Firepower Release Notes 640
Firepower Release Notes 640
x
First Published: 2019-04-24
Last Modified: 2019-10-11
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2019–2024 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 Welcome 1
Release Dates 1
Sharing Data with Cisco 3
For Assistance 4
FMC Platforms 7
Device Platforms 8
Device Management 11
CHAPTER 3 Features 13
Installation Guidelines 53
Installation Guides 55
CHAPTER 6 Bugs 57
Open Bugs 57
Open Bugs in Version 6.4.0 57
Resolved Bugs 61
Resolved Bugs in New Builds 61
Resolved Bugs in Version 6.4.0.18 62
Release Dates
Sometimes we release updated builds. In most cases, only the latest build for each platform is available on
the Cisco Support & Download site. If you downloaded an earlier build, do not use it. For more information,
see Resolved Bugs in New Builds, on page 61.
34 2019-06-27 —
2019-05-15 FMC 750, 1000, 1500, 2000, 2500, 3500, 4000, 4500
FMCv
Firepower 2110, 2120, 2130, 2140
Firepower 4110, 4120, 4140, 4150
Firepower 9300 with SM-24, SM-36, and SM-44 modules
ASA 5508-X, 5515-X, 5516-X, 5525-X, 5545-X, 5555-X
ASA 5585-X-SSP-10, -20, -40, -60
ISA 3000
FTDv
Firepower 7000/8000 series
NGIPSv
Web Analytics
Web analytics provides non-personally-identifiable usage data to Cisco, including but not limited to page
interactions, browser versions, product versions, user location, and management IP addresses or hostnames
of your FMCs.
You are enrolled by default but you can change your enrollment at any time after you complete initial setup.
Note that ad blockers can block web analytics, so if you choose to remain enrolled, please disable ad blocking
for the hostnames/IP addresses of your Cisco appliances.
For Assistance
Upgrade Guides
In management center deployments, the management center must run the same or newer version as its managed
devices. Upgrade the management center first, then devices. Note that you always want to use the upgrade
guide for the version of management center or device manager that you are currently running—not your target
version.
Threat defense with management Management center version you are https://www.cisco.com/go/
center currently running. ftd-fmc-upgrade
Threat defense with device Threat defense version you are https://www.cisco.com/go/
manager currently running. ftd-fdm-upgrade
Install Guides
If you cannot or do not want to upgrade, you can freshly install major and maintenance releases. This is also
called reimaging. You cannot reimage to a patch. Install the appropriate major or maintenance release, then
apply the patch. If you are reimaging to an earlier threat defense version on an FXOS device, perform a full
reimage—even for devices where the operating system and software are bundled.
Threat defense virtual Getting started guide for your threat https://www.cisco.com/go/
defense virtual version. ftdv-quick
FXOS for the Firepower 4100/9300 Configuration guide for your FXOS https://www.cisco.com/go/
version, in the Image Management firepower9300-config
chapter.
FXOS for the Firepower 1000/2100 Troubleshooting guide, in the Cisco FXOS Troubleshooting
and Secure Firewall 3100 Reimage Procedures chapter. Guide for the Firepower 1000/2100
and Secure Firewall 3100/4200
with Firepower Threat Defense
Access to most tools on the Cisco Support & Download site requires a Cisco.com user ID and password.
Contact Cisco
If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
• Email Cisco TAC: [email protected]
• Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
• Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts
FMC Platforms
The FMC provides a centralized firewall management console. For device compatibility with the FMC, see
Device Management, on page 11. For general compatibility information, see the Cisco Secure Firewall
Management Center Compatibility Guide.
FMC Hardware
Version 6.4 supports the following FMC hardware:
• Firepower Management Center 1600, 2600, 4600
• Firepower Management Center 1000, 2500, 4500
• Firepower Management Center 2000, 4000
• Firepower Management Center 750, 1500, 3500 (high availability not supported for FMC 750)
You should also keep the BIOS and RAID controller firmware up to date; see the Cisco Secure Firewall Threat
Defense/Firepower Hotfix Release Notes.
FMCv
Version 6.4 supports FMCv deployments in both public and private clouds.
With the FMCv, you can purchase a license to manage 2, 10, or 25 devices. Some versions and platforms
support 300 devices. For full details on supported instances, see the Cisco Secure Firewall Management Center
Virtual Getting Started Guide.
2, 10, 25 300
Public Cloud
Private Cloud
Device Platforms
Firepower devices monitor network traffic and decide whether to allow or block specific traffic based on a
defined set of security rules. For details on device management methods, see Device Management, on page
11. For general compatibility information, see the Cisco Secure Firewall Threat Defense Compatibility Guide
or the Cisco Firepower Classic Device Compatibility Guide.
FTD Hardware
Version 6.4 FTD hardware comes in a range of throughputs, scalability capabilities, and form factors.
FTDv
Version 6.4 supports the following FTDv implementations. For information on supported instances, throughputs,
and other hosting requirements, see the Cisco Secure Firewall Threat Defense Virtual Getting Started Guide.
Public Cloud
Private Cloud
ASA 5508-X, 5516-X YES Requires ASDM Requires ASA 9.5(2) to 9.16(x).
7.12(1).
May require a ROMMON update. See
the Cisco Secure Firewall ASA and
Secure Firewall Threat Defense Reimage
Guide.
ASA 5525-X, 5545-X, YES Requires ASDM Requires ASA 9.5(2) to 9.14(x).
5555-X 7.12(1).
Device Management
Depending on device model and version, we support the following management methods.
FMC
All devices support remote management with FMC, which must run the same or newer version as its managed
devices. This means:
• You can manage older devices with a newer FMC, usually a few major versions back. However, we
recommend you always update your entire deployment. New features and resolved issues often require
the latest release on both the FMC and its managed devices.
• You cannot upgrade a device past the FMC. Even for maintenance (third-digit) releases, you must upgrade
the FMC first.
Note that in most cases you can upgrade an older device directly to the FMC's major version. However,
sometimes you can manage an older device that you cannot directly upgrade, even though the target version
is supported on the device. For release-specific requirements, see Minimum Version to Upgrade, on page 32.
7.4 7.0
7.3 6.7
7.2 6.6
7.1 6.5
7.0 6.4
6.7 6.3
6.6 6.2.3
6.5 6.2.3
6.4 6.1
6.3 6.1
6.2.3 6.1
6.2.2 6.1
6.2.1 6.1
6.2 6.1
6.1 5.4.0.2/5.4.1.1
6.0.1 5.4.0.2/5.4.1.1
6.0 5.4.0.2/5.4.1.1
FDM
You can use FDM to locally manage a single FTD device.
Optionally, add Cisco Defense Orchestrator (CDO) to remotely manage multiple FTD devices, as an alternative
to the FMC. Although some configurations still require FDM, CDO allows you to establish and maintain
consistent security policies across your FTD deployment.
ASDM
You can use ASDM to locally manage a single ASA FirePOWER module, which is a separate application on
an ASA device. Traffic is sent to the module after ASA firewall policies are applied. Newer versions of ASDM
can manage newer ASA FirePOWER modules.
Upgrade Impact
A feature has upgrade impact if upgrading and deploying can cause the system to process traffic or otherwise
act differently without any other action on your part; this is especially common with new threat detection and
application identification capabilities. A feature can also have upgrade impact if upgrading requires that you
take action before or after upgrade; for example, if you must change a configuration.
Snort
Snort 3 is the default inspection engine for FTD starting in Version 6.7 (with FDM) and Version 7.0 (with
FMC). Snort 3 features for FMC deployments also apply to FDM, even if they are not listed as new FDM
features. However, keep in mind that the FMC may offer more configurable options than FDM.
Important If you are still using the Snort 2 inspection engine, switch to Snort 3 now for improved detection and
performance. Snort 2 will be deprecated in a future release and will eventually prevent threat defense upgrade.
FlexConfig
Upgrades can add web interface or Smart CLI support for features that previously required FlexConfig. The
upgrade does not convert FlexConfigs. After upgrade, configure the newly supported features in the web
interface or Smart CLI. When you are satisfied with the new configuration, delete the deprecated FlexConfigs.
The feature descriptions below include information on deprecated FlexConfigs when appropriate. For a full
list of deprecated FlexConfigs, see your configuration guide.
Caution Although you cannot newly assign or create FlexConfig objects using deprecated commands, in most cases
existing FlexConfigs continue to work and you can still deploy. However, sometimes, using deprecated
commands can cause deployment issues.
Feature Details
Version 6.4.0.17 For VDB 363+, the system now installs a smaller VDB (also called VDB lite) on lower memory
devices. This smaller VDB contains the same applications, but fewer detection patterns. Devices
Smaller VDB for lower memory
using the smaller VDB can miss some application identification versus devices using the full VDB.
devices.
Minimum threat defense: Any
Lower memory devices: ASA 5506-X series, ASA-5508-X, 5512-X, 5515-X, 5516-X, 5525-X,
5545-X
Version restrictions: The ability to install a smaller VDB depends on the version of the FMC, not
managed devices. If you upgrade the FMC from a supported version to an unsupported version,
you cannot install VDB 363+ if your deployment includes even one lower memory device. For a
list of affected releases, see CSCwd88641.
Note that this feature is supported for Firepower appliances running Version 6.4.0.10 or any later
patch. It is not supported for upgrades to Version 6.4.0.10, or upgrades that skip Version 6.4.0.10.
This feature is temporarily deprecated in Versions 6.5.0–6.6.1, but returns in Version 6.6.3.
Feature Details
Note that in Version 6.5.0–6.5.0.4, the lifespan-on-renew returns to 3 years, but this is again updated
to 800 days with Version 6.5.0.5 and 6.6.0.
Version 6.4.0.4 These new syslog fields collectively identify a unique connection event:
New syslog fields. • Sensor UUID
• First Packet Time
• Connection Instance ID
• Connection Counter
These fields also appear in syslogs for intrusion, file, and malware events, allowing connection
events to be associated with those events.
Version 6.4.0.2 A new health module, the ISE Connection Status Monitor, monitors the status of the server
connections between the Cisco Identity Services Engine (ISE) and the FMC.
ISE Connection Status Monitor
health module.
Feature Details
Platform
FMC 1600, 2600, and 4600. We introduced the FMC models FMC 1600, 2600, and 4600.
Feature Details
FTD on the Firepower 1010, We introduced the Firepower 1010, 1120, and 1140.
1120, and 1140.
FTD on the Firepower 4115, We introduced the Firepower 4115, 4125, and 4145.
4125, and 4145.
Firepower 9300 SM-40, SM-48, We introduced three new security modules: SM-40, SM-48, and SM-56.
and SM-56 support.
With FXOS 2.6.1, you can mix different types of security modules in the same chassis.
ASA and FTD on the same With FXOS 2.6.1, you can now deploy ASA and FTD logical devices on the same Firepower 9300.
Firepower 9300.
FTDv for VMware defaults to FTDv for VMware now defaults to vmxnet3 interfaces when you create a virtual device. Previously,
vmxnet3 interfaces. the default was e1000. The vmxnet3 device drivers and network processing are integrated with the
ESXi hypervisor, so they use fewer resources and offer better network performance.
Note Version 6.6 ends support for e1000 interfaces. You will not be able to upgrade to
Version 6.6+ until you switch to vmxnet3 or ixgbe interfaces. We recommend you
do this now. For more information, refer to the instructions on adding and configuring
VMware interfaces in the Cisco Secure Firewall Threat Defense Virtual Getting
Started Guide.
Rotating (keychain) You can now use rotating (keychain) authentication when configuring OSPFv2 routing.
authentication for OSPFv2
New/modified pages:
routing.
• Objects > Object Management > Key Chain object
• Devices > Device Management > edit device > Routing tab > OSPF settings > Interface
tab > add/edit interface > Authentication option
• Devices > Device Management > edit device > Routing tab > OSPF settings > Area tab >
add/edit area > Virtual Link sub-tab > add/edit virtual link > Authentication option
Feature Details
RA VPN: Secondary Secondary authentication, also called double authentication, adds an additional layer of security
authentication. to RA VPN connections by using two different authentication servers. With secondary authentication
enabled, AnyConnect VPN users must provide two sets of credentials to log in to the VPN gateway.
RA VPN supports secondary authentication for the AAA Only and Client Certificate and AAA
authentication methods.
New/modified pages: Devices > VPN > Remote Access > add/edit configuration > Connection
Profile > AAA area
Supported platforms: FTD
Site-to-site VPN: Dynamic IP You can now configure site to site VPNs to use a dynamic IP address for extranet endpoints. In
addresses for extranet endpoints. hub-and-spoke deployments, you can use a hub as an extranet endpoint.
New/modified pages: Devices > VPN > Site To Site > add/edit FTD VPN topology > Endpoints
tab > add endpoint > IP Address option
Supported platforms: FTD
Site-to-site VPN: Dynamic You can now use dynamic crypto maps in point-to-point as well as in hub-and-spoke VPN
crypto maps for point-to-point topologies. Dynamic crypto maps are still not supported for full mesh topologies.
topologies.
You specify the crypto map type when you configure a topology. Make sure you also specify a
dynamic IP address for one of the peers in the topology.
New/modified pages: Devices > VPN > Site To Site > add/edit FTD VPN topology > IPsec tab
> Crypto Map Type option
Supported platforms: FTD
Feature Details
Improvements to syslog Fully qualified file and malware event data can now be sent from managed devices via syslog.
messages for file and malware
New/modified pages: Policies > Access Control > Access Control > add/edit policy > Logging
events.
tab > File and Malware Settings area
Supported platforms: Any
Search intrusion events by CVE You can now search for intrusion events generated as a result of a particular CVE exploit.
ID.
New/modified pages: Analysis > Search
Supported platforms: FMC
IntrusionPolicy field is now Intrusion event syslog messages now specify the intrusion policy that triggered the event.
included in syslog.
Supported platforms: Any
Feature Details
Cisco SecureX integration. Cisco SecureX is a cloud offering that helps you rapidly detect, investigate, and respond to threats.
This feature lets you analyze incidents using data aggregated from multiple products, including
Firepower Threat Defense. Note that the FMC web interface refers to this offering as Cisco Threat
Response (CTR).
See the Cisco Secure Firewall Threat Defense and SecureX Integration Guide.
New/modified pages: System > Integration > Cloud Services
Supported platforms: FTD
Splunk integration. Splunk users can use a new, separate Splunk app, Cisco Secure Firewall (f.k.a. Firepower) app for
Splunk, to analyze events. Available functionality is affected by your Firepower version.
See Cisco Secure Firewall App for Splunk User Guide.
Supported platforms: FMC
Cisco Security Analytics and You can send Firepower events to the Stealthwatch Cloud for storage, and optionally make your
Logging (SaaS) integration. Firepower event data available for security analytics using Stealthwatch Cloud.
Using Cisco Security Analytics and Logging (SaaS), also known as SAL (SaaS), your Firepower
devices send events as syslog messages to a Security Events Connector (SEC) installed on a virtual
machine on your network, and this SEC forwards the events to the Stealthwatch cloud for storage.
You view and work with your events using the web-based Cisco Defense Orchestrator (CDO)
portal. Depending on the license you purchase, you can also use the Stealthwatch portal to access
that product's analytics features.
See Cisco Secure Firewall Management Center and Cisco Security Analytics and Logging (SaaS)
Integration Guide.
Supported platforms: FTD with FMC
New licensing capabilities for For ASA FirePOWER and FTD deployments, the ISA 3000 now supports URL Filtering and
ISA 3000. Malware licenses and their associated features.
For FTD only, the ISA 3000 also now supports Specific License Reservation for approved customers.
Supported platforms: ISA 3000
Scheduled remote backups of You can now use the FMC to schedule remote backups of certain managed devices. Previously,
managed devices. only Firepower 7000/8000 series devices supported scheduled backups, and you had to use the
device's local GUI.
New/modified pages: System > Tools > Scheduling > add/edit task > choose Job Type: Backup
> choose a Backup Type
Supported platforms: FTD physical platforms, FTDv for VMware, Firepower 7000/8000 series
Exceptions: No support for FTD clustered devices or container instances
Feature Details
Ability to disable Duplicate When you enable IPv6, you can disable DAD. You might want to disable DAD because using
Address Detection (DAD) on DAD opens up the possibility of denial of service attacks. If you disable this setting, you need
management interfaces. check manually that this interface is not using an already-assigned address.
