Mcafee Web Gateway 9.2.X Release Notes
Mcafee Web Gateway 9.2.X Release Notes
Mcafee Web Gateway 9.2.X Release Notes
x Release
Notes
What's new in update 9.2.12
Releases can introduce new features and enhancements.
Enhancements have been introduced as follows in this release.
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
WP-3440 When Web Gateway runs in Proxy High Availability (Proxy HA)
mode, log files are rotated in a suitable manner preventing
overflow of the Proxy HA log and spilling over into other
partitions, which had happened before.
WP-3787 When static routes are configured, the tool tip message no
longer suggests that the field for the gateway IP address
might be left empty, which is actually not allowed here.
Reference Resolution
WP-3484, WP-3744, WP-3745, WP-3746, WP-3747, WP-3793, This Web Gateway release includes updates addressing
WP-3800 publicly disclosed CVEs, regardless of whether a CVE has been
shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2020-12321
• CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
• CVE-2020-36221, CVE-2020-36222, CVE-2020-36223,
CVE-2020-36224, CVE-2020-36225, CVE-2020-36226,
CVE-2020-36227, CVE-2020-36228, CVE-2020-36229,
CVE-2020-36230
• CVE-2021-2161, CVE-2021-2163
• CVE-2021-20305
• CVE-2021-25215, CVE-2021-25216
• CVE-2021-27135
For more information about these CVEs and their impact, see
the Red Hat CVE portal.
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
WP-3639 In a Proxy High Availability (Proxy HA) setup only one node is
shown with active director status at a time, whereas two were
shown before even though only one had really been acting as
director node.
Web filtering
Reference Resolution
Other
Reference Resolution
Network communication
Reference Resolution
Reference Resolution
Vulnerabilities
Reference Resolution
WP-3445, WP-3483, WP-3527, WP-3528, WP-3547, WP-3584, This Web Gateway release includes updates addressing
WP-3589, WP-3611 publicly disclosed CVEs, regardless of whether a CVE has been
shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2019-25013
• CVE-2020-8625
• CVE-2020-10029, CVE-2020-10543, CVE-2020-10878
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
WP-3487 In a Proxy High Availability (HA) setup with two Web Gateway
appliances running as director and scanning nodes, web
traffic is forwarded to a next-hop proxy under FTP without
problems, which had occurred when the Fully Qualified
Domain Name (FQDN) had been configured for the next-hop
proxy address, The issue was irrespective of the network
mode that had been set up for Web Gateway.
Authentication
Reference Resolution
Web filtering
Reference Resolution
WP-3359 When .eml files are tested, they can pass again, as they are no
longer blocked by media type filtering on Web Gateway,
which had happened after the files had mistakenly been
recognized as corrupted archives.
Vulnerabilities
Reference Resolution
Other
Reference Resolution
WP-3411 File download with data trickling works as expected when two
Web Gateway appliances run in a proxy chain, where a
timeout had occurred before due to a problem with handling
internal error messages.
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
WP-3441 When a file copy fails in a Web Gateway cluster, the error
message that is created is also logged, which had not
happened before.
Reference Resolution
Vulnerabilities
Reference Resolution
WP-3426, WP-3427, WP-3307, WP-3444, WP-3452, WP-3475 This Web Gateway release includes updates addressing
publicly disclosed CVEs, regardless of whether a CVE has been
shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2016-5766
• CVE-2019-19126, CVE-2019-20907
• CVE-2020-14345, CVE-2020-14346, CVE-2020-14356,
CVE-2020-14361, CVE-2020-14362
• CVE-2021-3156, CVE-2021-23885
For more information about these CVEs and their impact, see
the Red Hat CVE portal.
Reference Resolution
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
Reference Resolution
Vulnerabilities
Reference Resolution
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Reference Resolution
WP-2236, WP-3246, WP-3308, WP-3309, WP-3318, WP-3319, This release also includes resolutions relating to other
WP-3320, WP-3321, WP-3322, WP-3323, WP-3324, WP-3325 vulnerabilities that were implemented in preceding releases,
but were not listed in the release notes then.
The following vulnerabilities were involved:
• CVE-2017-12652
• CVE-2018-15903
• CVE-2018-20843
• CVE-2019-5094, CVE-2019-5188, CVE-2019-5482
• CVE-2019-11719, CVE-2019-11727, CVE-2019-11756
• CVE-2019-12450
• CVE-2019-14822, CVE-2019-14866
• CVE-2019-17006, CVE-2019-17023, CVE-2019-17498
• CVE-2020-6829
• CVE-2020-8177, CVE-2020-8622, CVE-2020-8623,
CVE-2020-8624
• CVE-2020-10754
• CVE-2020-12049, CVE-2020-12243, CVE-2020-12400,
CVE-2020-12401, CVE-2020-12402, CVE-2020-12403
• CVE-2020-14779, CVE-2020-14781, CVE-2020-14782,
CVE-2020-14792, CVE-2020-14796, CVE-2020-14797,
CVE-2020-14803
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
Reference Resolution
Vulnerabilities
Reference Resolution
WP-2986, WP-3236, WP-3309 This Web Gateway release includes CentOS updates that we
have applied to MLOS, addressing publicly disclosed CVEs in
the open source components, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
Other
Reference Resolution
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Reference Resolution
WP-2874 When log file pushing is configured, the log file manager no
longer rejects path information that consists of a slash or is
empty, but accepts it and uses the root directory to push log
files there.
