MWG Release 12.2.12 RN-RELEASE
MWG Release 12.2.12 RN-RELEASE
12 Release Notes
For information about how to upgrade to this release, see Upgrading to a new version – Main Release.
Rebranded SNMP SMI and MIB file with updated Org OID for Skyhigh
Security
As part of the rebranding, a new Object Identifier (OID) has been introduced for Org Skyhigh Security. We are updating
the SNMP OID from .1.3.6.1.4.1.1230* to .1.3.6.1.4.1.59732*. You'll need to update your management software
accordingly if they are referring to these OID. For more details, see Configure event monitoring with SNMP.
InsecureNetlogon
Insecure NETLOGON channel is blocked by default. To explicitly allow Insecure NETLOGON, a new checkbox is
provided in Windows Join Domain Dialogue. For more details, see InsecureNetlogon
https://success.skyhighsecurity.com/Release_Notes/Latest_Release_Notes/Secure_Web_Gateway_12.2.12_Release_Notes
Downloaded: Fri, 09 Aug 2024 10:50:56 GMT
1
response in case Next Hop Proxy is not healthy. With this feature, SWG will have knowledge of the health of the Next
Hop Proxies beforehand. For more details, see TCP Health Check for Next Hop Proxy.
The configurable size limit of single XML attributes has been increased to reduce errors on startup when having large
inline lists.
https://success.skyhighsecurity.com/Release_Notes/Latest_Release_Notes/Secure_Web_Gateway_12.2.12_Release_Notes
Downloaded: Fri, 09 Aug 2024 10:50:56 GMT
2
Resolved Issues in the 12.2.12 Release
NOTE: Secure Web Gateway 12.2.12 is provided as a main release.
For information about how to upgrade to this release, see Upgrading to a new version – Main Release.
Reference Description
The Show in Context feature on the search filter highlights the ruleset and makes it visible on the
WP-6156
screen with one click
WP-6282 SWG now support handling HTTP_1_1_REQUIRED responses from HTTP2 server
WP-6298 Hard disk usage tracking for relevant disk areas in the cloud
TCP ports are listed on the UI under Dashboard > Charts and Tables >System Details > Open TCP
WP-6299
Ports
Vulnerabilities Fixed
This Secure Web Gateway release includes updates addressing publicly disclosed CVEs, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher-level CVEs (CVSS 3.0 >= 4) were involved:
https://success.skyhighsecurity.com/Release_Notes/Latest_Release_Notes/Secure_Web_Gateway_12.2.12_Release_Notes
Downloaded: Fri, 09 Aug 2024 10:50:56 GMT
3
Reference CVE Description
https://success.skyhighsecurity.com/Release_Notes/Latest_Release_Notes/Secure_Web_Gateway_12.2.12_Release_Notes
Downloaded: Fri, 09 Aug 2024 10:50:56 GMT
4
MAC of data larger than 64 bytes. Before returning to the caller all the XMM
registers are set to zero rather than restoring their previous content. The
vulnerable code is used only on newer x86_64 processors supporting the
AVX512-IFMA instructions. The consequences of this kind of internal
application state corruption can be various - from no consequences, if the
calling application does not depend on the contents of non-volatile XMM
registers at all, to the worst consequences, where the attacker could get
complete control of the application process. However given the contents of the
registers are just zeroized so the attacker cannot put arbitrary values inside,
the most likely consequence, if any, would be an incorrect result of some
application dependent calculations or a crash leading to a denial of service.
The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3 and a malicious client can influence whether this AEAD
cipher is used by the server. This implies that server applications using
OpenSSL can be potentially impacted. However we are currently not aware of
any concrete application that would be affected by this issue therefore we
consider this a Low severity security issue. As a workaround the
AVX512-IFMA instructions support can be disabled at runtime by setting the
environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000
The FIPS provider is not affected by this issue.
For resolved issues on the previous releases and other information, see Secure Web Gateway 12.2.x Release Notes
https://success.skyhighsecurity.com/Release_Notes/Latest_Release_Notes/Secure_Web_Gateway_12.2.12_Release_Notes
Downloaded: Fri, 09 Aug 2024 10:50:56 GMT