New/modified pages: System > Configuration > Management Interfaces > Interfaces area >
edit interface > IPv6 DAD check box
Supported platforms: FMC, Firepower 7000/8000 series
Ability to disable ICMPv6 Echo When you enable IPv6, you can now disable ICMPv6 Echo Reply and Destination Unreachable
Reply and Destination messages. You might want to disable these packets to guard against potential denial of service
Unreachable messages on attacks. Disabling Echo Reply packets means you cannot use IPv6 ping to the device management
management interfaces. interfaces for testing purposes.
New/modified pages: System > Configuration > Management Interfaces > ICMPv6
New/modified commands:
• configure network ipv6 destination-unreachable
• configure network ipv6 echo-reply
Supported platforms: FMC (web interface only), managed devices (CLI only)
Support for the Service-Type For RADIUS authentication of FTD CLI users, you used to have to predefine the usernames in the
attribute for FTD users defined RADIUS external authentication object and manually make sure that the list matched usernames
on the RADIUS server. defined on the RADIUS server. You can now define CLI users on the RADIUS server using the
Service-Type attribute and also define both Basic and Config user roles. To use this method, be
sure to leave the shell access filter blank in the external authentication object.
New/modified pages: System > Users > External Authentication tab > add/edit external
authentication object > Shell Access Filter
Supported platforms: FTD
View object use. The object manager now allows you to see the policies, settings, and other objects where a network,
port, VLAN, or URL object is used.
New/modified pages: Objects > Object Management > choose object type > Find Usage
(binoculars) icon
Supported platforms: FMC
Feature Details
Hit counts for access control and You can now access hit counts for access control and prefilter rules on your FTD devices.
prefilter rules.
New/modified pages:
• Policies > Access Control > Access Control > add/edit policy > Analyze Hit Counts
• Policies > Access Control > Prefilter > add/edit policy > Analyze Hit Counts
New commands:
• show rule hits
• clear rule hits
• cluster exec show rule hits
• cluster exec clear rule hits
• show cluster rule hits
URL Filtering health monitor You can now configure time thresholds for URL Filtering Monitor alerts.
improvements.
New/modified pages: System > Health > Policy > add/edit policy > URL Filtering Monitor
Supported platforms: Any
New Cisco Success Network Added the following Cisco Success Network monitoring capabilities:
monitoring capabilities
• CSPA (Cisco Security Packet Analyzer) query information
• Contextual cross-launch instances enabled on the FMC
• TLS/SSL inspection events
• Snort restarts
Feature Details
Signed SRU, VDB, and GeoDB So Firepower can verify that you are using the correct update files, Version 6.4.0+ uses signed
updates. updates for intrusion rules (SRU), the vulnerability database (VDB), and the geolocation database
(GeoDB). Earlier versions continue to use unsigned updates. Unless you manually download
updates from Cosco—for example, in an air-gapped deployment—you should not notice any
difference in functionality.
If, however, you do manually download and install SRU, VDB, and GeoDB updates, make sure
you download the correct package for your current version. Signed update files for Version 6.4.0+
begin with 'Cisco' instead of 'Sourcefire,' and terminate in .sh.REL.tar instead of .sh:
• SRU: Cisco_Firepower_SRU-date-build-vrt.sh.REL.tar
• VDB: Cisco_VDB_Fingerprint_Database-4.5.0-version.sh.REL.tar
• GeoDB: Cisco_GEODB_Update-date-build.sh.REL.tar
Update files for Version 5.x through 6.3 still use the old naming scheme:
• SRU: Sourcefire_Rule_Update-date-build-vrt.sh
• VDB: Sourcefire_VDB_Fingerprint_Database-4.5.0-version.sh
• GeoDB: Sourcefire_Geodb_Update-date-build.sh
We will provide both signed and unsigned updates until the end-of-support for versions that require
unsigned updates. Do not untar signed (.tar) packages.
Note If you accidentally upload a signed update to an older FMC or ASA FirePOWER
device, you must manually delete it. Leaving the package takes up disk space, and
also may cause issues with future upgrades.
SNMPv3 users can authenticate SNMPv3 users can now authenticate using a SHA-256 algorithm.
using a SHA-256 authorization
New/modified screen: Devices > Platform Settings > SNMP > Users > Auth Algorithm Type
algorithm.
Supported platforms: Firepower Threat Defense
Feature Details
Snort restart improvements. Before Version 6.4.0, during Snort restarts, the system dropped encrypted connections that matched
a 'Do not decrypt' SSL rule or default policy action. Now, routed/transparent traffic passes without
inspection instead of dropping, as long as you did not disable large flow offload or Snort
preserve-connection.
Supported platforms: Firepower 4100/9300
For more information, see the Cisco Secure Firewall Threat Defense Command Reference. To
troubleshoot issues with egress optimization, contact Cisco TAC.
Note To mitigate CSCvq34340, patching FTD device to Version 6.4.0.7+ turns off egress
optimization processing. This happens regardless of whether the egress optimization
feature is enabled or disabled. We recommend you upgrade to Version 6.6+, where
this issue is fixed. That will turn egress optimization back on, if you left the feature
'enabled.' If you remain at Version 6.4.0–6.4.0.6, you should manually disable egress
optimization from the FTD CLI: no asp inspect-dp egress-optimization.
For more information, see the software advisory: FTD traffic outage due to 9344
block size depletion caused by the egress optimization feature.
Faster SNMP event logging. Performance improvements when sending intrusion and connection events to an external SNMP
trap server.
Supported platforms: Any
Feature Details
New REST API capabilities. Added REST API objects to support Version 6.4.0 features:
• cloudeventsconfigs: Manage SecureX integration.
• ftddevicecluster: Manage chassis clustering.
• hitcounts: Manage hit count statistics for access control and prefilter rules.
• keychain: Manage key chain objects used for rotating authentication when configuring OSPFv2
routing.
• loggingsettings: Manage logging settings for access control policies
API Explorer based on OAS. Version 6.4.0 uses a new API Explorer, based on the OpenAPI Specification (OAS). As part of
the OAS, you now use CodeGen to generate sample code. You can still access the legacy API
Explorer if you prefer.
Supported platforms: FMC
Deprecated Features
Deprecated: SSL hardware As part of the TLS crypto acceleration feature, we removed the following FTD CLI commands:
acceleration FTD CLI
• system support ssl-hw-accel enable
commands.
• system support ssl-hw-accel disable
• system support ssl-hw-status
Deprecated: Geolocation details. In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses
to countries/continents, and an IP package that contains additional contextual data associated with
routable IP addresses. The contextual data in the IP package can include additional location details,
as well as connection information such as ISP, connection type, proxy type, domain name, and so
on.
The new country code package has the same file name as the old all-in-one package:
Cisco_GEODB_Update-date-build. This allows deployments running Version 7.1 and earlier to
continue to obtain GeoDB updates. If you manually download GeoDB updates—for example, in
an air-gapped deployment—make sure you get the country code package and not the IP package.
Important This split does not affect geolocation rules or traffic handling in any way—those rules
rely only on the data in the country code package. However, because the country code
package essentially replaces the all-in-one package, the contextual data is no longer
updated and will grow stale. To obtain fresh data, upgrade or reimage the FMC to
Version 7.2+ and update the GeoDB.
Feature Description
Firepower 1000 series device configuration. You can configure Firepower Threat Defense on Firepower 1000 series devices using
FDM.
Note that you can configure and use the Power over Ethernet (PoE) ports as regular
Ethernet ports, but you cannot enable or configure any PoE-related properties.
Hardware bypass for the ISA 3000. You can now configure hardware bypass for the ISA 3000 on the Device > Interfaces
page. In release 6.3, you needed to configure hardware bypass using FlexConfig. If you
are using FlexConfig, please redo the configuring on the Interfaces page and remove
the hardware bypass commands from FlexConfig. However, the portion of the FlexConfig
devoted to disabling TCP sequence number randomization is still recommended.
Ability to reboot and shut down the system You can now issue the reboot and shutdown commands through the CLI Console in
from the FDM CLI Console. FDM. Previously, you needed to open a separate SSH session to the device to reboot
or shut down the system. You must have Administrator privileges to use these commands.
External Authentication and Authorization You can use an external RADIUS server to authenticate and authorize users logging
using RADIUS for Firepower Threat into the Firepower Threat Defense CLI. You can give external users config
Defense CLI Users. (administrator) or basic (read-only) access.
We added the SSH configuration to the AAA Configuration tab on the Device > System
Settings > Management Access page.
Support for network range objects and You can now create network objects that specify a range of IPv4 or IPv6 addresses, and
nested network group objects. network group objects that include other network groups (that is, nested groups).
We modified the network object and network group object Add/Edit dialog boxes to
include these features, and modified the various security policies to allow the use of
these objects, contingent on whether address specifications of that type make sense
within the context of the policy.
Full-text search options for objects and You can do a full-text search on objects and rules. By searching a policy or object list
rules. that has a large number of items, you can find all items that include your search string
anywhere within the rule or object.
We added a search box to all policies that have rules, and to all pages on the Objects
list. In addition, you can use the filter=fts~search-string option on GET calls for
supported objects in the API to retrieve items based on a full-text search.
Obtaining a list of supported API versions You can use the GET /api/versions (ApiVersions) method to get a list of the API versions
for an FDM-managed Firepower Threat that are supported on a device. You can use your API client to communicate and
Defense device. configure the device using commands and syntax valid for any of the supported versions.
Feature Description
Hit counts for access control rules. You can now view hit counts for access control rules. The hit counts indicate how often
connections matched the rule.
We updated the access control policy to include hit count information. In the Firepower
Threat Defense API, we added the HitCounts resource and the includeHitCounts and
filter=fetchZeroHitCounts options to the GET Access Policy Rules resource.
Site-to-Site VPN enhancements for You can now configure site-to-site VPN connections to use certificates instead of
dynamic addressing and certificate preshared keys to authenticate the peers. You can also configure connections where the
authentication. remote peer has an unknown (dynamic) IP address. We added options to the Site-to-Site
VPN wizard and the IKEv1 policy object.
Support for RADIUS servers and Change You can now use RADIUS servers for authenticating, authorizing, and accounting
of Authorization in remote access VPN. remote access VPN (RA VPN) users. You can also configure Change of Authentication
(CoA), also known as dynamic authorization, to alter a user’s authorization after
authentication when you use a Cisco ISE RADIUS server.
We added attributes to the RADIUS server and server group objects, and made it possible
to select a RADIUS server group within an RA VPN connection profile.
Multiple connection profiles and group You can configure more than one connection profile, and create group policies to use
policies for remote access VPN. with the profiles.
We changed the Device > Remote Access VPN page to have separate pages for
connection profiles and group policies, and updated the RA VPN Connection wizard
to allow the selection of group policies. Some items that were previously configured in
the wizard are now configured in the group policy.
Support for certificate-based, second You can use certificates for user authentication, and configure secondary authentication
authentication source, and two-factor sources so that users must authenticate twice before establishing a connection. You can
authentication in remote access VPN. also configure two-factor authentication using RSA tokens or Duo passcodes as the
second factor.
We updated the RA VPN Connection wizard to support the configuration of these
additional options.
Support for IP address pools with multiple You can now configure address pools that have more than one address range by selecting
address ranges, and DHCP address pools, multiple network objects that specify subnets. In addition, you can configure address
for remote access VPN. pools in a DHCP server and use the server to provide addresses to RA VPN clients. If
you use RADIUS for authorization, you can alternatively configure the address pools
in the RADIUS server.
We updated the RA VPN Connection wizard to support the configuration of these
additional options. You can optionally configure the address pool in the group policy
instead of the connection profile.
Feature Description
Active Directory realm enhancements. You can now include up to 10 redundant Active Directory (AD) servers in a single
realm. You can also create multiple realms and delete realms that you no longer need.
In addition, the limit for downloading users in a realm is increased to 50,000 from the
2,000 limit in previous releases.
We updated the Objects > Identity Sources page to support multiple realms and servers.
You can select the realm in the user criteria of access control and SSL decryption rules,
to apply the rule to all users within the realm. You can also select the realm in identity
rules and RA VPN connection profiles.
Redundancy support for ISE servers. When you configure Cisco Identity Services Engine (ISE) as an identity source for
passive authentication, you can now configure a secondary ISE server if you have an
ISE high availability setup.
We added an attribute for the secondary server to the ISE identity object.
File/malware events sent to external syslog You can now configure an external syslog server to receive file/malware events, which
servers. are generated by file policies configured on access control rules. File events use message
ID 430004, malware events are 430005.
We added the File/Malware syslog server options to the Device > System Settings >
Logging Settings page.
Logging to the internal buffer and support You can now configure the internal buffer as a destination for system logging. In addition,
for custom event log filters. you can create event log filters to customize which messages are generated for the syslog
server and internal buffer logging destinations.
We added the Event Log Filter object to the Objects page, and the ability to use the
object on the Device > System Settings > Logging Settings page. The internal buffer
options were also added to the Logging Settings page.
Certificate for the FDM Web Server. You can now configure the certificate that is used for HTTPS connections to the FDM
configuration interface. By uploading a certificate your web browsers already trust, you
can avoid the Untrusted Authority message you get when using the default internal
certificate. We added the Device > System Settings > Management Access >
Management Web Server page.
Cisco Threat Response support. You can configure the system to send intrusion events to the Cisco Threat Response
cloud-based application. You can use Cisco Threat Response to analyze intrusions.
We added Cisco Threat Response to the Device > System Settings > Cloud Services
page.
Feature Description
Manually upload VDB, GeoDB, and SRU You can now manually retrieve update packages for VDB, Geolocation Database, and
updates. Intrusion Rules, and then upload them from your workstation to the FTD device using
FDM. For example, if you have an air-gapped network, where FDM cannot retrieve
updates from the Cisco Cloud, you can now get the update packages you need.
We updated the Device > Updates page to allow you to select and upload a file from
your workstation.
Minimum FTD: 6.4.0.10.
Version restrictions: This feature is not available in Version 6.5. Support returns in
Version 6.6.
Smaller VDB for lower memory devices For VDB 363+, the system now installs a smaller VDB (also called VDB lite) on lower
devices. memory devices. This smaller VDB contains the same applications, but fewer detection
patterns. Devices using the smaller VDB can miss some application identification versus
devices using the full VDB.
Minimum FTD: 6.4.0.17
Lower memory devices: ASA-5508-X, ASA-5515-X, ASA-5516-X, ASA-5525-X,
ASA-5545-X
Version restrictions: The smaller VDB is not supported in all versions. If you upgrade
from a supported version to an unsupported version, you cannot install VDB 363+ on
lower memory devices. For a list of affected releases, see CSCwd88641.
Universal Permanent License Reservation If you have an air-gapped network, where there is no path to the internet, you cannot
(PLR) mode. register directly with the Cisco Smart Software Manager (CSSM) for Smart Licensing.
In this situation, you can now get authorization to use Universal Permanent License
Reservation (PLR) mode, where you can apply a license that does not need direct
communication with CSSM. If you have an air-gapped network, please contact your
account representative and ask for authorization to use Universal PLR mode in your
CSSM account, and to obtain the necessary licenses.
We added the ability to switch to PLR mode, and to cancel and unregister a Universal
PLR license, to the Device > Smart License page. In the FTD API, there are new
resources for PLRAuthorizationCode, PLRCode, PLRReleaseCode, PLRRequestCode,
and actions for PLRRequestCode, InstallPLRCode, and CancelReservation.
Minimum FTD: 6.4.0.10. This feature is temporarily deprecated in Version 6.5 and
returns in Version 6.6. If you are running Version 6.4.0.10 or later patch, we recommend
you upgrade directly to Version 6.6+.
Feature Description
New syslog fields. These new syslog fields collectively identify a unique connection event:
• Sensor UUID
• First Packet Time
• Connection Instance ID
• Connection Counter
These fields also appear in syslogs for intrusion, file, and malware events, allowing
connection events to be associated with those events.
