First published: Mon Oct 04 2021(Updated: )
Forcepoint NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 are vulnerable to TCP reflected amplification vulnerability, if HTTP User Response has been configured.
Credit: psirt@forcepoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Forcepoint Next Generation Firewall | <=6.5.11 | |
Forcepoint Next Generation Firewall | >=6.8.0<=6.8.6 | |
Forcepoint Next Generation Firewall | =6.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41530 is a vulnerability in Forcepoint NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 that allows for TCP reflected amplification if HTTP User Response has been configured.
CVE-2021-41530 can be used to exploit a TCP reflected amplification vulnerability in Forcepoint Next Generation Firewall versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0.
CVE-2021-41530 has a severity rating of 7.5 (High).
To fix CVE-2021-41530, it is recommended to upgrade to Forcepoint NGFW Engine version 6.10.1 or later.
More information about CVE-2021-41530 can be found on the Forcepoint help page: [https://help.forcepoint.com/security/CVE/CVE-2021-41530.html](https://help.forcepoint.com/security/CVE/CVE-2021-41530.html)