Product Update - April 18th, 2022

New Features & Enhancements

  • New Cato Knowledge Base Coming Soon: On April 24, 2022, we are introducing a completely new redesign of the Knowledge Base.
    • On April 24, you may experience some disruption with articles while we are implementing the changes to the production environment 
  • Reminder for End-of-Life of the Legacy Cato Management Application: Starting on April 24, 2022, you will only be able to access the new Cato Management Application. After this date, the legacy Cato Management Application will be end-of-life and no longer available. Read more.

Cato SDP Client Releases

  • Windows Client v5.3: We are starting the gradual roll-out for the Windows Client version 5.3. This version includes:
    • Enhanced Reauthentication Experience: A notification lets users know that the SSO or MFA session will soon expire and allows them to seamlessly reauthenticate. Read more.
    • For Windows devices with the Intel Killer NICs, Cato recommends that you update to the latest suite. In some tests, this update overcomes the relevant connectivity issues.
    • Bug fixes:
      • Computers recover from sleep mode were unable to connect to the Cato Cloud
      • For Windows Clients with Never-Off enabled and behind a Socket, the user couldn’t use Office Mode to connect
      • Sometimes the Client didn’t reconnect when moving between different networks, such as cellular to WiFi
      • After the MFA session expires, the OS browser didn’t open the authentication page

Security Updates

  • Cato Cloud Updated for BOD 22-01 CISA Security Recommendations: Cato continuously monitors the CISA guidelines and recommendations, including the recently released Binding Operational Directive (BOD) 22-01. We completed updating the IPS protections to protect against the network-based threats in the Cato Cloud. Read more about Cato and CISA.
  • IPS Signatures:
    • Malware - BTCWare (Enhancement)
    • SSH - Brute-force Attempt (Enhancement)
    • CVE-2022-26318
    • CVE-2022-23253
    • CVE-2022-22536
    • CVE-2022-21703
    • CVE-2022-20699
    • CVE-2022-0543
    • CVE-2022-0079
    • CVE-2021-45897
    • CVE-2021-45467
    • CVE-2021-45466
    • CVE-2021-45382
    • CVE-2021-4045
    • CVE-2021-36260
    • CVE-2021-34414
    • CVE-2021-31985
    • CVE-2021-31589
    • CVE-2021-22941
    • CVE-2021-21974
    • CVE-2021-20023
    • CVE-2021-1498
    • CVE-2020-9377
    • CVE-2020-7247
    • CVE-2020-6287
    • CVE-2020-1938
    • CVE-2020-16846
    • CVE-2020-10221
    • CVE-2019-7483
    • CVE-2019-6340
    • CVE-2019-18370
    • CVE-2019-15107
    • CVE-2019-11043
    • CVE-2019-1003030
    • CVE-2018-6961
    • CVE-2018-18325
    • CVE-2018-15811
    • CVE-2018-14839
    • CVE-2018-11138
    • CVE-2018-0125
    • CVE-2017-9822
    • CVE-2017-6334
    • CVE-2017-3881
    • CVE-2017-12617
    • CVE-2016-1555
    • CVE-2016-11021
    • CVE-2016-10174
    • CVE-2016-0752
    • CVE-2015-3035
    • CVE-2015-1187
    • CVE-2014-6287
    • CVE-2014-0130
    • CVE-2013-4810
    • CVE-2013-2729
    • CVE-2013-2465
    • CVE-2013-0632
    • CVE-2012-1823
    • CVE-2010-4345
    • CVE-2010-4344
    • CVE-2009-1151
    • CVE-2005-2773
  • Application Database: 
    • Apple Safe Browsing (New)
    • Craigslist, Inc. (Enhancement)

Was this article helpful?

0 out of 0 found this helpful

1 comment

  • Comment author
    Yaakov Simon

    Updated the resolved issue for Intel Killer NICs to: In some tests, this update overcomes the relevant connectivity issues.

Add your comment