Minimum FTD: 6.4.0.4
FTD REST API version 3 (v3). The Firepower Threat Defense REST API for software version 6.4 has been incremented
to version 3. You must replace v1/v2 in the API URLs with v3. The v3 API includes
many new resources that cover all features added in software version 6.4. Please
re-evaluate all existing calls, as changes might have been mode to the resource models
you are using. To open the API Explorer, where you can view the resources, change
the end of the FDM URL to /#/api-explorer after logging in.
FMC 6.1
NGIPSv 6.1
Table 14: Upgrade Guidelines for FTD with FMC Version 6.4
ALWAYS CHECK
Bugs, on page 57, for bugs that have Any Any Any
upgrade impact. Check all versions of
the release notes between your current
and target version.
Upgrade Failure: Insufficient Disk Space Firepower 6.3.0 through 6.3.0.1 through
on Container Instances, on page 37 4100/9300 6.4.0.x 6.5.0
Remove Site IDs from Version 6.1.x FTD clusters 6.1.0.x 6.2.3+
Firepower Threat Defense Clusters
Before Upgrade, on page 41
Table 15: Upgrade Guidelines for FTD with FDM Version 6.4
ALWAYS CHECK
Bugs, on page 57, for bugs that have Any Any Any
upgrade impact. Check all versions of
the release notes between your current
and target version.
Upgrading to Version 6.4.0: If you are using the multi-instance capability of the Firepower 4100/9300 chassis,
you can use the FXOS CLI to enable TLS crypto acceleration for one container instance per module/security
engine. Acceleration is disabled for other container instances, but enabled for native instances.
Upgrading to Version 6.5.0+: If you are using the multi-instance capability of the Firepower 4100/9300
chassis, you can use the FXOS CLI to enable TLS crypto acceleration for multiple container instances (up to
16) on a Firepower 4100/9300 chassis. New instances have this feature enabled by default. However, the
upgrade does not enable acceleration on existing instances. Instead, use the config hwCrypto enable CLI
command.
Note This change causes issues with reimaging older physical appliances: DC750, 1500, 2000, 3500, and 4000, as
well as 7000/8000 series devices and AMP models. If you are currently running Version 5.x and need to
freshly install Version 6.3.0 or 6.4.0 on one of these appliances, rename the installation package to the "old"
name after you download it from the Cisco Support & Download site.
Valid Invalid
Include: 10.0.0.0/8 Include: 10.1.0.0/16
Exclude: 10.1.0.0/16 Exclude: 172.16.0.0/12
Exclude: 10.0.0.0/8
Before Version 6.3.0, you could successfully save a network variable with this type of invalid configuration.
Now, these configurations block deploy with the error: Variable set has invalid excluded
values.
If this happens, identify and edit the incorrectly configured variable set, then redeploy. Note that you may
have to edit network objects and groups referenced by your variable set.
Remove Site IDs from Version 6.1.x Firepower Threat Defense Clusters Before
Upgrade
Deployments: Firepower Threat Defense clusters
Upgrading from: Version 6.1.x
Directly to: Version 6.2.3 through 6.4.0
Firepower Threat Defense Version 6.1.x clusters do not support inter-site clustering (you can configure
inter-site features using FlexConfig starting in Version 6.2.0).
If you deployed or redeployed a Version 6.1.x cluster in FXOS 2.1.1, and you entered a value for the
(unsupported) site ID, remove the site ID (set to 0) on each unit in FXOS before you upgrade. Otherwise, the
units cannot rejoin the cluster after the upgrade.
If you already upgraded, remove the site ID from each unit, then reestablish the cluster. To view or change
the site ID, see the Cisco FXOS CLI Configuration Guide.
Note Upgrades from 6.2.3 and 6.2.3.1 directly to 6.2.3.2 through 6.2.3.5 are also affected.
Upgrading FTD with FDM may unregister the device from the Cisco Smart Software Manager. After the
upgrade completes, check your license status.
Step 1 Click Device, then click View Configuration in the Smart License summary.
Step 2 If the device is not registered, click Register Device.
We recommend you review your configurations before you upgrade. From the Version 6.1.x FMC web
interface, view your policies' Latency-Based Performance Settings as described earlier, and see whether the
Revert to Defaults button is dimmed. If the button is dimmed, you are using the default settings. If it is active,
you have configured custom settings.
Note that Snort Fail Open requires Version 6.2 on the device. If you are managing a Version 6.1.x device, the
FMC web interface displays the Failsafe option.
Guideline Details
FXOS upgrades. FXOS 2.6.1.157+ is required to run threat defense Version 6.4 on the Firepower
4100/9300.
You can upgrade to any later FXOS version from as far back as FXOS 2.2.2. For
critical and release-specific upgrade guidelines, new and deprecated features,
and open and resolved bugs, see the Cisco Firepower 4100/9300 FXOS Release
Notes.
Firmware upgrades. FXOS 2.14.1+ upgrades include firmware. If you are upgrading to an earlier
FXOS version, see the Cisco Firepower 4100/9300 FXOS Firmware Upgrade
Guide.
Time to upgrade. Chassis upgrade can take up to 45 minutes and can affect traffic flow and
inspection. For more information, see Traffic Flow and Inspection for Chassis
Upgrades, on page 46.
Unresponsive Upgrades
Do not make or deploy configuration changes during upgrade. Even if the system appears inactive, do not
manually reboot or shut down during upgrade. You could place the system in an unusable state and require
a reimage. If you encounter issues with the upgrade, including a failed upgrade or unresponsive appliance,
contact Cisco TAC.
Uninstall a Patch
In FMC and ASDM deployments, you can uninstall most patches. If you need to return to an earlier major
release, you must reimage. For guidelines, limitations, and procedures, see Uninstall a Patch in the FMC
upgrade guide or Uninstall ASA FirePOWER Patches with ASDM, on page 44 in these release notes.
Table 21: Uninstall Order for ASA with FirePOWER Services in ASA Failover Pairs/Clusters
ASA active/active failover Make both failover groups active on the unit you are not uninstalling.
pair, with ASA
1. Make both failover groups active on the primary ASA device.
FirePOWER
2. Uninstall from the ASA FirePOWER module on the secondary ASA device.
3. Make both failover groups active on the secondary ASA device.
4. Uninstall from the ASA FirePOWER module on the primary ASA device.
ASA cluster, with ASA Disable clustering on each unit before you uninstall. Uninstall from one unit at
FirePOWER a time, leaving the control unit for last.
1. On a data unit, disable clustering.
2. Uninstall from the ASA FirePOWER module on that unit.
3. Reenable clustering. Wait for the unit to rejoin the cluster.
4. Repeat for each data unit.
5. On the control unit, disable clustering. Wait for a new control unit to take
over.
6. Uninstall from the ASA FirePOWER module on the former control unit.
7. Reenable clustering.
Caution Do not make or deploy configuration changes during uninstall. Even if the system appears inactive, do not
manually reboot, shut down, or restart an uninstall in progress. You could place the system in an unusable
state and require a reimage. If you encounter issues with the uninstall, including a failed uninstall or
unresponsive appliance, contact Cisco TAC.
Step 1 If the device's configurations are out of date, deploy now from ASDM.
Deploying before you uninstall reduces the chance of failure. Make sure the deployment and other essential tasks are
completed. Tasks running when the uninstall begins are stopped, become failed tasks, and cannot be resumed. You can
manually delete failed status messages later.
Step 2 Access the Firepower CLI on the ASA FirePOWER module. Log in as admin or another Firepower CLI user with
configuration access.
You can either SSH to the module's management interface (hostname or IP address) or use the console. Note that the
console port defaults to the ASA CLI and you must use the session sfr command to access the Firepower CLI.
Step 5 Run the uninstall command, entering your password when prompted.
sudo install_update.pl --detach /var/sf/updates/uninstaller_name
Caution The system does not ask you to confirm. Entering this command starts the uninstall, which includes a device
reboot. Interruptions in traffic flow and inspection during an uninstall are the same as the interruptions that
occur during an upgrade. Make sure you are ready. Note that using the --detach option ensures the uninstall
process is not killed if your SSH session times out, which can leave the device in an unstable state.
What to do next
In ASA failover/cluster deployments, repeat this procedure for each unit in your planned sequence.
Standalone Dropped. —
Dropped until one peer is online. Upgrade FXOS on the active peer before
the standby is finished upgrading.
Dropped until at least one module is online. Upgrade chassis at the same time, so all
modules are down at some point.
Table 23: Traffic Flow and Inspection: Software Upgrades for Standalone Devices
IPS-only interfaces Inline set, hardware bypass force-enabled: Passed without inspection until you either
Bypass: Force disable hardware bypass, or set it back to
standby mode.
Inline set, hardware bypass standby mode: Dropped during the upgrade, while the
Bypass: Standby device is in maintenance mode. Then,
passed without inspection while the device
completes its post-upgrade reboot.
Note Upgrading an inter-chassis cluster from Version 6.2.0, 6.2.0.1, or 6.2.0.2 causes a 2-3 second traffic interruption
in traffic inspection when each module is removed from the cluster. Upgrading high availability or clustered
devices from Version 6.0.1 through 6.2.2.x may have additional upgrade path requirements; see the upgrade
path information in the planning chapter of the Cisco Firepower Management Center Upgrade Guide, Version
6.0–7.0.
IPS-only interfaces Inline set, Failsafe enabled or disabled. Passed without inspection.
A few packets might drop if Failsafe is
disabled and Snort is busy but not down.
Monitor only (sfr {fail-close}|{fail-open} Egress packet immediately, copy not inspected
monitor-only)
Inline Dropped.
Caution Do not make or deploy configuration changes during upgrade. Even if the system appears inactive, do not
manually reboot or shut down. In most cases, do not restart an upgrade in progress. You could place the system
in an unusable state and require a reimage. If you encounter issues with the upgrade, including a failed upgrade
or unresponsive appliance, you can find troubleshooting information in the upgrade guide:
https://www.cisco.com/go/ftd-upgrade. If you continue to have issues, contact Cisco TAC.
Consideration Details
High availability and In a high availability or clustered configuration, devices upgrade one at a time
clustering to preserve continuity of operations, with each device operating in maintenance
mode while it upgrades. Upgrading a device pair or entire cluster, therefore, takes
longer than upgrading a standalone device.
Configurations Upgrade time can increase with the complexity of your configurations, size of
event databases, and whether/how they are affected by the upgrade. For example,
if you use a lot of access control rules and the upgrade needs to make a backend
change to how those rules are stored, the upgrade can take longer.
Components You may need additional time to perform operating system or virtual hosting
upgrades, upgrade package transfers, readiness checks, VDB and intrusion rule
(SRU/LSP) updates, configuration deployment, and other related tasks.
Platform Command
Management center Choose System ( ) > Monitoring > Statistics and select the FMC.
Under Disk Usage, expand the By Partition details.
Threat defense with management Choose System ( ) > Monitoring > Statistics and select the device
center you want to check.
Under Disk Usage, expand the By Partition details.
Threat defense with device Use the show disk CLI command.
manager
Installation Guidelines
These guidelines can prevent common reimage issues, but are not comprehensive. For detailed checklists and
procedures, see the appropriate installation guide.
Backups
Before you reimage, we strongly recommend you back up to a secure remote location and verify transfer
success. Reimaging returns most settings to factory defaults, including the system password. It deletes any
backups left on the appliance.
Note If you want to reimage so that you don't have to upgrade, due to version restrictions you cannot use a backup
to import your old configurations. You must recreate your configurations manually.
Appliance Access
If you do not have physical access to an appliance, reimaging to the current major or maintenance release lets
you keep management network settings. This allows you to connect to the appliance after you reimage to
perform the initial configuration. Note that if you delete network settings or if you reimage to an earlier release,
you must have physical access to the appliance. You cannot use Lights-Out Management (LOM).
For devices, make sure traffic from your location does not have to traverse the device itself to access the
device's management interface. In FMC deployments, you should also able to access the FMC's management
interface without traversing the device.
Table 30: Scenarios for Unregistering from CSSM (Not Restoring from Backup)
Scenario Action
Model migration for the FMC. Unregister manually, before you shut down the source
FMC.
Switch FTD from FMC to FDM. Unregister automatically, by removing the device
from the FMC.
Table 31: Scenarios for Removing Devices from the FMC (Not Restoring from Backup)
Scenario Action
Scenario Action
Switch FTD from FMC to FDM. Remove the one device from management.
Model Details
Firepower 1000 series If you use the erase configuration method to reimage, FXOS may not downgrade
along with the software. This can cause failures, especially in high availability
Firepower 2100 series
deployments. We recommend that you perform full reimages of these devices.
Installation Guides
Table 33: Installation Guides
Platform Guide
FMC
FMC 1600, 2600, 4600 Cisco Firepower Management Center 1600, 2600, and 4600 Getting
Started Guide
FMC 1000, 2500, 4500 Cisco Firepower Management Center 1000, 2500, and 4500 Getting
Started Guide
FMC 750, 1500, 2000, 3500, 4000 Cisco Firepower Management Center 750, 1500, 2000, 3500 and 4000
Getting Started Guide
FMCv Cisco Secure Firewall Management Center Virtual Getting Started Guide
FTD
Platform Guide
Firepower 1000/2100 series Cisco Secure Firewall ASA and Secure Firewall Threat Defense Reimage
Guide
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 and
Secure Firewall 3100/4200 with Firepower Threat Defense
ASA 5500-X series Cisco Secure Firewall ASA and Secure Firewall Threat Defense Reimage
Guide
ISA 3000 Cisco Secure Firewall ASA and Secure Firewall Threat Defense Reimage
Guide
FTDv Cisco Secure Firewall Threat Defense Virtual Getting Started Guide
ASA FirePOWER/NGIPSv
Firepower 7000/8000 series Cisco Firepower 7000 Series Getting Started Guide
Cisco Firepower 8000 Series Getting Started Guide
ASA FirePOWER Cisco Secure Firewall ASA and Secure Firewall Threat Defense Reimage
Guide
ASDM Book 2: Cisco ASA Series Firewall ASDM Configuration Guide
Open Bugs
Open Bugs in Version 6.4.0
Table last updated: 2022-11-02
Bug ID Headline
CSCvo00852 Lina CPU is low and traffic gets lost for FTDv ESXi 12 core and FTDv KVM 12 core
platforms
CSCvo40478 FMC Dashboard is showing incorrect value as FMC latest product updates
CSCvo80725 vFTD 6.4 fails to establish OSPF adjacency due to "ERROR: ip_multicast_ctl failed
to get channel"
Bug ID Headline
CSCvp06568 NAP policy/SSL policy name name unknown in syslog on 6.3 FTD managed by 6.4
FMC
CSCvp21403 Validation: Data Plane - Management Access does not handle RA-VPN port collission
CSCvp25570 Unable to create RAVPN Conn-Profile if group-policy attr and FQDN are edited in
the same wizard flow
CSCvp29817 Fail to update login history when converting TempID to RealID. 1x log per ID, history
lost
CSCvp30194 ASA SFR: seeing "Error importing SFO: Unable to load container" while trying to
import ACP with IPS
CSCvp33797 User with sessions on FMC not properly updated after user info is downloaded from
AD
CSCvp37229 few preprocessors won't be enabled if enable from 'My Changes' layer of Policy Layers
CSCvp45752 If a custom app is added in sub domain, snort doesn't restart on registered devices at
older version
CSCvp47535 Newly Added Application protocol are not able to view under Hosts
CSCvp57096 Upgrade to 6.4.0 may fail due to ids_event_msg_map table having NULL entries in
the msg field
CSCvp59960 Network discovery not working with network groups containing literals - user or Cisco
created.
CSCvq29993 6.4.0-102 2140 w/ SSL policy runs out of 1550 and 9472 blocks. doesn't recover
CSCvq33956 Optimizing memory allocation of deploy process(AQS subgroup) to allow huge policy
deployments
Bug ID Headline
CSCvq78471 Removing a BVI and its DHCP pool simultaneiously causes policy deploy failures
CSCvr01675 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
CSCvr35856 Apache HTTP Server mod_auth_digest Race Condition Access Control Bypas
CSCvs05066 Snort file mempool corruption leads to performance degradation and process failure.
