run by control groups, and procedures to copy control groups. See the BRMS wiki for more information at BRMS Enhancements.

  • The BRMS recovery report has been enhanced with attention block instructions to maintain the authority of customized output queues in library QUSRSYS during a disaster recovery.

  • BRMS maintenance has been enhanced to clear unused fields in the BRMS media record.

  • The BRMS shipped cloud lists named QCLDIPL, QCLDIPLDIR, and QCLDOMTUSR have been updated to support Digital Certificate Manger (DCM) environments. Any existing user entries in these lists will be cleared as these lists are rebuilt when the PTF is installed.

Fixes

In version 7.3 and later:

  • Issue of RSTLIBBRM with SAVLIB(*RSTLST) ENDOPT(*UNLOAD) may not unload all the volumes when the restore list has a mixture of parallel and serial saved items fixed.

  • Archive control groups using the same object list for multiple IASPs may not storage free the archived objects and report message MSGCPF2105 has been fixed.

  • The message replacement text for MSGCPF9801 may contain an extra '*' character was corrected.

  • Issue when IASP FlashCopy support fails to synchronize the reference date and time information for IFS backups to the target system has been fixed.

  • Fixed problem where using BRMS menu options to restore objects may incorrectly report message MSGCPF94FC.

 

Back to Top

 

JAMS


Version: 7.5.2

March 15, 2023

New Features
  • Integrations
    • Added a new Execution Method to run Workflows in Automate Plus/Ultimate from JAMS.
Enhancements
  • Desktop Client
    • Added support for searching for Execution Methods.
Fixes
  • Agents
    • Improved the connection reliability to Agents under heavy load.
    • Resolved an issue where the AgentD state may be shown as Idle when authentication has failed.
  • Desktop Client
    • Resolved an issue where a Sequence Job with a recurrence and a resource dependency may stay in Waiting for Resources state when the Resource quantity changed.
  • PowerShell
    • Resolved an issue with Set-JFSLocation where it would send a file to the root folder.
    • Updated the Jobs based on the PowerShell Execution Methods to correctly load the SMO or SQL modules.
  • Scheduler
    • Updated the initialization process for the JAMS Scheduler to prevent exceptions.
    • Updated the behavior of the concurrent Job limit detection to apply consistently in all scenarios.

Back to Top

 

Powertech


Powertech Antivirus

Version 6.11 (Powertech Antivirus for HelpSystems One)

March 29, 2023

Fixes
  • Fixed an issue in the 6.1 release where lists that should contain items, such as Configurations, are empty and the following error appears in the ptavws.log file:

    "ERROR com.helpsystems.robotweb.server.WebErrorHandler - General exception: Handler dispatch failed; nested exception is java.lang.IncompatibleClassChangeError: Expected non-static field org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.logger".

Authority Broker for IBM i

Version 4.24

March 27, 2023

New Features
  • Added a Profile Switch History report, and the Profile Switch History (LPRFSWTHST) command . The report allows creating reports of profile switches that were performed, even if audit journal receivers for the corresponding period have been deleted.

  • Added an Email Notification Report to the Reports menu, and the Email Configuration Report (LPRTEMLCFG) command.

Enhancements
  • Added Alert information to the Interested Parties listing.

  • The job name now appears on the Authority Broker Swap PDF cover page.

  • New switch definitions can now be created by copying and modifying existing switch definitions on the Assign System Users to Switch Profiles screen.

Fixes
  • Fixed an issue where a timed job was producing errors and looping.

  • Fixed an issue that caused an incorrect error message to display when a switch was attempted but blocked by the Day of the Week schedule.

  • Fixed an issue that prevented updating the Day of Week schedule for a swap pair.

  • Fixed an issue preventing the use of function keys F7 and F9 in the Change Switch Information setup panel (PABR0110).

  • Fixed an issue that caused System User Reports to fail when Switch Type *NORMAL was requested.

BoKS Manager

Version 8.1 (version update)

March 20, 2023

New Features
  • Added a new access method, SUDOLISTOTHERS and provided support for listing other users' sudo permissions on a host.

Enhancements
  • OpenSSL library upgraded to 1.1.1t.

Fixes
  • A fix has been applied to allow groupadm to modify the modification comment.

    Fixed an issue where the chroot setting didn't work in access rules for SSH subsystems (for example, SFTP) when using privilege separation in boks_sshd.

  • Fixed a security issue when kslog is enabled for BoKS SSH.

Version 8.1 (version update)

March 17, 2023

New Features
  • boksinfo now includes both boks-server and boks-client native package version when both native packages are installed.
Enhancements
  • Now sudo will resolve any symbolic links given as an argument to execute and verify the user is allowed to execute the resolved program.
Fixes
  • Fixed the installation of RHEL9.0 native packages in RHEL9.1.

  • Fixed chroot on Access Rules for SSH subsystems on Linux.

  • Added supoort for Red Hat 9 from Server Agent package c-8.1.14.

Powertech Antivirus for IBM i

Version 8.09

March 3, 2023

Enhancements
  • Anti-Ransomware Protection now supports exit program integration, allowing the use of multiple exit programs for file servers.

