Cyber Security News

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System (IPS) capabilities powered by Suricata 8.0.1.

This release emphasizes improved network monitoring through innovative reporting tools, alongside toolchain rebasing and extensive package updates to bolster security and performance.

Designed for both small offices and large enterprises, the update addresses long-standing user requests for better visibility into security events, ensuring administrators can respond swiftly to threats.

The standout addition in IPFire 2.29 is the new IPS reporting suite, which transforms how network activity is tracked and documented.

Administrators can now receive immediate email notifications for alerts exceeding a user-defined threshold, ensuring critical incidents are flagged in real-time without sifting through logs.

Enhanced IPS Reporting Features

Scheduled PDF reports, generated daily, weekly, or monthly, offer comprehensive summaries of all alerts in a readable format suitable for archiving or sharing with stakeholders.

Additionally, alerts can be forwarded to remote syslog servers, providing an independent log trail that survives potential firewall compromise for robust forensic analysis.

These features enhance auditability, allowing teams to maintain verifiable records of threat detection and response, even in adversarial scenarios.

A sample PDF report demonstrates the clarity of these outputs, including event timelines and severity highlights. By extending IPS data beyond the device itself, IPFire strengthens operational accountability and simplifies compliance efforts.

Upgrading to Suricata 8.0.1, the IPS now caches compiled rules for faster startups and includes more resilient memory management.

Expanded protocol support covers DNS-over-HTTP/2, Multicast DNS, LDAP, POP3, SDP in SIP, SIP over TCP, and WebSocket, enabling deeper traffic inspection.

On ARM architectures, the Vectorscan library optimizes pattern matching using advanced vector instructions, delivering sharper performance in resource-constrained environments.

These enhancements ensure the IPS remains efficient against evolving threats while minimizing overhead on hardware.

Package Security Updates

The IPFire toolchain has been rebased on GNU Compiler Collection 15.2.0, GNU Binutils 2.42, and GNU glibc 2.42, incorporating bug fixes, security patches, and performance gains.

A broad array of packages received updates, including BIND 9.20.13 for DNS stability, cURL 8.16.0 for secure transfers, and sudo 1.9.17p2 for privilege management improvements.

Intel’s latest microcode addresses recent processor vulnerabilities, while GRUB has been fortified against multiple exploits.

Notably, responsible disclosure from VulnCheck and Pellera Technologies revealed 18 web UI vulnerabilities due to insufficient input validation from browsers.

These have been patched and assigned CVEs from 2025-34301 to 2025-34318, all rated with potential for cross-site scripting or injection if exploited by authenticated admins.

CVE IDDescriptionBugzilla IDCVSS Score (Estimated)
CVE-2025-34301Web UI input validation flaw#13876Medium (6.1)
CVE-2025-34302Web UI input validation flaw#13877Medium (6.1)
CVE-2025-34303Web UI input validation flaw#13878Medium (6.1)
CVE-2025-34304Web UI input validation flaw#13879Medium (6.1)
CVE-2025-34305Web UI input validation flaw#13880Medium (6.1)
CVE-2025-34306Web UI input validation flaw#13881Medium (6.1)
CVE-2025-34307Web UI input validation flaw#13882Medium (6.1)
CVE-2025-34308Web UI input validation flaw#13883Medium (6.1)
CVE-2025-34309Web UI input validation flaw#13884Medium (6.1)
CVE-2025-34310Web UI input validation flaw#13885Medium (6.1)
CVE-2025-34311Web UI input validation flaw#13886Medium (6.1)
CVE-2025-34312Web UI input validation flaw#13887Medium (6.1)
CVE-2025-34313Web UI input validation flaw#13888Medium (6.1)
CVE-2025-34314Web UI input validation flaw#13889Medium (6.1)
CVE-2025-34315Web UI input validation flaw#13890Medium (6.1)
CVE-2025-34316Web UI input validation flaw#13891Medium (6.1)
CVE-2025-34317Web UI input validation flaw#13892Medium (6.1)
CVE-2025-34318Web UI input validation flaw#13893Medium (6.1)

Add-on packages like HAProxy 3.2.4, nginx 1.29.1, and Samba 4.22.4 also saw updates, extending IPFire’s versatility for advanced deployments. This release solidifies IPFire’s role as a reliable, evolving security cornerstone.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New TEE.fail Attack Breaks Trusted Environments to Exfiltrate Secrets from Intel and AMD DDR5 Environments

A groundbreaking security vulnerability has emerged that fundamentally challenges the integrity of modern trusted execution…

12 minutes ago

Sweet Security Brings Runtime-CNAPP Power to Windows

Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…

17 minutes ago

AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments

Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…

25 minutes ago

WordPress Plugin Vulnerability Exposes 7 Million Sites to XSS Attack

A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…

45 minutes ago

Hikvision Exploiter – An Automated Exploitation Toolkit Targeting Hikvision IP Cameras

A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…

56 minutes ago

10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…

2 hours ago