CSCvs24215 Firepower Device Manager (FDM) option to disable SSL rekey is not reflected on the
config
CSCvs56923 SQL client not able to query FMC using external database access
CSCvs82829 Calls fail once anyconnect configuration is added to the site to site VPN tunnel
CSCvs88186 Using same variable names between byte_extract and byte_math accross SIDs breaks
snort validation
CSCvt01763 Application classification is not retried if a flow is marked brute force failed.
CSCvt03557 The time/timezone set on GUI is inconsistent on Virtual firepower management center
CSCvt06666 SFR httpsd process down after upgrade failure from 6.3.0.4 to 6.4
CSCvt16642 FMC not sending some audit messages to remote syslog server
CSCvt16723 log rotation for ngfw-onbox logs NOT happening at expected log size
CSCvt20235 Firepower 4100 series all FTW interfaces link flap at the same time but occur rarely
CSCvt21986 Inconsistent allocation of cores for snort and lina between instances
CSCvt35233 Excessive logging from the daq modules process_snort_verdict verdict blacklist
CSCvt35730 FDM deployment error if 2nd tunnel has overlapping crypto ACL
Bug ID Headline
CSCvt42955 SID 26932 false positive which triggers on QUIC traffic instead of NTP
CSCvt52607 Reduce SSL HW mode flow table memory usage to reduce the probability of Snort
going in D state
CSCvt56923 FTD manual certificate enrollment fails with "&" (ampersand) in Organisation subject
field
CSCvt63407 FP 2k running FTD 6.4.0.7 traceback and reload on process name LINA
CSCvt66136 6.4.0.9 upgrade from 6.4.0 with CC mode causes httpsd.conf to have an incorrect
config
CSCvt67832 FTD Traceback and Reload on Lina thread due to lock contention
CSCvt68131 FTD traceback and reload on thread "IKEv2 Mgd Timer Thread"
CSCvt70854 6.6.0-90: [Firepower 1010] Tomcat restarted during SRU update because of out of
memory
CSCvt72683 NAT policy configuration after NAT policy deployment on FP 8130 is not seen
CSCvt80126 ASA traceback and reload for the CLI "show asp table socket 18421590 det"
CSCvt86906 Stunnel 5.00 through 5.13, when using the redirect option, does not re
CSCvu44697 Firepower 4100/9300 - Fail-to-wire (FTW) EPM ports link flap during show tech
collection
CSCvu56286 FDM - New firewall session getting created after performing HA Failover for traffic
in progress
Bug ID Headline
CSCvu61711 FMC cannot add ACL rule with geolocation because "An internal error occurred."
CSCvu70529 Binary rules (SO rules) are not loaded when snort reloads
CSCvv00254 When would have dropped events are generated some event data is invalid.
Resolved Bugs
Resolved Bugs in New Builds
Sometimes we release updated builds. In most cases, only the latest build for each platform is available on
the Cisco Support & Download site. If you downloaded an earlier build, do not use it.
You cannot upgrade from one build to another for the same software version. If you are already running an
affected build, determine if an upgrade or hotfix would work instead. If not, contact Cisco TAC. See the Cisco
Firepower Hotfix Release Notes for quicklinks to publicly available hotfixes.
Bug ID Headline
CSCvq48086 ASA concatenates syslog event to other syslog event while sending to the syslog server
CSCvv10948 FDM upgrade - There are no visible pending changes on UI -- but upgrade is not
starting
CSCwa82736 FTD/ASA: Reordering of AnyConnect image fails with error Unable to remove/install
image
CSCwc20635 Cisco Firepower Threat Defense ICMPv6 with Snort 2 Denial of Service Vulnerability
CSCwc40352 Lina Netflow sending permited events to Stealthwatch but they are block by snort
afterwards
CSCwc78781 ASA/FTD may traceback and reload during ACL changes linked to PBR config
CSCwd28037 No nameif during traffic causes the device traceback, lina core is generated.
CSCwe28912 FPR 4115- primary unit lost all HA config after ftd HA upgrade
CSCwe86923 In Apache MINA, a specifically crafted, malformed HTTP request may cause
CSCwe87134 ASA/FTD: Traceback and reload due to high rate of SCTP traffic
CSCwe93137 KP - multimode: ASA traceback observed during HA node break and rejoin.
CSCwf47227 Remove Priority-queue command from FTD|| Priority-queue command causes silent
egress packet drops
CSCwf60590 "show route all summary" executed on transparent mode FTD is causing CLISH to
become Sluggish.
CSCwf63872 FTD taking longer than expected to form OSPF adjacencies after a failover switchover
CSCwf64590 Units get kicked out of the cluster randomly due to HB miss | ASA 9.16.3.220
CSCwf69901 FTD: Traceback and reload during OSPF redistribution process execution
CSCwh16301 Incorrect Hit count statistics on ASA Cluster only for Cluster-wide output
Bug ID Headline
CSCwh19897 ASA/FTD Cluster: Reuse of TCP Randomized Sequence number on two different
conns with same 5 tuple
CSCwh41127 ASA/FTD: NAT64 error "overlaps with inside standby interface address" for Standalone
ASA
CSCwh49244 "show aaa-server" command always shows the Average round trip time 0ms.
CSCwh49483 ASA/FTD may traceback and reload while running show inventory
CSCwh53745 ASA: unexpected logs for initiating inbound connection for DNS query response
CSCwh59199 ASA/FTD traceback and reload with IPSec VPN, possibly involving upgrade
CSCwh60604 ASA/FTD may traceback and reload in Thread Name 'lina' while processing DAP data
CSCwh69346 ASA: Traceback and reload when restore configuration using CLI
CSCwi02134 FTD sends multiple replicated NetFlow records for the same flow event
CSCwi31091 OSPF Redistribution route-map with prefix-list not working after upgrade
CSCwi40536 ASA/FTD: Traceback and reload when running show tech and under High Memory
utilization condition
CSCwi98284 Cisco ASA and FTD Software Persistent Local Code Execution Vulnerability
CSCwj10955 Cisco ASA and FTD Software Web Services Denial of Service Vulnerability
Bug ID Headline
CSCvt25221 FTD traceback in Thread Name cli_xml_server when deploying QoS policy
CSCvv24552 ASA/FTD: Traceback and Reload in Thread Name: Route Table Timestamp Update
CSCvx00655 ASA/SFR service card failure due to timeout getting CriticalStatus from PM
CSCvy26511 Tune unmanaged disk alert thresholds for low end platforms
CSCvz41551 FP2100: ASA/FTD with threat-detection statistics may traceback and reload in Thread
Name 'lina'
CSCvz54471 ASA:Failed ASA in HA pair not recovering by itself, after an "HA state progression
failed"
CSCwa04262 Cisco ASA Software SSL VPN Client-Side Request Smuggling Vulnerability via
"/"URI
CSCwa72528 user-name from certificate feature does not work with SER option
CSCwa81427 External Authorization randomly fails on ASAv when using LDAP over SSL
CSCwc03507 No-buffer drops on Internal Data interfaces despite little evidence of CPU hog
CSCwc64923 ASA/FTD may traceback and reload in Thread Name 'lina' ip routing ndbshr
CSCwc67687 ASA HA failover triggers HTTP server restart failure and ASDM outage
CSCwc74841 FMC RSS Feed broken because FeedBurner is no longer active - "Unable to parse
feed"
CSCwc95290 ESP rule missing in vpn-context may cause IPSec traffic drop
Bug ID Headline
CSCwc99242 ISA3000 LACP channel member SFP port suspended after reload
CSCwd19053 ASA/FTD may traceback with large number of network objects deployment using
distribute-list
CSCwd25256 ASA/FTD Transactional Commit may result in mismatched rules and traffic loss
CSCwd26867 Device should not move to Active state once Reboot is triggered
CSCwd31181 Lina traceback and reload - VPN parent channel (SAL) has an invalid underlying
channel
CSCwd33811 Cluster registration is failing because DATA_NODE isn't joining the cluster
CSCwd38774 ASA: Traceback and reload due to clientless webvpn session closure
CSCwd39468 ASA/FTD Traceback and reload when configuring ISAKMP captures on device
CSCwd40260 Serviceability Enhancement - Unable to parse payload are silently drop by ASA/FTD
CSCwd53135 ASA/FTD: Object Group Search Syslog for flows exceeding threshold
CSCwd56254 "show tech-support" generation does not include "show inventory" when run on FTD
CSCwd56296 FTD Lina traceback and reload in Thread Name 'IP Init Thread'
Bug ID Headline
CSCwd61016 ASA: Standby may get stuck in "Sync Config" status upon reboot when there is EEM
is configured
CSCwd63580 FPR2100: Increase in failover convergence time with ASA in Appliance mode
CSCwd63961 AC clients fail to match DAP rules due to attribute value too large
CSCwd69454 Port-channel interfaces of secondary unit are in waiting status after reload
CSCwd74116 S2S Tunnels do not come up due to DH computation failure caused by DSID Leak
CSCwd78624 ASA configured with HA may traceback and reload with multiple input/output error
messages
CSCwd84868 Observing some devcmd failures and checkheaps traceback when flow offload is not
used.
CSCwd85927 Traceback and reload when webvpn users match DAP access-list with 36k elements
CSCwd88641 Deployment changes to push VDB package based on Device model and snort engine
CSCwd89095 Stratix5950 and ISA3000 LACP channel member SFP port suspended after reload
CSCwd93376 Clientless VPN users are unable to download large files through the WebVPN portal
CSCwd94096 Anyconnect users unable to connect when ASA using different authentication and
authorization server
CSCwd95908 ASA/FTD traceback and reload, Thread Name: rtcli async executor process
CSCwd97020 ASA/FTD: External IDP SAML authentication fails with Bad Request message
CSCwe07722 Cluster data unit drops non-VPN traffic with ASP reason "VPN reclassify failure
CSCwe14174 FTD - 'show memory top-usage' providing improper value for memory allocation
CSCwe18974 ASA/FTD may traceback and reload in Thread Name: CTM Daemon
CSCwe20043 256-byte memory block gets depleted on start if jumbo frame is enabled with FTD on
ASA5516
Bug ID Headline
CSCwe21187 ASA/FTD may drop multicast packets due to no-mcast-intrf ASP drop reason until
UDP timeout expires
CSCwe21280 Multicast connection built or teardown syslog messages may not always be generated
CSCwe29583 ASA/FTD may traceback and reload in Thread Name 'None' at lua_getinfo
CSCwe36176 ASA/FTD: High failover delay with large number of (sub)interfaces and http server
enabled
CSCwe40463 Stale IKEv2 SA formed during simultaneous IKE SA handling when missing delete
from the peer
CSCwe42061 Deleting a BVI in FTD interfaces is causing packet drops in other BVIs
CSCwe45779 ASA/FTD drops traffic to BVI if floating conn is not default value due to no valid
adjacency
CSCwe61928 PIM register packets are not sent to RP after a reload if FTD uses a default gateway
to reach the RP
CSCwe61969 ASA Multicontext 'management-only' interface attribute not synced during creation
CSCwe63067 ASA/FTD may traceback and reload in Thread Name 'lina' due to due to tcp intercept
stat
CSCwe63232 ASA/FTD: Ensure flow-offload states within cluster are the same
CSCwe64563 The command "neighbor x.x.x.x ha-mode graceful-restart" removed when deleting
any created context
CSCwe65634 ASA - Standby device may traceback and reload during synchronization of ACL DAP
CSCwe67751 Last fragment from SIP IPv6 packets has MF equal to 1, flagging that more packets
are expected
Bug ID Headline
CSCwe67816 ASA / FTD Traceback and reload when removing isakmp capture
CSCwe74328 AnyConnect - mobile devices are not able to connect when hostscan is enabled
CSCwe80278 Dynamic interface NAT rules cause SSH/ICMP to fail with nat-no-xlate-to-pat-pool
in ASA cluster
CSCwe85432 ASA/FTD traceback and reload on thread DATAPATH-14-11344 when SIP inspection
is enabled
CSCwe86225 ASA/FTD traceback and reload due citing thread name: cli_xml_server in tm_job_add
CSCwe89030 Serial number attribute from the subject DN of certificate should be taken as the
username
CSCwe90720 ASA Traceback and reload in parse thread due ha_msg corruption
CSCwe92905 ngfwManager process continuously restarting leading to ZMQ Out of Memory traceback
CSCwe93489 Threat-detection does not recognize exception objects with a prefix in IPv6
CSCwf06818 Cisco Firepower Threat Defense Software Encrypted Archive File Policy Bypass
Vulnerability
CSCwf14811 TCP normalizer needs stats that show actions like packet drops
CSCwf17042 ASDM replaces custom policy-map with default map on class inspect options at backup
restore.
CSCwf20338 ASA may traceback and reload in Thread Name 'DHCPv6 Relay'
CSCwf22005 ASA Packet-tracer displays the first ACL rule always, though matches the right ACL
CSCwf23564 Unable to establish BGP when using MD5 authentication over GRE TUNNEL and
FTD as passthrough device
CSCwf33574 ASA access-list entries have the same hash after upgrade
Bug ID Headline
CSCwf42144 ASA/FTD may traceback and reload citing process name "lina"
CSCwf49573 ASA/FTD: Traceback and reload when issuing 'show memory webvpn all objects'
CSCwf54418 Reduce time taken to clear stale IKEv2 SAs formed after Duplicate Detection
CSCwh13821 ASA/FTD may traceback and reload in when changing capture buffer size
CSCwh23100 Cisco ASA and FTD Software Remote Access VPN Unauthorized Access Vulnerability
Bug ID Headline
CSCvs27235 nat-no-xlate-to-pat-pool drops when master leaves cluster and after rebalance
CSCvu87906 Backup file keep growing in 6.6.0-90 (Unified Event Files are Incorrectly Included In
Backup)
CSCvu96069 HA during failover active having traffic with high CPU the system may reload
unexpected
CSCvw52083 FXOS logrotate does not rotate properly all the log files
CSCvw72260 ASA upgrade failed with: "CSP directory does not exist - STOP_FAILED
Application_Not_Found"
CSCvw82067 ASA/FTD 9344 blocks depleted due to high volume of fragmented traffic
Bug ID Headline
CSCvw98315 FXOS reporting old FTD version after FTD upgrade to 6.7.0
CSCvy50598 BGP table not removing connected route when interface goes down
CSCvy65178 Need dedicated Rx rings for to the box BGP traffic on Firepower platform
CSCvy73130 FP4100 platform: Active-Standby changed to dual Active after running "show conn"
command
CSCvy86817 Cruz ASIC CLU filter has the incorrect src/dst IP subnet when a custom CCL IP subnet
is set
CSCvy90162 Traceback watchdog bark at Unicorn Proxy Thread from scaled AC-SSL-SAML Auth
TVM profile
CSCvy95520 Cisco Firepower Management Center and Firepower Threat Defense Software SSH
DoS Vulnerability
CSCvy96895 ASA disconnects the VTY session using of Active IP address and Standby MAC
address after failed over
CSCvz05767 FP-1010 HA link goes down or New hosts unable to connect to the device
CSCvz15755 FTD - Port-channel not coming up after upgrade and may generate core file
CSCvz55140 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 117, seq 17)
CSCvz61689 Port-channel member interfaces are lost and status is down after software upgrade
CSCvz71596 "Number of interfaces on Active and Standby are not consistent" should trigger warning
syslog
CSCvz78816 ASA disconnects the ssh, https session using of Active IP address and Standby MAC
address after FO
CSCvz83432 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 121, seq 18)
CSCvz85913 ASN.1 strings are represented internally within OpenSSL as an ASN1_STR for
CISCO-SSL-1.0.2
CSCwa04395 User Agent session processing crashes SFDataCorrelator on 6.6.5 standalone sensors
CSCwa05385 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 124, seq 19)
Bug ID Headline
CSCwa20758 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 124, seq 20)
CSCwa32286 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 125, seq 21)
CSCwa46905 WM 1010 speed/duplex setting is not getting effect and causes unstable interface
CSCwa50145 FPR8000 sensor UI login creates shell user with basic privileges
CSCwa55562 Different CG-NAT port-block allocated for same source IP causing per-host PAT port
block exhaustion
CSCwa75966 ASA: Reload and Traceback in Thread Name: Unicorn Proxy Thread with Page fault:
Address not mapped
CSCwa76564 ASDM session/quota count mismatch in ASA when multiple context switch before
and after failover
CSCwa90615 WR8 and LTS18 commit id update in CCM layer (seq 24)
CSCwb05291 Cisco ASDM and ASA Software Client-side Arbitrary Code Execution Vulnerability
CSCwb08644 ASA/FTD traceback and reload at IKEv2 from Scaled S2S+AC-DTLS+SNMP long
duration test
CSCwb13294 WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 25)
CSCwb15795 Audit message not generated by: no logging enable from ASAv9.12
CSCwb17963 Unable to identify dynamic rate liming mechanism & not following msg limit per/sec
at syslog server.