WP-2916 Log file rotation works now even when interfaces that are
matched by the log file manager to IP addresses contain dots
in their names.
Vulnerabilities
Reference Resolution
WP-2789, WP-3138 This Web Gateway release includes CentOS updates that we
have applied to MLOS, addressing publicly disclosed CVEs in
the open source components, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2020-1968, CVE-2020-11022
For more information about these CVEs and their impact, see
the Red Hat CVE portal.
Other
Reference Resolution
WP-2834 Engine IDs that are part of the information provided under
SNMP are no longer identical on all Web Gateway appliances
that have SNMP configured.
Resolved issues
JIRA issue numbers are provided in the reference columns below.
Network communication
Reference Resolution
WP-2531 When Web Gateway runs in Proxy High Availability (HA) mode,
ICAP traffic can be processed in addition to traffic going on
under HTTP and FTP.
Reference Resolution
WP-2546 When handling DMG files with unused sectors, the opener
module on Web Gateway no longer extracts these sectors,
avoiding unnecessary filling up of the opt partition and
memory allocation failures.
WP-2910 Error logging for calls of /usr/bin/event has been added for
the Web Gateway user interface..
WP-2924 Files that are protected through a password under 7zip, are
no longer blocked as corrupted on Web Gateway.
Vulnerabilities
Reference Resolution
Other
Reference Resolution
Resolved issues
JIRA issue numbers are provided in the reference column of the table below.
Network communication
Reference Resolution
WP-2705 Use of the libudns.so library on Web Gateway does not lead to
a process failure anymore.
WP-2888 CPU load on connections when SSL certificates are sent does
no longer become excessive, which had happened before due
to bad timing when the sending of a certificate was
renegotiated and the request body forwarded at the same
time,
Web filtering
Reference Resolution
WP-2581 URLs can now be resolved through DNS queries even when
requests for retrieving service groups originate from a SHN
client.
WP-2760 A DLP rule for preventing applications from being run out of
an Excel spreadsheet works now after it had previously not
been able to detect the relevant code string.
WP-2782 Files of the Tar type that were blocked because they could not
be handled by the opener module on Web Gateway can now
be opened and downloaded without problems.
WP-2800 Archives of the OPC type can now be handled by the opener
module on Web Gateway.
WP-2836, WP-2837 Error tolerance has been improved in the process on Web
Gateway that handles responses received from the web
under HTTP.
Vulnerabilities
Reference Resolution
WP-1585, WP-2864, WP-2932 This Web Gateway release includes CentOS updates that we
have applied to MLOS, addressing publicly disclosed CVEs in
the open source components, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2019-1551, CVE-2019-11091, CVE-2019-12126,
CVE-2019-12127, CVE-2019-12130
• CVE-2020-13934, CVE-2020-13935
For more information about these CVEs and their impact, see
the Red Hat CVE portal.
Other
Reference Resolution
WP-2817 Failures of the core process that were due to an issue with the
Composite Opener do not occur anymore.
Resolved issues
JIRA issue numbers are provided in the reference columns of the tables below.
Web filtering
Reference Resolution
WP-2781 The media type font *.woff2 is detected now by the filtering
process and not blocked when a rule for blocking media
where the type cannot be detected is enabled.
Vulnerabilities
Reference Resolution
WP-2578, WP-2728, WP-2740, WP-2775, WP-2777 This Web Gateway release includes CentOS updates that we
have applied to MLOS, addressing publicly disclosed CVEs in
the open source components, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2020-1967, CVE-2020-7292, CVE-2020-8616,
CVE-2020-8617, CVE-2020-9484, CVE-2020-10188
For more information about these CVEs and their impact, see
the Red Hat CVE portal.
Other
Reference Resolution
WP-2817 Failures of the core process that were due to an issue with the
Composite Opener do not occur anymore.
Resolved issues
JIRA issue numbers are provided in the reference columns of the tables below.
Network communication
Reference Resolution
Authentication
Reference Resolution
WP-2693 When log files are auto-pushed with SCP, authentication using
a public key for SSH-secured communication works now even
if no password is submitted with the user name.
Reference Resolution
WP-2282 A certificate chain for the user interface that could not be
imported is made available again for importing when SSL-
secured traffic is processed.
Vulnerabilities
Reference Resolution
WP-2348, WP-2545, WP-2556, WP-2638, WP-2651, WP-2690 This Web Gateway release includes CentOS updates that we
have applied to MLOS, addressing publicly disclosed CVEs in
the open source components, regardless of whether a CVE
has been shown to impact customers.
The following medium and higher level CVEs (CVSS 3.0 >= 4)
were involved:
• CVE-2015-2716
Other
Reference Resolution
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other
marks and brands may be claimed as the property of others.