February 23, 2020 Service Pack

The following Service Pack versions were released:

Versions (Sensor and Server)

18.0.300

18.1.220

19.0.160

19.1.121

19.2.21

The tables below describe the enhancements, fixed issues, and changes included in each version.

  • The Versions column indicates the versions that include the fix.

  • The Required Update column indicates if the fix requires sensor/server update.

IMPORTANT: If you want to upgrade your servers to this version, we recommend that you upgrade all components - Registration server, Detection servers, and WebApp server - to this version.

Enhancements

Issue

Area

Description

Versions

Required Update

Sensor OS

CYBR-27455, CYBR-27594

Anti-Malware

The ‘Malicious by loading malicious file’ Malop is now also generated by endpoint classifications, in addition to Threat Intel server classifications. For example, the Malop is generated if the sensor detected an opened document as malicious by Anti-Malware > Signatures or by behavioral document protection.

19.2.21

Sensor, Server

Windows

CYBR-26357

Detection

Recently, the NSA announced vulnerability CVE-2020-0601 which was also then patched by Microsoft in a system update. The best protection against this vulnerability is to update all of the machines in your environment with the most recent updates from Microsoft. Cybereason detects attempts to exploit this vulnerability. In this Service Pack, we have added this functionality to version 19.2.21. For more information, see https://nest.cybereason.com/knowledgebase/2228325

19.2.21

Sensor, Server

Windows

CYBR-27573

Endpoint Controls

When uploading Custom Firewall rules, the CSV upload feature supports adding a set of Japanese values to the CSV. Contact Technical Support for more information.

19.2.21

Server

Windows

CYBR-24552

Endpoint Detection

We have updated the detection logic for the ‘Malicious by code injection’ Malop to ensure fewer false positive results. We have removed cases of injecting processes of unknown reputation, as this caused most of the false positives.

18.0.300, 18.1.220, 19.0.160, 19.1.121, 19.2.21

Server

Windows

CYBR-24834

Investigation

From the Investigation screen’s Timeline filter, you can include only items that were created within the specified time interval by selecting the Created radio button, or items that existed during that interval by selecting the Existed radio button.

19.1.121, 19.2.21

Server

N/A

Fixed issues

Issue

Area

Description

Versions

Required Update

Sensor OS

CYBR-26823

Anti-Malware

When a malicious file was copied to a machine, Anti-Malware > Signatures was unable to scan the file correctly and remove it. If the file was run, however, it was stopped and removed.

After this fix, the file is scanned properly as soon as it is copied to the machine.

19.1.121

Sensor

Windows

CYBR-25313

Cybereason UI

We have improved error handling in the UI in cases where server data was missing.

18.0.300, 18.1.220, 19.0.160, 19.1.121, 19.2.21

Server

N/A

CYBR-26894

Detection

The Cybereason minionhost process was reported as the root cause of a Phishing Malop. Additional benign processes were reported as well.

This issue has been resolved, and minionhost and other benign processes are not reported as the root cause in this case.

18.0.300, 18.1.220, 19.0.160, 19.1.121, 19.2.21

Sensor

Windows

CYBR-26016

Detection

When file collection was enabled, behavior related to credential theft was not reported as a Malop.

This issue has been resolved in the majority of cases.

19.1.121, 19.2.21

Sensor

Windows

CYBR-25198

Detection

On machines with many network interfaces (over 50), sensors installed on RHEL 7 experienced crashes.

This issue has been resolved, and now such machines do not experience crashes.

18.0.300, 18.1.220, 19.0.160, 19.1.121, 19.2.21

Sensor

Linux

CYBR-27442

Investigation

In the Investigation screen, some DNS filters were missing from the Filters dialog window.

This issue has been resolved.

19.1.121, 19.2.21

Server

N/A

CYBR-23931

Sensor Management

When upgrading sensors from versions older than 17.5.170/17.6.170/18.0.80/18.1.10 to a newer version, the sensor tags disappeared and needed to be re-uploaded. This issue has been resolved, and after upgrade from the listed versions, sensor tags remain.

In addition, duplicate sensors could not be tagged. This issues has been resolved. After this fix, the mapping of tags to sensors is based on pylumID (unique identifier).

19.1.121, 19.2.21

Server

All

CYBR-26800

Sensor Management

When sensors were updated via the Cybereason UI > Sensors screen, their ‘Last update state’ remained on ‘In progress’ indefinitely if their update failed due to an unknown reason.

This issue has been resolved, and now in this case, the ‘Last update state’ changes to ‘Failed’ if the update did not succeed after 1 hour.

18.1.220, 19.0.160, 19.1.121, 19.2.21

Server

All

CYBR-26795

Sensor Management

In the Settings screen > Stale & archived sensors section, in the popup that appears when you edit the settings, the number of offline sensors that will become stale was incorrect and was higher than it should have been.

This issue has been resolved.

19.0.160, 19.1.121, 19.2.21

Server

N/A

CYBR-26523

Sensor Management

Sensors that were manually un-archived became archived again, when they should have remained un-archived.

This issue has been resolved.

19.0.160, 19.1.121, 19.2.21

Server

N/A

CYBR-24971

Sensor Platform

On Windows, when installing the sensor from the command line, it was not possible to install the sensor to a different folder than the default folder. Previously, when attempting to install to a different folder, the sensor was installed in the default folder.

We have now enabled installing to a different folder from the command line.

18.0.300, 18.1.220, 19.0.160, 19.1.121, 19.2.21

Sensor

Windows