Bug ID Headline
CSCwb26212 ASA drops existing anyconnect sessions and stop accepting new ayconnect sessions
CSCwb41361 WR8, LTS18 and LTS21 commit id update in CCM layer (seq 26)
CSCwb41854 Cisco FTD Software and Cisco FXOS Software Command Injection Vulnerability
CSCwb53172 FTD: IKEv2 tunnels flaps every 24 hours and crypto archives are generated
CSCwb53328 ASA/FTD Traceback and reload caused by Smart Call Home process
sch_dispatch_to_url
CSCwb53694 Cisco Firepower Management Center Software XML External Entity Injection
Vulnerability
CSCwb59465 ASA/FTD may traceback (watchdog) and reload when generating a syslog from the
VPN Failover subsystem
CSCwb65447 FTD: AAB cores are not complete and not decoding
CSCwb66761 Cisco Firepower Threat Defense Software Generic Routing Encapsulation DoS
Vulnerability
CSCwb71460 ASA traceback in Thread Name: fover_parse and triggered by snmp related functions
CSCwb74938 ASA traceback and reload with error "assertion "0" failed: file "timer_services.c", line
165"
CSCwb78971 Fatal error: Upgrade Failed: Invalid password: A blank or masked password is not
allowed
Bug ID Headline
CSCwb79812 RIP is advertising all connected Anyconnect users and not matching route-map for
redistribution
CSCwb82796 ASA/FTD firewall may traceback and reload when tearing down IKE tunnels
CSCwb86118 TPK ASA: Device might get stuck on ftp copy to disk
CSCwb87498 Lina traceback and reload during EIGRP route update processing.
CSCwb87950 Cisco ASA Software and FTD Software Web Services Interface Denial of Service
Vulnerability
CSCwb92709 We can't monitor the interface via "snmpwalk" once interface is removed from context.
CSCwb93914 Cisco ASA Software and FTD Software Web Services Interface Denial of Service
Vulnerability
CSCwb94190 ASA graceful shut down when applying ACL's with forward reference feature and
FIPS enabled.
CSCwc02133 Cisco FTD Software and Cisco FXOS Software Command Injection Vulnerability
CSCwc03069 Interface internal data0/0 is up/up from cli but up/down from SNMP polling
CSCwc08676 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 32)
CSCwc10792 ASA/FTD IPSEC debugs missing reason for change of peer address and timer delete
Bug ID Headline
CSCwc11663 ASA traceback and reload when modifying DNS inspection policy via CSM or CLI
CSCwc13994 ASA - Restore not remove the new configuration for an interface setup after backup
CSCwc18312 "show nat pool cluster" commands run within EEM scripts lead to traceback and reload
CSCwc23695 ASA/FTD can not parse UPN from SAN field of user's certificate
CSCwc25207 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 33)
CSCwc28532 9344 Block leak due to fragmented GRE traffic over inline-set interface inner-flow
processing
CSCwc32246 NAT64 translates all IPv6 Address to 0.0.0.0/0 when object subnet 0.0.0.0 0.0.0.0 is
used
CSCwc36905 ASA traceback and reload due to "Heap memory corrupted at slib_malloc.c
CSCwc38567 ASA/FTD may traceback and reload while executing SCH code
CSCwc41590 Upgrade fail & App Instance fail to start with err "CSP_OP_ERROR. CSP signature
verification error."
CSCwc44289 FTD - Traceback and reload when performing IPv4 <> IPv6 NAT translations
CSCwc45397 ASA HA - Restore in primary not remove new interface configuration done after
backup
CSCwc46569 WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 34)
CSCwc49095 ASA/FTD 2100 platform traceback and reload when fragments are coalesced and sent
to PDTS
CSCwc50887 FTD - Traceback and reload on NAT IPv4<>IPv6 for UDP flow redirected over
CCL link
CSCwc51326 FXOS-based Firepower platform showing 'no buffer' drops despite high values for RX
ring watermarks
Bug ID Headline
CSCwc52351 ASA/FTD Cluster Split Brain due to NAT with "any" and Global IP/range matching
broadcast IP
CSCwc53280 ASA parser accepts incomplete network statement under OSPF process and is present
in show run
CSCwc54984 IKEv2 rekey - Responding Invalid SPI for the new SPI received right after
Create_Child_SA response
CSCwc60037 ASA fails to rekey with IPSEC ERROR: Failed to allocate an outbound hardware
context
CSCwc60907 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 35)
CSCwc61912 ASA/FTD OSPFv3 does not generate messages Type 8 LSA for IPv6
CSCwc79366 During the deployment time, device got stuck processing the config request.
CSCwc81960 Unable to configure 'match ip address' under route-map when using object-group in
access list
CSCwc88897 ASA traceback and reload due to null pointer in Umbrella after modifying DNS
inspection policy
CSCwc90091 ASA 9.12(4)47 with <user-statistics>, will affects the "policy-server xxxx global"
visibility.
CSCwc93166 Using write standby in a user context leaves secondary firewall license status in an
invalid state
CSCwc96805 traceback and reload due to tcp intercept stat in thread unicorn
CSCwd00386 ASA/FTD may traceback and reload when clearing the configration due to
"snp_clear_acl_log_flow_all"
Bug ID Headline
CSCvt85766 FPR2k: FCM Syslog Remote Destinations tab disappeared after upgrading
CSCwa53489 Lina Traceback and Reload Due to invalid memory access while accessing Hash Table
CSCvx06920 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 103, seq 5)
CSCwa26535 IPv6 PMTU discovery does not work for RA VPN Cllient with tunneled route
CSCvz92016 Cisco ASA and FTD Software Web Services Interface Privilege Escalation Vulnerability
CSCvz05541 ASA55XX: Expansion module interfaces not coming up after a software upgrade
CSCvz15755 FTD - Port-channel not coming up after upgrade and may generate core file
CSCvx98807 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 109, seq 9)
CSCvx16700 FXOS clock sync issue during blade boot up due to "MIO DID NOT RESPOND TO
FORCED TIME SYNC"
CSCvx47550 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 105, seq 6)
CSCvz89126 ASDM session/quota count mismatch in ASA when multiple context switchover is
done from ASDM
CSCvy66530 lrzsz before version 0.12.21~rc can leak information to the receiving
CSCvt25917 FTD CLI - Fail to display the disabled local user and cannot enable back
CSCwa19443 Flow Offload - Compare state values remains in error state for longer periods
Bug ID Headline
CSCvz68336 SSL decryption not working due to single connection on multiple in-line pairs
CSCwa05385 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 124, seq 19)
CSCwa73172 ASA reload and traceback in Thread Name: PIX Garbage Collector
CSCvz41761 FMC Does not allow to create an EIGRP authentication secret key using the $ character
CSCvz92932 ASA show tech execution causing spike on CPU and impacting to IKEv2 sessions
CSCvx73164 Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021
CSCvz76966 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
DNS DoS
CSCvy02448 Time sync do not work correctly for ASA on FPFPR2100 series platform
CSCwa15291 A crafted request uri-path can cause mod_proxy to forward the request to an origin
server...
CSCwa79494 Traffic keep failing on Hub when IPSec tunnel from Spoke flaps
CSCwa87315 ASA/FTD may traceback and reload in Thread Name 'IP Address Assign'
CSCwa04134 The in-memory certificate cache in strongSwan before 5.9.4 has a remot
CSCvy89658 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 114, seq 13)
CSCvw43529 Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25. ...
CSCvw62288 ASA: 256 byte block depletion when syslog rate is high
CSCvy60285 The mq_notify function in the GNU C Library (aka glibc) through 2.33 has a
use-after-free
CSCvw72260 ASA upgrade failed with: "CSP directory does not exist - STOP_FAILED
Application_Not_Found"
CSCvw90923 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 101, seq 4)
CSCvz95108 FTD Deployment failure post upgrade due to major version change on device
CSCvy96698 Resolve spurious status actions checking speed values twice in FXOS portmgr
CSCvx54585 nfm-burnin.sh fails: Incorrect Expanded Geryon base and media CPLD
Bug ID Headline
CSCwa28822 FTD moving UI management from FDM to FMC causes traffic to fail
CSCvw98315 FXOS reporting old FTD version after FTD upgrade to 6.7.0
CSCwa26038 ICMP inspection causes packet drops that are not logged appropriately
CSCvw48829 Timezone in "show clock" is different from which in "show run clock"
CSCvz08387 ASP drop capture output may display incorrect drop reason
CSCvx47634 The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and
CSCvu41615 Cisco FTD Software Snort Out of Memory Denial of Service Vulnerability
CSCvz51157 In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/s
CSCvy60295 A flaw was found in OpenLDAP. openLDAPâETMs slapd server trigger an assertion
failure.
CSCwa30114 "Error:NAT unable to reserve ports" when using a range of ports in an object service
CSCwa74900 Traceback and reload after enabling debug webvpn cifs 255
CSCvy64145 WR6 and WR8 commit id update in CCM layer(sprint 113, seq 12)
CSCvu75930 Service module not returning error to supervisor when SMA resources are depleted
Bug ID Headline
CSCvz76746 While implementing management tunnel a user can use open connect to bypass
anyconnect.
CSCvw97256 Need handling of rmu read failure to ignore link state update when link state API read
fails
CSCvz55140 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 117, seq 17)
CSCvs42388 Gratuitous logging of string: "Memory stats information for preprocessor is NULL"
CSCvz05767 FP-1010 HA link goes down or New hosts unable to connect to the device
CSCvz71064 Deleting The Context From ASA taking Almost 2 Minutes with ikev2 tunnel
CSCvz46333 FTD policy deployment failure due to internal socket connection loss
CSCvs84242 FMC Deployment Failure when removing Auto NAT and correlated network object
CSCvw43544 The crc32_big function in crc32.c in zlib 1.2.8 might allow context- ...
CSCwa06960 ASA Traceback and Reload due to CTM daemon during internal health test
CSCwa65389 ASA traceback and reload in Unicorn Admin Handler when change interface
configuration via ASDM
CSCwa32286 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 125, seq 21)
CSCvx95884 High CPU and massive "no buffer" drops during HA bulk sync and during normal
conn sync
Bug ID Headline
CSCwb01700 ASA: SSH and ASDM sessions stuck in CLOSE_WAIT causing lack of MGMT for
the ASA
CSCwa08262 AnyConnect users with mapped group-policies take attributes from default GP under
the tunnel-group
CSCvw93159 Firepower 2100: ASA/FTD generates message "Local disk 2 missing on server 1/1"
CSCvy03045 Failure accessing FXOS with connect fxos admin from Multi-Context ASA if admin
context is changed
CSCvx91317 A remote code execution issue was discovered in MariaDB 10.2 before 10
CSCvz85913 ASN.1 strings are represented internally within OpenSSL as an ASN1_STR for
CISCO-SSL-1.0.2
CSCvz65181 Cisco Firepower Threat Defense Software Security Intelligence DNS Feed Bypass
Vulnerabilit
CSCvw16165 Firepower 1010 Series stops passing traffic when a member of the port-channel is
down
CSCvw52083 FXOS logrotate does not rotate properly all the log files
CSCvz33468 ASA/FTD - NAT stops translating source addresses after changes to object-groups in
manual NAT Rule
CSCvy60305 A flaw was found in ImageMagick in versions before 7.0.11. has a potential cipher
leak
CSCvw09745 NFE ports are down after upgrade to 6.4.0.10-86 before reapplying AC policy
CSCvw43555 A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.0 ...
CSCwa85043 Traceback: ASA/FTD may traceback and reload in Thread Name 'Logger'
CSCvw43559 BusyBox project BusyBox wget version prior to commit 8e2174e9bd836e5 ...
CSCvy08798 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 110, seq 10)
CSCwa13873 ASA Failover Split Brain caused by delay on state transition after "failover active"
command run
CSCvy60284 A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allo
Bug ID Headline
CSCvx67468 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 107, seq 7)
CSCvv55066 FPR1010: Internal-Data0/0 and data interfaces are flapping during SMB file transfer
CSCvx33904 Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation
CSCvx97053 Unable to configure ipv6 address/prefix to same interface and network in different
context
CSCvz25066 fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 do
CSCwa33898 Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow
Vulnerability
CSCvz25064 The wordexp function in the GNU C Library (aka glibc) through 2.33 may
CSCwa68660 FTP inspection stops working properly after upgrading the ASA to 9.12.4.x
CSCwa36535 Standby unit failed to join failover due to large config size.
CSCwa87597 ASA/FTD Failover: Joining Standby reboots when receiving configuration replication
from Active mate
CSCvx49720 BIND servers are vulnerable if they are running an affected version an
CSCvs68576 Deploy failure when deleting auto nat rule due to double negate
CSCwb01919 FP2140 ASA 9.16.2 HA units traceback and reload at lua_getinfo (getfuncname)
CSCvr38379 Upgraded FTD will not reimage to base FTD version with the use of 'auto-install'
feature in FPR2100
Bug ID Headline
CSCvw43489 The NEEDBITS macro in the inflate_dynamic function in inflate.c for ...
CSCvr33586 FPR1010 - Add temperature/warnings for SSD when thresholds are exceeded
CSCvz09106 Cisco ASA and FTD Software SSL VPN Denial of Service Vulnerability
CSCwa55878 FTD Service Module Failure: False alarm of "ND may have gone down"
CSCwa77083 Host information is missing when Security Zones are configured in Network Discovery
rules
CSCwa61218 Polling OID "1.3.6.1.4.1.9.9.171.1.3.2.1.2" gives negative index value of the associated
tunnel
CSCvx26927 TLS site not loading when it has segmented and retransmitted CH
CSCvz91218 Statelink hello messages dropped on Standby unit due to interface ring drops on high
rate traffic
CSCwa20758 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 124, seq 20)
CSCvy35948 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 111, seq 11)
CSCwa67882 Offloaded GRE tunnels may be silently un-offloaded and punted back to CPU
CSCvy60322 In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S
CSCvy12991 Chassis local date and time may drift back to midnight Jan 1 2015 after reboot
CSCvy60326 Integer overflow in the htmldoc 1.9.11 and before may allow attackers
CSCvv24647 FTD 2100 - SNMP: incorrect values returned for Ethernet statistics polling
CSCvx49717 An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before
CSCvw13348 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 98, seq 2)
CSCwa97784 ASA: Jumbo sized packets are not fragmented over the L2TP tunnel
CSCvx78968 ASA/FTD Traceback and reload on Thread Name: IKEv2 Daemon with VTIs
configured
Bug ID Headline
CSCwa61361 ASAv traceback when SD_WAN ACL enabled, then disabled (or vice-versa) in PBR
CSCvx47643 A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd cra
CSCvv95277 FPR2100 High disk usage in partition /opt/cisco/platform/logs due to growth of httpd
log files
CSCwa18858 ASA drops non DNS traffic with reason "label length 164 bytes exceeds protocol limit
of 63 bytes"
CSCvx91341 An issue was discovered in GNOME GLib before 2.66.8. When g_file_repla
CSCwa40237 Cisco Firepower Management Center File Upload Security Bypass Vulnerability
CSCvv79459 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 94, seq 1)
CSCvz86256 Primary ASA should send GARP as soon as split-brain is detected and peer becomes
cold standby
CSCwb07981 Traceback: Standby FTD reboots and generates crashinfo and lina core on thread name
cli_xml_server
CSCvt67167 Data Unit traceback and reload without traffic at Thread Name :"logger"
CSCvx49716 An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before
CSCvw43508 Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZ ...
CSCwa31373 duplicate ACP rules are generated on FMC 6.6.5 after rule copy.