  • Improved the anti-ransomware functionality to detect ransomware attacks if the ransomware additionally encodes files with Base64 encoding after encrypting them.

  • Improved anti-ransomware messaging to include the IP address of systems causing suspicious activity.

  • Separated the user block/unblock functionality from "Work with User Overrides" menu option and corresponding command into a separate "Work with Blocked Users" menu option and AVWRKBLK command.

  • Functionality corresponding to the WGET utility is now shipped with the product. Users no longer need to install the open-source WGET utility to download DAT updates via HTTP or HTTPS.

Updates
  • Renamed file-access-and-encryption pattern detection mechanism to 'APEX' (Access Pattern and Encryption Activity Extended Detection).

  • Updated the anti-ransomware menu options to better represent the functions of each option.

Fixes
  • Fixed an issue where the anti-ransomware was not triggered for canary files that were located in the root directory of the IFS.

  • Fixed an issue where changing the on-access scan setting from *OPEN to *OPNCLO caused an error.

  • Fixed an issue that could cause the product to not function if both valid and invalid license keys were entered.

Back to Top

 

Robot


Robot Monitor

Version 15.02

March 8, 2022

Enhancements
  • Assure MIMIX 10 monitors are now included in the GUI software.

  • Created a new job, MONDMMX2R, to collect data for the new Assure MIMIX 10 monitors.

Fixes
  • Fixed minor threshold issue for Default Threshold for MQ Queue Depth. “Replace all values with defaults” button can be used to fix an existing threshold.

  • Added an ASP Group parameter to the User Data Collection Job screen.

Back to Top

 

Sequel


Sequel Data Warehouse Client

Version: 8.3.2902

March 16, 2023

Fixes
  • Fix for handling of rule properties where an External Call is bypassed.

  • Fix for validation of Boolean parameter in User-defined Function creation.

  • Correction to Data Set name validation in certain circumstances.

Sequel Data Warehouse Server

Version: 8.3.03

March 16, 2023

Fixes
  • Extract error report did not always list date conversion errors correctly. See Note 2.

  • Correction to Group Export for Scripts when Export Groups are linked to Projects.

  • Correction to extract program generation where multiple run-time parameters are used in SQL select predicate. See Note 2.

Back to Top

 

TeamQuest


Administration Console

Version 11.4.5

March 7, 2023

Enhancements
  • Upgrade Administration Console to Apache HTTP version 2.4.55

Automated Analytics

Version 11.3.32

March 7, 2023

Enhancements
Fixes
  • Automated Analytics TeamQuest module "Performance Monitor/Disk Summary/Used" metric for Windows, no longer returns a SeriesArray instead of a Series.

TeamQuest Manager

Version 11.4.11

March 7, 2023

Enhancements
  • Upgrade Manager to Apache HTTP version 2.4.55

  • Upgrade Manager to Postgres 13.9

Vityl Monitor

Version 11.4.6

March 7, 2023

Enhancements
  • Upgrade Vityl Monitor to Tomcat 8.5.84

Back to Top

 

Titus


Illuminate

Version 2023.0

March 27, 2023

New Features
  • Documentation, copyright, and EULA have been rebranded to Fortra
  • Scan Queue Manager - Titus Illuminate allows you to queue your scans, so they run automatically in a specified order. You can schedule to run these scans at a particular time, like, after working hours. The Scan Queue Manager service is installed when you install Titus Illuminate. See the Titus Illuminate Scanning Guide for more information. See the Titus Illuminate Deployment Best Practices Guide for information on configuring logging for the Scan Queue Manager.
Enhancements
  • Document headers and footers are now included in text extraction for content validation.

  • As you type a Configuration name when you create a scan, the Configuration name field starts to auto-populate with a list of names, read from the TCPG file.

  • The following performance monitoring counters have been added: Failed files actioned per second and Average time to action a file (in milliseconds). See the Titus Illuminate File Inventory Guide for more information.

Fixes
  • Illuminate 2022.1 does not perform new scans after you uninstall the Titus Administration Console uninstalled - FCI plugin issue

  • Illuminate 2022.0 RTM does apply Multi-select values to the files, but the Policy does apply the values correctly, and values do show up correctly in the Illuminate Dashboard

  • Illuminate does not show Original Classification for classified documents saved as a 'Strict Open XML Document (docx)'

  • Deadlock issue between processes with Illuminate 2022.1

  • Illuminate File system time stamp updates the Modified timestamp field when Illuminate applies a Classification

Back to Top

Vera

Version 3.21.4

March 2023

Fixes
  • (Windows Client) Fixed an issue where users were unable to open the Vera-secured PDF files after the Adobe Acrobat Version 2023.001.20064 update.

Version 3.21.3

March 2023

Updates
  • Windows clients signed their binaries with a certificate that will expire on March 9, 2023. Now, Vera will renew this certificate to avoid disruption in the customer environment. Vera wants customers to update their Vera Windows client to the latest version with the 3.21.3 release.

Back to Top