Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here.

Skyhigh Security

Secure Web Gateway 11.1.5 Release Notes

What's new in the 11.1 release

This release introduces new features and enhances existing features.

Radius-based authentication and management of CLI-based administrator accounts

On the Web Gateway user interface, you can as an administrator create CLI-based accounts for other administrators. Each of these accounts works across all the appliances in a cluster or on a standalone appliance. Logon is enabled based on Radius authentication or local authentication depending on the configuration.

For more information, see the Administrator accounts chapter of the Secure Web Gateway 11.1.x Product Guide.

Configurable ISTag header parameters for ICAP server responses

You can choose and configure additional parameters for the ISTag header that is sent in responses to the ICAP clients when Secure Web Gateway runs as an ICAP server. The header can also provide information about the version of the web protection policy that is in place on this Secure Web Gateway appliance.

For more information, see the Proxies chapter of the Secure Web Gateway 11.1.x Product Guide.

Terminating client connections on the command line interface

You can terminate a client connection by running a command on the command line interface (CLI). The reason for terminating a connection might be that the traffic on this connection consumes too much bandwidth.

Event for removing headers based on wildcard matches

Using the Header.RemoveAllWildcardMatchingHeaders event in a rule, you can remove all headers that match a given wildcard from requests and responses sent and received in web traffic that is processed on Secure Web Gateway.

Property for encoding a string under the Base64 method and rendering the result in binary format

Using the String.Base64EncodeAsBinary property in a rule, you can have a string encoded under the Base64 method and the result of this encoding turned into a string of binary digits.

Known Issues and Workaround 

For a list of issues that are currently known, see SWG 11.x.x Known Issues and Workaround

Resolved issues in update 11.1.5 

This release resolves known issue.

NOTE: Secure Web Gateway 11.1.5 is provided as a controlled release.       

For upgrade information, see the Upgrading to a new version provided as a main release section of the Secure Web Gateway Installation Guide. 

The JIRA issue number is provided in the reference column.

Network communication  

Reference Description
WP-3343 IP spoofing is supported for HTTP(S) when setting up proxies in Explicit Proxy or L2 Transparent mode.

Other  

Reference Description
WP-3990 Excel 4 macros are now detected in media type filtering.

Vulnerabilities Fixed         

Reference Description

WP-4547, WP-4598, WP-4621

 

This Secure Web Gateway release includes updates addressing publicly disclosed CVEs, regardless of whether a CVE has been shown to impact customers.

The following medium and higher-level CVEs (CVSS 3.0 >= 4) were involved:

  • CVE-2022-24407 - There is no impact on SWG since the affected component is not in use. 
  • CVE-2022-1271 - There is a moderate impact on SWG since it requires CLI access to the instance to be exploited.
  • CVE-2022-1292  - There is No impact since SWG does not ship the affected script by default. 
    CVE-2022-1473
    CVE-2022-1434
    CVE-2022-1343

For more information about these CVEs and their impact, see the Red Hat CVE portal.

 

  • Was this article helpful?