CSCwa11088 Access rule-ordering gets automatically changed while trying to edit it before page
refresh/load
Bug ID Headline
CSCvq39187 KP: Host key verification is getting failed while ssh to host
CSCvz83432 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 121, seq 18)
CSCvw43610 In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnob ...
CSCwa57115 New access-list are not taking effect after removing non-existance ACL with objects.
Bug ID Headline
CSCwa70008 Expired certs cause Security Intel. and malware file preclassification signature updates
to fail
Bug ID Headline
CSCum03297 ENH: ASA should save the timestamp of the MAXHOG in 'show proc cpu-hog'
CSCvi58484 Cluster: ping sourced from FTD/ASA to external IPs may if reply lands on different
cluster unit
CSCvq39187 KP: Host key verification is getting failed while ssh to host
CSCvq43454 ENH : Support a tolerance time for the "NotValidBefore" timestamp, while using
SAML auth
Bug ID Headline
CSCvq54299 After restart of both A/S units, not all context configs may be loaded when using SL
on 2100
CSCvr11958 AWS FTD: Deployment failure with ERROR: failed to set interface to promiscuous
mode
CSCvr33586 FPR1010 - Add temperature/warnings for SSD when thresholds are exceeded
CSCvr38379 Upgraded FTD will not reimage to base FTD version with the use of 'auto-install'
feature in FPR2100
CSCvs47365 Event rate seen on FMC slows down or stops coming from devices using FXOS 2.9.1
update
CSCvt10944 ctm crashed while sending emix traffic over VTI tunnel
CSCvt25917 FTD CLI - Fail to display the disabled local user and cannot enable back
CSCvt85766 FPR2k: FCM Syslog Remote Destinations tab disappeared after upgrading
CSCvu97242 FTD 2100: Corefile and crashinfo might both be truncated and incomplete in the event
of a crash
CSCvv07917 ASA learning a new route removes asp route table created by floating static
CSCvv20780 Policy deploy fails with "Failed to hold the deployment transaction" error
CSCvv24647 FTD 2100 - SNMP: incorrect values returned for Ethernet statistics polling
CSCvv43190 Crypto engine errors when GRE header protocol field doesn't match protocol field in
inner ip header
CSCvv55248 Syslogs generated for ACL transaction commit are not in consistent format & not
available some times
CSCvv62499 FMC: Remove_peers.pl script should work when FTD is member of a cluster
Bug ID Headline
CSCvv79459 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 94, seq 1)
CSCvv89715 Fastpath rules for Firepower 8000 series stack disappear randomly from the FMC
CSCvw03628 ASA will not import CA certificate with name constraint of RFC822Name set as empty
CSCvw06298 ASA duplicate MAC addresses in Shared Interfaces of different Contexts causing
traffic impact
CSCvw13348 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 98, seq 2)
CSCvw16165 Firepower 1010 Series stops passing traffic when a member of the port-channel is
down
CSCvw48829 Timezone in "show clock" is different from which in "show run clock"
CSCvw68593 A flaw in the way reply ICMP packets are limited in the Linux kernel f
CSCvw90923 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 101, seq 4)
CSCvw93159 Firepower 2100: ASA/FTD generates message "Local disk 2 missing on server 1/1"
CSCvw97256 Need handling of rmu read failure to ignore link state update when link state API read
fails
CSCvx06920 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 103, seq 5)
CSCvx14031 IPv4 DACL stuck on Active device when DACL removed after CoA for IKEv2 Session,
traffic not impacted
CSCvx16134 100% cpu-usage for some processes seen in "show processes cpu-usage" though using
multicore
CSCvx23833 IKEv2 rekey - Invalid SPI for ESP packet using new SPI received right after
Create_Child_SA response
CSCvx24537 SAML: SAML Authentication may fail if we have 2 or more IDP certs with same
Subject Name
Bug ID Headline
CSCvx29814 IP address in DHCP GIADDR field is reversed after sending DHCP DECLINE to
DHCP server
CSCvx33904 Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation
CSCvx42081 FPR4150 ASA Standby Ready unit Loops to failed and remove config to install it
again
CSCvx43150 On the FMC, process of registration of member device post RMA is not successful
CSCvx45976 ASA/FTD Watchdog forced traceback and reload in Threadname: vnet-proxy (rip:
socks_proxy_datarelay)
CSCvx47230 X-Frame-Options header support for older versions of IE and windows platforms
CSCvx47550 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 105, seq 6)
CSCvx50980 ASA CP CPU wrong calculation leads to high percentage (100% CP CPU)
CSCvx65745 FPR2100: enable kernel panic on octeon for UE events to trigger crash
CSCvx67468 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 107, seq 7)
CSCvx71571 ASA: "ERROR: Unable to delete entries from Hash Table" with CSM
CSCvx80830 VPN conn fails from same user if Radius server sends a dACL and
vpn-simultaneous-logins is set to 1
CSCvx86621 ASA(lina) clock (always shows Jan 2010) does not sync properly with fxos
CSCvx87709 FPR 2100 running ASA in HA. Traceback and reload on watchdog during failover
Bug ID Headline
CSCvx95255 Supportive change in ASA to differentiate, new ASDM connections from existing
ASDM context switch
CSCvx95884 High CPU and massive "no buffer" drops during HA bulk sync and during normal
conn sync
CSCvx97632 ASA traceback and reload when copying files with long destination filenames using
cluster command
CSCvx98807 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 109, seq 9)
CSCvy02448 Time sync do not work correctly for ASA on FPFPR2100 series platform
CSCvy03045 Failure accessing FXOS with connect fxos admin from Multi-Context ASA if admin
context is changed
CSCvy03907 Creation/Edit of Access Control Policy fails with error 'Rule Name Already Exists'
CSCvy04869 AnyConnect certificate authentication fails if user certificate has 8192 bits key size
CSCvy08798 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 110, seq 10)
CSCvy12782 FTD/ASA: PATed traffic impacted when configured on ixgbe-vf SRIOV interfaces
in HA
CSCvy14721 ssl traffic dropped by FTD while CH packet has a destination port no greater than
source port
CSCvy16179 ASA cluster Traceback with Thread Name: Unicorn Admin Handler even when running
fix for CSCuz67596
CSCvy17078 Traceback: ASA on FPR 2110 traceback and reload on process Lina
CSCvy17470 ASA Traceback and reload on the A/S failover pair at IKEv2
CSCvy21334 Active tries to send CoA update to Standby in case of "No Switchover"
Bug ID Headline
CSCvy25849 ASA fails to process the OCSP response when the string 'OK' is missing in the HTTP
response
CSCvy31424 QP FTD application fails to start due to outdated affinity.conf following FXOS/FTD
upgrade
CSCvy33105 Ambiguous command error is shown for 'show route bgp' or 'show route isis' if DNS
lookup is enabled
CSCvy35948 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 111, seq 11)
CSCvy39621 ASA/FTD sends continuous Radius Access Requests Even After Max Retry Count is
Reached
CSCvy43447 FTD traceback and reload on Lic TMR Thread on Multi Instance FTD
CSCvy46026 "Unable to load container (UUID)" when try to open a device under Devices > Device
management
CSCvy47108 Remote Access IKEv2 VPN session cannot be established because of stuck Uauth
entry
CSCvy48159 ASA Traceback & reload on process name lina due to memory header validation
CSCvy51814 Firepower flow-offload stops offloading all existing and new flows
CSCvy53461 RSA keys & Certs get removed post reload on WS-SVC-ASA-SM1-K7 with ASA
code 9.12.x
CSCvy55356 CPU hogs less than 10 msec are produced contrary to documentation
CSCvy57905 VTI tunnel interface stays down post reload on KP/WM platform in HA
CSCvy64145 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 113, seq 12)
Bug ID Headline
CSCvy64492 ASAv adding non-identity L2 entries for own addresses on MAC table and dropping
HA hellos
CSCvy64911 Debugs for: SNMP MIB value for crasLocalAddress is not showing the IP address
CSCvy67756 Firepower Services HTTPS traffic stops working when matching Do not decrypt rule
in SSL policy
CSCvy74781 The standby device is sending the keep alive messages for ssl traffic after the failover
CSCvy80202 Intrusion Event Performance Graphs load blank on 4100 despite of fix of CSCvm48451
CSCvy89658 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 114, seq 13)
CSCvy91668 PAT pool exhaustion with stickiness traffic could lead to new connection drop.
CSCvy92990 FTD traceback and reload related to SSL after upgrade to 7.0
CSCvy96698 Resolve spurious status actions checking speed values twice in FXOS portmgr
CSCvz00699 Traceback in webvpn and reload experienced periodically after ASA upgrade
CSCvz05189 FTD reload with Lina traceback during xlate replication in Cluster
CSCvz07614 ASA: Orphaned SSH session not allowing us to delete a policy-map from CLI
CSCvz20544 ASA/FTD may traceback and reload in loop processing Anyconnect profile
CSCvz21886 Twice nat's un-nat not happening if nat matches a pbr acl that matches a port number
instead of IP
CSCvz25434 ASA/FTD blackholes traffic due to 1550 block depletion when BVI is configured as
DHCP client
Bug ID Headline
CSCvz29233 ASA: ARP entries from custom context not removed when an interface flap occurs on
system context
CSCvz37306 ASDM session is not served for new user after doing multiple context switches in
existing user
CSCvz39565 ASA/FTD Traceback and Reload during bulk VPN session connect
CSCvz40352 ASA traffic dropped by Implicit ACL despite the fact of explicit rules present on
Access-list
CSCvz53142 ASA does not use the interface specified in the name-server command to reach IPv6
DNS servers
CSCvz64470 ASA/FTD Traceback and reload due to memory corruption when generating ICMP
unreachable message
CSCvz66795 ASA traceback and reload in SSH process when executing the command "show
access-list"
CSCvz69571 ASA log shows wrong value of the transferred data after the anyconnect session
terminated.
Bug ID Headline
CSCuj60109 ENH: SFP transceivers attached to ASA-IC-6GE-SFP-A are not shown by CLI
CSCuq47482 ENH: ASA show tech should include "show module x detail"
CSCuu84198 DHCPRelay debugs should highlight invalid parameters from DHCP server
CSCuw51499 TCM doesn't work for ACE addition/removal, ACL object/object-group edits
CSCvb92169 ASA should provide better fragment-related logs and ASP drop reasons
CSCvc40724 Invalid group URL causes improperly formatted message back to AnyConnect
CSCvg59385 ASA scansafe connector takes too long to failover to secondary CWS Tower
CSCvg73237 ENH: Configure CAC as an absolute value as well instead of just percentage of total
VPN capacity.
CSCvi85020 Order of SSH configuration generates "SSH version 1 is not secure." error messages
at boot
Bug ID Headline
CSCvm78605 ASA Failover: 'show interface tunnel' shows tunnel source as standby IP address
CSCvm82290 ASA core blocks depleted when host unreachable in IRB/TFW configuration
CSCvn12453 Implement debug menu command to show RX ring number a flow is hashed to
CSCvn64647 ASA traceback and reload due to tcp_retrans_timeout internal thread handling
CSCvn82441 [SXP] Issue with establishing SXP connection between ASA on FPR-2110 and switches
CSCvn93683 ASA: cluster exec show commands not show all output
CSCvo11623 ASAv/Azure: Smart Licensing does not use hostname from custom template for
registration
CSCvo12504 ASA: Failover fsm gets stuck in a multicontext in case of module difference.
CSCvo58030 Failover mac address configured on interface does not allow to delete subinterface
CSCvo68887 Timestamp in Crash File name says UTC but is local timezone
CSCvo78772 ENH: ASA WebVPN should send "Cache-Control: no-store" instead of "Cache-Control:
no-cache"
CSCvo81249 ASA may cause high-rate of DNS queries between ASA (acting as a DNS client) and
a server
CSCvo99076 ENH: IKEv2 quick connection preempt for static IP assigned to client by AAA
Bug ID Headline
CSCvp09083 ASA working as DHCP server drops DHCP renewal request packet sent by DHCP
clients
CSCvp13352 ASA continues to do TCP keepalives for Client side connections even after vpn session
times out
CSCvp16618 URL inside HTML base tag is not rewritten after it is handled by GBP
CSCvp23530 OSPF neighbor command not replicated to standy after write standby or reload
CSCvp29554 Traceback and reload due to a watchdog timeout when accessingfilesystem (webvpn
related)
CSCvp29803 Apache HTTP Server Modules Scripts Arbitrary Code Execution Vulnerab ...
CSCvp31311 There should be enough PKI handles for the max sessions on a given platform
CSCvp42484 IS-IS hello packet length not updated to correct mtu when mtu modified
CSCvp42722 ASA does not generate logging message 611103 for any syslog destination (buffer,
trap, etc)
CSCvp52437 ASA | Saving configuration, give message "Platform does not support appliance mode
configuration."
CSCvp56719 Cisco FMC and FTD Software sftunnel Pass the Hash Vulnerability
CSCvp57417 Upon downgrade of an ASAv, the firewall may traceback and reload
CSCvp67033 ASA: Cannot distinguish name aliases for IPv6 and displays a "incomplete command"
error message
CSCvp71766 Radius authentication fails when sourced from BVI across a VPN tunnel
CSCvp71879 limit-resource CLI for ssh/telnet has no effect if quota-CLI is not configured
CSCvp73394 Failover ASA IKEv2 VTI: Secondary ASA sends standby IP as the traffic selector
CSCvp75965 primary FPR2110 crash after customer configure syslog setting on FMC
CSCvp76904 With dhcp-network-scope configured incorrectly, DHCP debugs on ASA show wrong
gateway and netmask.
CSCvp77226 ASA traceback and reload on sysopt traffic detailed in multicontext mode
CSCvp78171 ASA in cluster fail to synchronise IPv6 ND table with peer units.
Bug ID Headline
CSCvp91905 ASA will add the newly configured IPv6 Address to the current link-local address
CSCvq00560 ASA silently drops packets which violate ESP Authentication data field size (ICV)
CSCvq22358 Disabling anti-replay for one context it disables it for other contexts as well
CSCvq27016 FMC shows 'Unable to fetch failover history..' for FTD HA.
CSCvq47743 AnyConnect and Management Sessions fail to connect after several weeks
CSCvq49718 Observed Traceback in ASA with dns debugs enabled while resolving FQDN Entries
CSCvq55426 Adding an ipv6 default route causes CLI to hang for 50 seconds
CSCvq70536 FTD: Deployment failure when breaking HA and graceful-restart is present on config
CSCvq73595 ASA webvpn unable to extract username from cert UPN if username is longer than
32 chars
CSCvq78126 V route is missing even after setting the reverse route in Crypto map config in
HA-IKEv2
CSCvq79042 FQDN ACL entries incomplete due to DNS response from server is large and truncated
CSCvq81410 ASA::Unable to execute any ASA command via http using safari browser.
CSCvq81692 ASA: After changing admin-context, call-home does not use new admin context setting
CSCvq83060 SNMP: Cannot get failover link information from oid in multiple mode
Bug ID Headline
CSCvq84444 Configuring static routes causes "Route Session" rerr counter to increment on standby
ASA
CSCvq87625 ENH: Addition of 'show run all sysopt' to 'show tech' output
CSCvq92240 Memory leak observed while running AnyConnect ssl vpn tests
CSCvq93640 WRL6 and WRL8 commit id update in CCM layer (sprint 67)
CSCvr03705 We need to have default route with AD and tunneled at the same time for the same
next hub.
CSCvr04203 Memory leak observed while running AnyConnect ssl vpn tests
CSCvr12018 ASA: VPN traffic fails to take the tunnel route when the default route is learnt over
BGP.
