CVE-2022-1700

Description

Improper Restriction of XML External Entity Reference ('XXE') vulnerability in the Policy Engine of Forcepoint Data Loss Prevention (DLP), which is also leveraged by Forcepoint One Endpoint (F1E), Web Security Content Gateway, Email Security with DLP enabled, and Cloud Security Gateway prior to June 20, 2022. The XML parser in the Policy Engine was found to be improperly configured to support external entities and external DTD (Document Type Definitions), which can lead to an XXE attack. This issue affects: Forcepoint Data Loss Prevention (DLP) versions prior to 8.8.2. Forcepoint One Endpoint (F1E) with Policy Engine versions prior to 8.8.2. Forcepoint Web Security Content Gateway versions prior to 8.5.5. Forcepoint Email Security with DLP enabled versions prior to 8.5.5. Forcepoint Cloud Security Gateway prior to June 20, 2022.

Remediation

Solution:

  • Upgrade to the following versions: Forcepoint Data Loss Prevention (DLP) versions 8.8.2 or above. Forcepoint One Endpoint (F1E) with Policy Engine versions 8.8.2 or above. Forcepoint Web Security Content Gateway versions 8.5.5 or above. Forcepoint Email Security with DLP enabled versions 8.5.5 or above.

Workaround:

  • See https://help.forcepoint.com/security/CVE/CVE-2022-1700.html

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Vendor Advisory forcepoint.com
Affected: Forcepoint Data Loss Prevention (DLP)
Affected: Forcepoint One Endpoint (F1E) with Policy Engine
Affected: Forcepoint Web Security Content Gateway
Affected: Forcepoint Email Security with DLP enabled
Affected: Forcepoint Cloud Security Gateway
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-1700?
CVE-2022-1700 has been scored as a high severity vulnerability.
How to fix CVE-2022-1700?
To fix CVE-2022-1700: Upgrade to the following versions: Forcepoint Data Loss Prevention (DLP) versions 8.8.2 or above. Forcepoint One Endpoint (F1E) with Policy Engine versions 8.8.2 or above. Forcepoint Web Security Content Gateway versions 8.5.5 or above. Forcepoint Email Security with DLP enabled versions 8.5.5 or above.
Is CVE-2022-1700 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-1700 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-1700?
CVE-2022-1700 affects Forcepoint Data Loss Prevention (DLP), Forcepoint One Endpoint (F1E) with Policy Engine, Forcepoint Web Security Content Gateway, Forcepoint Email Security with DLP enabled, Forcepoint Cloud Security Gateway .
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.