CSCvr15503 ASA: SSH and ASDM sessions stuck in CLOSE_WAIT causing lack of MGMT for
the ASA
CSCvr20486 FTD 1010 Passive interfaces does not receive unicast packets
CSCvr20757 Block leak on ASA while running Cisco Umbrella DNS inspection
CSCvr20876 low memory causes kernel to invoke - oom and reload device - modified rlimit for KP
CSCvr23986 Cisco ASA & FTD devices may reload under conditions of low memory and frequent
complete MIB walks
CSCvr37486 established rules in asp table are not un-installed on config removal
Bug ID Headline
CSCvr57605 ASA after reload had license context count greater than platform limits
CSCvr58411 RRI on static HUB/SPOKE config is not working on HUB when a new static SPOKE
is added or deleted
CSCvr60195 ASA/FTD may traceback and reload when repeatedly adding/removing multicast
commands
CSCvr68872 Secondary unit exceed platform context count limit in split brain scenario when failover
link down
CSCvr83372 I/O error occurred while writing; fd='28', error='Resource temporarily unavailable
(11)'
CSCvr90462 Improve ipv6 duplicate address detection to avoid disabling ipv6 in case of transient
active-active
CSCvr92311 Standby ASA logging %ASA-4-720022: (VPN-Secondary) Cannot find trust point
__tmpCiscoM1Root__
CSCvr99642 ASA traceback and reload multiple times with trace "webvpn_periodic_signal"
CSCvs02954 ASA OSPF: Prefix removed from the RIB when topology changes, then added back
when another SPF is run
CSCvs13204 ASAv failover traffic on SR-IOV interfaces might be dropped due to interface-down
Bug ID Headline
CSCvs29779 ASA may traceback and reload while waitinPC g for "DATAPATH-12-1899" process
to finish.
CSCvs31470 OSPF Hello causing 9K block depletion, control point CPU 100% and cluster unstable.
CSCvs39589 ASA doesn't honor SSH Timeout When Data Channel is not Negotiated
CSCvs43154 Secondary ASA is unable to join the failover due to aggressive warning messages.
CSCvs48437 ASA cannot send syslog to two UDP ports at same time
CSCvs52169 ASA sends malformed RADIUS message when device-id from AnyConnect is too
long
CSCvs56802 Cisco Firepower 2100 Series SSL/TLS Inspection Denial of Service Vulnerability
CSCvs59558 Failover mac address getting removed on the reload of the Primary active unit
CSCvs70260 IKEv2 vpn-filter drops traffic with implicit deny after volume based rekey collision
Bug ID Headline
CSCvs71969 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
CSCvs72378 ASDM session being abruptly terminated when switching between different contexts
CSCvs72450 FXOS - Recover hwclock of service module from corruption due to simultaneous write
collision
CSCvs73754 ASA/FTD: Block 256 size depletion caused by ARP of BVI not assigned to any physical
interface
CSCvs85196 ASA SIP connections drop after several consecutive failovers: pinhole timeout/closed
by inspection
CSCvs90100 ASA/FTD may traceback and reload in Thread Name 'License Thread'
CSCvs97863 Reduce number of fsync calls during close in flash file system
CSCvs97908 Invalid scp session terminates other active http, scp sessions
CSCvt05862 IPv6 DNS server resolution fails when the server is reachable over the management
interface.
CSCvt06606 Flow offload not working with combination of FTD 6.2(3.10) and FXOS 2.6(1.169)
CSCvt06841 Incorrect access-list hitcount seen when configuring it with a capture on ASA
CSCvt11302 On FPR devices when FIPS is enabled cannot create webtype ACLs
CSCvt11547 Cisco Firepower Device Manager Software Filesystem Space Exhaustion Denial of
Service Vuln
Bug ID Headline
CSCvt11661 DOC - Clarify the meaning of mp-svc-flow-control under show asp drop
CSCvt13301 Default Syslog using non-standard port does not work for Intrusion events
CSCvt13822 ASA: VTI rejecting IPSec tunnel due to no matching crypto map entry
CSCvt18199 IPv6 Nat rejected with error "overlaps with inside standby interface address" for
Standalone ASA
CSCvt23643 VPN failover recovery is taking approx. 30 seconds for data to resume
CSCvt25225 ASA: Active unit HA traceback and reload during Config Sync state during OSPF
sync
CSCvt26530 FTD failed over due to 'Inspection engine in other unit has failed due to snort failure'
CSCvt27585 Observed traceback on 2100 while performing Failover Switch from Standby.
CSCvt30731 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 80)
CSCvt35945 Encryption-3DES-AES should not be required when enabling ssh version 2 on 9.8
train
CSCvt41357 "no logging permit-hostdown" does not block connections when syslog host is
inaccessible
CSCvt43136 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability
CSCvt43967 Pad packets received from RA tunnel which are less than or equal 46 bytes in length
with zeros
CSCvt48601 Cisco Firepower Manament Center Software Stored Cross-Site Scripting Vulnerability
Bug ID Headline
CSCvt50528 Warning Message for default settings with Installation of Certificates in ASA/FTD -
CLI
CSCvt51349 Fragmented packets forwarded to fragment owner are not visible on data interface
captures
CSCvt51987 Traffic outage due to 80 size block exhaustion on the ASA FPR9300 SM56
CSCvt53640 ASA5585 may traceback and reload after upgrading SFR from 6.4.0 to 6.4.0.x
CSCvt54182 LINA cores are generated when FTD is configured to do SSL decryption.
CSCvt64035 remote acess mib - SNMP 64 bit only reporting 4Gb before wrapping around
CSCvt64952 "Show crypto accelerator load-balance detail" has missing and undefined output
CSCvt65982 Route Fallback doesn't happen on Slave unit, upon RRI route removal.
CSCvt70664 ASA: acct-session-time accounting attribute missing from Radius Acct-Requests for
AnyConnect
CSCvt72683 NAT policy configuration after NAT policy deployment on FP 8130 is not seen
CSCvt73407 TACACS Fallback authorization fails for Username enable_15 on ASA device.
CSCvt80126 ASA traceback and reload for the CLI "show asp table socket 18421590 det"
CSCvt83133 Unable to access anyconnect webvpn portal from google chrome using group-url
CSCvt92647 Connectivity over the state link configured with IPv6 addresses is lost after upgrading
the ASA
CSCvt98599 IKEv2 Call Admission Statistics "Active SAs" counter out of sync with the real number
of sessions
CSCvt99020 Cisco Firepower Manament Center Software Stored Cross-Site Scripting Vulnerability
Bug ID Headline
CSCvt99137 With huge FTP traffic in cluster, the SEC_FLOW messages are in a retransmit loop
CSCvu00112 tsd0 not reset when ssh quota limit is hit in ci_cons_shell
CSCvu03562 Device loses ssh connectivity when username and password is entered
CSCvu03675 FPR2100: ASA console may hang & become unresponsive in low memory conditions
CSCvu05180 aaa-server configuration missing on the FTD after a Remote Access VPN policy
deployment
CSCvu07602 FPR-41x5: 'clear crypto accelerator load-balance' will cause a traceback and reload
CSCvu07880 ASA on QP platforms display wrong coredump filesystem space (50 GB)
CSCvu12039 Cluster data unit might fail to synchronize SCTP configuration from the control unit
after bootup
CSCvu12045 Deployment fails for NGIPS with error "System (/etc/rc.d/init.d/netif-speed eth0)
Failed"
CSCvu12248 ASA-FPWR 1010 traceback and reload when users connect using AnyConnect VPN
CSCvu17965 ASA generated a traceback and reloaded when changing the port value of a manual
nat rule
CSCvu20666 Few FPR 2100 series External Authentication RADIUS not taking configuration
CSCvu26296 ASA interface ACL dropping snmp control-plane traffic from ASA
CSCvu26561 WebVPN SSO Gives Unexpected Results when Integrated with Kerberos
CSCvu29184 Cisco Firepower Threat Defense Software Command File Overwrite Vulnerability
CSCvu29395 Traceback observed while performing master role change with active IGMP joins
CSCvu29660 Block exhaustion snapshot not created when available blocks goes to zero
CSCvu32698 ASA Crashes in SNMP while joining the cluster when key config-key
password-encryption" is present
Bug ID Headline
CSCvu40324 ASA traceback and reload with Flow lookup calling traceback
CSCvu40398 ASAv reload due to FIPS SELF-TEST FAILURE after enabling FIPS
CSCvu48886 FTD deployment failure when removing non-default "crypto ikev2 limit
max-in-negotiation-sa"
CSCvu49625 [PKI] Standard Based IKEv2 Certificate Auth session does second userfromcert lookup
unnecessarily
CSCvu55843 ASA traceback after TACACS authorized user made configuration changes
CSCvu65688 IKEv2 CAC "Active SAs" counter out of sync with the real number of sessions despite
CSCvt98599
CSCvu70931 Cluster / aaa-server key missing after "no key config-key" is entered
CSCvu73207 DSCP values not preserved in DTLS packets towards AnyConnect users
CSCvu77095 ASA unable to delete ACEs with remarks and display error "Specified remark does
not exist"
CSCvu89110 ASA: Block new conns even when the "logging permit-hostdown" is set & TCP syslog
is down
CSCvu90727 Native VPN client with EAP-TLS authentication fails to connect to ASA
CSCvu91792 SNMP IfInDiscards OIDs for Internal-Data 0/0 and 0/1 may return incorrect values
CSCvu98222 FTD Lina engine may traceback in datapath after enabling SSL decryption policy
Bug ID Headline
CSCvv08244 Firepower module may block trusted HTTPS connections matching 'Do not decrypt'
SSL decryption rule
CSCvv09396 Stale VPN routes for L2TP, after the session was terminated
CSCvv10778 Traceback in threadname DATAPATH (5585) or Lina (2100) after upgrade to 9.12.4
CSCvv12127 Series 3 policy deploy can fail when adding a large number of IPV4 source and
destination AC rules.
CSCvv15572 ASA traceback observed when "config-url" is entered while creating new context
CSCvv19230 ASAv Anyconnect users unexpectedly disconnect with reason: Idle Timeout
CSCvv23370 Observed traceback in FPR2130 while running webVPN, SNMP related traffic.
CSCvv25394 After upgrade ASA swapped names for disks, disk0 became disk1 and vice versa.
CSCvv31334 Lina traceback and reload seen on trying to switch peer on KP HA with 6.6.1-63
CSCvv31629 Intermittently embedded ping reply over GRE drops on FTD cluster if traffic passes
asymmetrically.
CSCvv32333 ASA still doesn't allow to poll internal-data0/0 counters via SNMP in multiple mode
CSCvv32425 ASA traceback when running show asp table classify domain permit
CSCvv34003 snmpwalk for OID 1.3.6.1.2.1.47.1.1.1.1.5 on ISA 3000 returning value of 0 for .16
and .17
Bug ID Headline
CSCvv34140 ASA IKEv2 VTI - Failed to request SPI from CTM as responder
CSCvv36725 ASA logging rate-limit 1 5 message ... limits to 1 message in 10 seconds instead of 5
CSCvv37629 Malformed SIP packets leads to 4k block hold-up till SIP conn timeout causing probable
traffic issue
CSCvv41453 Removing static ipv6 route from management-only route table affects data traffic
CSCvv49800 ASA/FTD: HA switchover doesn't happen with graceful reboot of firepower chassis
CSCvv53696 ASA/FTD traceback and reload during AAA or CoA task of Anyconnect user
CSCvv56644 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
Web DoS
CSCvv57842 WebSSL clientless user accounts being locked out on 1st bad password
CSCvv58605 ASA traceback and reload in thread:Crypto CA,mem corruption by unvirtualized pki
global table in MTX
CSCvv59036 Static routes deleted from the FMC without user deleting it.
CSCvv59676 Snort2: Implement aggressive pruning for certificate cache for TLS to free up memory
CSCvv62305 ASA traceback and reload in fover_parse when attempting to join the failover pair.
CSCvv63412 ASA dropping all traffic with reason "No route to host" when tmatch compilation is
ongoing
CSCvv65184 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
Web DoS
Bug ID Headline
CSCvv66920 Inner flow: U-turn GRE flows trigger incorrect connection flow creation
CSCvv70984 ASA traceback while modifying the bookmark SSL Ciphers configuration
CSCvv72466 OSPF network commands go missing in the startup-config after upgrading the ASA
CSCvv79897 Block "sensor restart" command for FTD units to prevent Lina crash and system reboot
event
CSCvv87496 ASA cluster members 2048 block depletion due to "VPN packet redirect on peer"
CSCvv88017 ASA: EasyVPN HW Client triggers duplicate phase 2 rekey causing disconnections
across the tunnel
CSCvv90720 ASA/FTD: Mac address-table flap seen on connected switch after a HA switchover
CSCvv94701 ASA keeps reloading with "octnic_hm_thread". After the reload, it takes very long
time to recover.
CSCvw12008 ASA traceback and reload while executing "show tech-support" command
CSCvw12100 ASA stale VPN Context seen for site to site and AnyConnect sessions
CSCvw19272 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
CSCvw21844 FTD traceback and reload on DATAPATH thread when processing encapsulated flows
CSCvw22986 Secondary unit stuck in Bulk sync infinitely due to interface of Primary stuck in init
state
Bug ID Headline
CSCvw24556 TCP File transfer (Big File) not properly closed when Flow offload is enabled
CSCvw24700 FPR2100 ASA running 9.12.4.7 fails to boot with ERROR: FIPS Self-Test failure,
fipsPostGFSboxKat
CSCvw26171 ASA syslog traceback while strncpy NULL string passed from SSL library
CSCvw26544 Cisco ASA and FTD Software SIP Denial of Service Vulnerability
CSCvw28894 SFDataCorrelator slow startup and vuln remap due to duplicate entries in vuln tables
CSCvw31254 User with shell set to /bin/false on 8350 sensor causes deployment failure
CSCvw31569 Director/Backup flows are left behind and traffic related to this flow is blackholed
CSCvw32518 ASASM traceback and reload after upgrade up to 9.12(4)4 and higher
CSCvw37259 VPN syslogs are generated at a rate of 600/s until device goes into a hang state
CSCvw43543 The inflateMark function in inflate.c in zlib 1.2.8 might allow cont ...
CSCvw43586 A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7 ...
CSCvw43615 An issue was discovered in GnuTLS before 3.6.15. A server can trigge ...
CSCvw44122 ASA: "class-default" class-map redirecting non-DNS traffic to DNS inspection engine
CSCvw46702 FTD Cluster secondary units fail to join cluster due to application configuration sync
timeout
CSCvw47321 IPSec transport mode traffic corruption for inbound traffic for some FPR platforms
Bug ID Headline
CSCvw51950 FPR 4K: SSL trust-point removed from new active ASA after manual Failover
CSCvw51985 ASA: AnyConnect sessions cannot be resumed due to ipv6 DACL failure
CSCvw52609 Cisco ASA and FTD Software Web Services Buffer Overflow Denial of Service
Vulnerability
CSCvw53255 FTD/ASA HA: Standby Unit FXOS is still able to forward traffic even after failover
due to traceback
CSCvw53427 ASA Fails to process HTTP POST with SAML assertion containing multiple query
parameters
CSCvw53796 Cisco ASA and FTD Web Services Interface Cross-Site Scripting Vulnerability
CSCvw53884 M500IT Model Solid State Drives on ASA5506 may go unresponsive after 3.2 Years
in service
CSCvw54640 FPR-4150 - ASA traceback and reload with thread name DATAPATH
CSCvw54802 Revocation check fails to move to none after ocsp check fails due to server being
unavailable
CSCvw60177 Standby/Secondary cluster unit might crash in Thread Name: fover_parse and "cluster
config sync"
CSCvw63862 ASA: Random L2TP users cannot access resources due to stale ACL filter entries
CSCvw74495 Application detection fails for FTP service when an unsuccessful login is encountered.
CSCvw79208 Incorrect URL normalization when "http://" substring is at a latter stage in the input
string
Bug ID Headline
CSCvw81322 FTD running multi-instance mode gets snort GID 3 rules disabled after SRU install
and deploy
CSCvw82629 ASA Tracebacks when making "configuration session" changes regarding an ACL.
CSCvw84339 Managed device backup fails, for FTD, if hostname exceeds 30 characters
CSCvw85377 URL is not updated in the access policy URL filtering rule
CSCvw95301 ASA traceback and reload with Thread name: ssh when capture was removed
CSCvw97821 ASA: VPN traffic does not pass if no dACL is provided in CoA
CSCvw98840 ASA: dACL with no IPv6 entries is not applied to v6 traffic after CoA
CSCvx01381 FMC GUI year drop-down list for Manual Time set up only listing until 2020
CSCvx03764 Offload rewrite data needs to be fixed for identity nat traffic and clustering environment
CSCvx04057 When SGT name is unresolved and used in ACE, line is not being ignored/inactive
CSCvx11460 Firepower 2110 silently dropping traffic with TFC enabled on the remote end
Bug ID Headline
CSCvx16202 self referenced object pushed from FMC results in lina crash with error - loop in grp
hierarchy
CSCvx17785 Crash seen consistently by adding/removing acl & entering into route-map command
CSCvx20352 Snort PDTS buffer corruption during upgrade or heavy traffic load
CSCvx26286 IPV6 address was marked as duplicate on both units and ipv6 Traffic was stopped after
the failover.
CSCvx29771 Firewall CPU can increase after a bulk routing update with flow offload
CSCvx48490 SSL Decrypted https flow EOF events showing 'Initiator/Responder' Packets as 0
CSCvx51860 Failed lookups due to license check when the sensor URL lookup is enabled in 6.4.0.x
CSCvx52122 ASA traceback and reload in SNMP Notify Thread while deleting transparent context
CSCvx59120 COA Received before data tunnel comes up results in tear down of parent session
CSCvx74035 ASA traceback and reload after run "clear configure all" with multiple ACLs and
objects configured
Bug ID Headline
Bug ID Headline
CSCuz24872 Original Client IP does not populate for dropped events when inline normalization
enabled
CSCvi46896 FeedDownloader should not update status to Downloading after download is complete
CSCvm69545 Multiple Cisco Products SNORT HTTP Detection Engine File Policy Bypass
Vulnerability
CSCvo59683 Large number of stale Objects in EOAttributes table results in high CPU/backup failure
CSCvp45786 Not able to upload the STIX or Flat File Manually under Threat Intelligence Director
CSCvp56719 Cisco FMC and FTD Software sftunnel Pass the Hash Vulnerability
CSCvp99327 FMC UI Unresponsive After Attempt To Register Smart License With Smart Satellite
Bug ID Headline
CSCvq20707 Snort rendering block verdict for rules with action of alert.
CSCvq46587 After failover, Active unit tcp sessions are not removed when timeout reached
CSCvr27584 Estreamer process queries wrong database for rna_policy_rules table and causes
excessive logging
CSCvr46901 Analysis Connection Events doesn't show and report all the events in UI
CSCvr51955 Estreamer should terminate a connection when not receiving ACKs for a long time
CSCvr53058 Cisco Firepower Threat Defense Software TCP Intercept Bypass Vulnerability
CSCvr57051 Policy deployment failed with error "Can't use an undefined value as a HASH reference
"
CSCvr63851 SSH via External Auth to NGIPS succeeds then closes immediately
CSCvr76029 FTD-HA: after restoring FTD-HA backup file, snort process will be down
CSCvr76044 FTD Snort Rule Profiling does not work consistently - log folder is missing
CSCvr79974 Configuration might not replicated if packet loss on the failover Link
CSCvr94406 Cannot download TAXII feeds in Intelligence Sources v6.2.3 -> v6.4.0.4 on either
HTTP or HTTPS
CSCvs05066 Snort file mempool corruption leads to performance degradation and process failure.
CSCvs09533 FP2100: Traceback and reload when processing traffic through more than two inline
sets
Bug ID Headline
CSCvs10748 Cisco ASA Software and FTD Software Web Services Denial of Service Vulnerability
CSCvs21705 admin user is not authorized to access the device routing configuration inside the
domain.
CSCvs24215 Firepower Device Manager (FDM) option to disable SSL rekey is not reflected on the
config
CSCvs28290 Cisco Firepower Threat Defense Software SSL Input Validation Denial of Service
Vulnerabili
CSCvs39253 Firepower 7000 & 8000 cannot sent emails on version 6.4
CSCvs41883 Deployment fails after upgrading to 6.4.0.x if ND policy refs are missing
CSCvs49104 Network Discovery Policy rules are ignored if it uses network groups
CSCvs50137 Same Security Zone used in ACP rule is Not pushed to NGFW rules
CSCvs56802 Cisco Firepower 2100 Series SSL/TLS Inspection Denial of Service Vulnerability
CSCvs56888 Cisco Firepower Threat Defense Software TCP Flood Denial of Service Vulnerability
CSCvs64510 Deployment failure with message (Can't call method "binip" on unblessed reference)
CSCvs74452 SFDatacorrelator and Snort process cores repeatedly while loading malware seed file
CSCvs77334 FTD failover due to error "Inspection engine in other unit has failed due to snort and
disk failure"
CSCvs82829 Calls fail once anyconnect configuration is added to the site to site VPN tunnel
CSCvt00113 ASA/FTD traceback and reload due to memory leak in SNMP community string
CSCvt01763 Application classification is not retried if a flow is marked brute force failed.
CSCvt02409 Cisco Firepower Threat Defense Software Inline Pair/Passive Mode DoS Vulnerability
CSCvt03598 Cisco ASA Software and FTD Software Web Services Read-Only Path Traversal
Vulnerability
CSCvt03794 Policy deployment failure after SRU update on FTD with passive zone
CSCvt04377 When vlan encapsulation is exceeded decoding errors are depleting disk space.
Bug ID Headline
CSCvt04535 Allow 30-seconds of NFE microengine missing heartbeat faults before engaging error
recovery
CSCvt13445 Cisco ASA and FTD Software FTP Inspection Bypass Vulnerability
CSCvt16642 FMC not sending some audit messages to remote syslog server
CSCvt20709 Wrong direction in SSL-injected RESET causes it to exit through wrong interface,
causing MAC flap
CSCvt35233 Excessive logging from the daq modules process_snort_verdict verdict blacklist
CSCvt35897 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
DoS Vuln
CSCvt39135 snort instances CPU spikes to >90% at low non-SSL traffic with SSL policy applied
CSCvt41333 Dynamic RRI route is not destroyed when IKEv2 tunnel goes down
CSCvt45863 Crypto ring stalls when the length in the ip header doesn't match the packet length
CSCvt48941 FTD Standby unit does not join HA due to "HA state progression failed due to APP
SYNC timeout"
CSCvt50263 FMC Unable to fetch VPN troubleshooting logs from WM Model devices
CSCvt50946 Stuck uauth entry rejects AnyConnect user connections despite fix of CSCvi42008
CSCvt59253 ASA 9.13.1.7 traceback and reload while processing hostscan data (process name
LINA )
Bug ID Headline
CSCvt60190 Cisco ASA and FTD Web Services File Upload Denial of Service Vulnerability
CSCvt61370 Events may stop coming from a device due to a communication deadlock
CSCvt64270 ASA is sending failover interface check control packets with a wrong destination mac
address
CSCvt64642 FMC -Deployment Failure- Anyconnect - "Certificate Map" using "DC (Domain
Component)" to match cert.
CSCvt66136 6.4.0.9 upgrade from 6.4.0 with CC mode causes httpsd.conf to have an incorrect
config
CSCvt68131 FTD traceback and reload on thread "IKEv2 Mgd Timer Thread"
CSCvt70322 Cisco ASA Software and FTD Software Web Services Denial of Service Vulnerability
CSCvt73806 FTD traceback and reload on FP2120 LINA Active Box. VPN
CSCvt73808 Handling for longer header length messages going from DAQ to Oct driver
CSCvt75241 Redistribution of VPN advertised static routes fail after reloading the FTD on FPR2100
CSCvt78068 Time sync do not work correctly for FTD on FP1000/1100 series platform
CSCvt83121 Cisco ASA and FTD Software OSPFv2 Link-Local Signaling Denial of Service
Vulnerability
CSCvt93142 ASA should allow null sequence encoding in certificates for client authentication.
CSCvu01039 Traceback: Modifying FTD inline-set tap-mode configuration with active traffic
CSCvu08013 DTLS v1.2 and AES-GCM cipher when used drops a particular size packet frequently.
CSCvu15801 Cisco ASA and FTD Software SIP Denial of Service Vulnerability
Bug ID Headline
CSCvu30134 High unmanaged disk usage on /ngfw due to logrotate and missing /var/spool/cron/root
directory.
CSCvu38795 FTD firewall unit cannot join the cluster after a traceback due to invalid interface
GOID entry
CSCvu42434 ASA: High CPU due to stuck running SSH sessions / Unable to SSH to ASA
CSCvu44910 Cisco ASA Software and FTD Software Web Services Cross-Site Scripting
Vulnerability
CSCvu46685 Cisco ASA and FTD Software SSL/TLS Session Denial of Service Vulnerability
CSCvu48285 ASA configured with TACACS REST API: /cli api fail with "Command authorization
failed" message
CSCvu59817 Cisco ASA and FTD Software SSL VPN Direct Memory Access Denial of Service
Vulnerability
CSCvu60923 Editing the IP in a Radius Server Group object results in unintended values for the IP
address
CSCvu63458 FPR2100: Show crash output on show tech does not display outputs from most recent
tracebacks
CSCvu66119 URL rules are incorrectly promoted on series 3 resulting in traffic matching the wrong
rule.
CSCvu70529 Binary rules (SO rules) are not loaded when snort reloads
CSCvu72658 AnyConnect Connected Client IPs Not Advertised into OSPF Intermittently
CSCvu75581 Cisco ASA and FTD Web Services Interface Cross-Site Scripting Vulnerabilities
CSCvu75594 FTD: Traceback and reload when changing capture buffer options on a already applied
capture
CSCvu75615 Cisco ASA Software and FTD Software WebVPN Portal Access Rule Bypass
Vulnerability
CSCvu80370 Cisco Firepower Threat Defense Software SNMP Denial of Service Vulnerability
CSCvu82743 Encoded Rule Plugin SID: value, GID: 3 not registered properly. Disabling this rule
Bug ID Headline
CSCvu83178 Dynamic routing protocols summary route not being replicated to standby
CSCvu83309 Cisco ASA and FTD Web Services Interface Cross-Site Scripting Vulnerabilities
CSCvu91105 High unmanaged disk usage on /ngfw due to large process_stdout.log file
CSCvu98197 HTTPS connections matching 'Do not decrypt' SSL decryption rule may be blocked
CSCvv09944 Lina Traceback during FTD deployment when WCCP config is being pushed
CSCvv13835 Cisco ASA and FTD Web Services Interface Cross-Site Scripting Vulnerabilities
CSCvv16245 Cisco Firepower Management Center Software Common Access Card Authentication
Bypass Vuln
CSCvv33712 Cisco ASA Software Web-Based Management Interface Reflected Cross-Site Scripting
Vulnerabi
CSCvv58604 Reset not sent when traffic matches AC-policy configured with block/reset and SSL
inspection
CSCvw48033 Changes to SNMPv3 authentication & privacy passwords in SNMP alerts not taking
immediate effect
Bug ID Headline
CSCvi34123 ENHancement: Cannot add DNS lists that contain _ at the beginning of the list.
Bug ID Headline
CSCvj00997 "show open-network-ports" not showing the proper infomration on FP4100 Series
CSCvo31790 Cisco Firepower Threat Defense Software Management Interface DoS Vulnerability
CSCvo80853 Cisco Firepower Threat Defense Software Packet Flood Denial of Service Vulnerability
CSCvp57643 FTD/ASA - Cluster/HA - Master/Active unit does not update all the route changes to
Slaves/Standby
CSCvp90847 Refresh Root CAs that SSL uses for resigning in FTD/FMC
CSCvp93468 Cisco ASA Software and Cisco FTD Software SSL VPN Denial of Service Vulnerability
CSCvq10500 captures of both CLISH and LINA doesn't work with IPv6 address
CSCvq35440 Upgrade Enhancements to STRAP verification for anyconnect - Cisco VPN session
replay vulnerability
CSCvq39344 Firepower managed devices may stop responding to SNMPv3 GET/WALK requests
CSCvq93669 Cisco Firepower Threat Defense Software SSL/TLS URL Category Bypass
Vulnerability
CSCvr09468 ASA traceback and reload for the CLI "Show nat pool"
Bug ID Headline
CSCvr20449 Policy deployment is reported as successful on the FMC but it is actually failed
CSCvr21803 Mac address flap on switch with wrong packet injected on ingress FTD interface
CSCvr33586 FPR1010 - Add temperature/warnings for SSD when thresholds are exceeded
CSCvr49833 Cisco Firepower 2100 Series Security Appliances ARP Denial of Service Vulnerability
CSCvr51998 ASA Static route disappearing from asp table after learning default route via BGP
CSCvr54980 FPR2100: Power doesn't turn off after turned off the power button on back of chassis
CSCvr73115 Initial FTD Deploy After Policy Import causes Unused Objects which bloat policy
size
CSCvr78166 Deployment failed on FTD with reason "failed to retrieve running configuration"
CSCvr79008 Session processing delay from FMC wastefully querying all Directory Servers
normalizing bad username
CSCvr90965 FTDv Deployment in Azure causes unrecoverable traceback state due to no dns
domain-lookup any"
CSCvr92168 Cisco ASA and Cisco FTD Software OSPF Packets Processing Memory Leak
Vulnerability
Bug ID Headline
CSCvs00023 port manager crashes with "shutdown" command from clish CLI
CSCvs03023 Clustering module needs to skip the hardware clock update to avoid the timeout error
and clock jump
CSCvs04067 Not able to access FMC devices with Chrome on Mac after upgrade to Catalina.
CSCvs06043 TunnelClient for CSM_CCMservice on ngfwManager not reading ACK sent from
CSM_CCM service on FMC
CSCvs07668 FTD traceback and reload on thread DATAPATH-1-15076 when SIP inspection is
enabled
CSCvs10443 6.5 CloudEvent code writes config files in a way that 6.4 code does not understand
CSCvs12288 Snort unexpectedly exits with SSL policy enabled and debug_policy_all
CSCvs15276 ERROR: entry for ::/0 exists when configuring ipv6 icmp
CSCvs19968 Fix consoled from getting stuck and causing HA FTD policy deployment errors.
CSCvs23750 6.4.0.4 FMC WebUI cannot create a Series-3 stack (Cannot select primary device)
CSCvs28094 Receiving error 403 when editing User Preferences on FP8000 sensors
CSCvs29405 Snort handles traffic as Tagged, when CMD field does not exist in Frame
CSCvs32303 SNMP polling fails on Standby FMC as the snmpd process is in Waiting state
Bug ID Headline
CSCvs34854 FMC generates referred interfaces cli delta after access-list cli delta
CSCvs37013 Prevent octeon_init from getting stuck and causing HA FTD policy deployment errors.
CSCvs47201 GET ALL for devicerecords we get "isPartOfContainer": false for devices part of HA
and cluster
CSCvs47252 ASA traceback and reload when running command "clear capture /"
CSCvs50459 Cisco ASA and Cisco FTD Malformed OSPF Packets Processing Denial of Service
Vulnerability
CSCvs59056 ASA/FTD Tunneled Static Routes are Ignored by Suboptimal Lookup if Float-Conn
is Enabled
CSCvs61392 On firepower devices, hardware rules are not updated after successful policy deployment
CSCvs98634 catalina.<date>.log files can consume all disk space in their partition
CSCvt01397 Deployment is marked as success although LINA config was not pushed
CSCvt15163 Cisco ASA and FTD Software Web Services Information Disclosure Vulnerability
CSCvt33785 IPSec SAs are not being created for random VPN peers
CSCvt46830 FPR2100 'show crypto accelerator statistics' counters do not track symmetric crypto
CSCvt79988 Policy deployment failure due to snmp configuration after upgrading FMC to 6.6
CSCvt93177 Disable Full Proxy to Light Weight Proxy by Default. (FP2LWP) on FTD Devices
Bug ID Headline
CSCul34972 DHCP Client Proxy doesn't disable after FO units are flipped
CSCvk55766 Try to assign devices to platform settings policy list of devices randomly disappear
under policy
CSCvo74833 High unmanaged disk space on Firepower devices due to untracked files
CSCvp06526 Manage the sfhassd thread CPU affinity to match the Snort CPU affinity
CSCvp70833 ASA/FTD: Twice nat Rule with same service displaying error "ERROR: NAT unable
to reserve ports"
CSCvq10239 With SSL HW acceleration enabled, FTD TCP Proxy tears down the connection after
3 retransmissions
CSCvq29969 Firepower Recommendations rule count changes even when not regenerated
CSCvq34160 traceback and reload when establishing ASDM connection to fp1000 series platform
CSCvq43453 Overrides cannot be added for port object if it is used in variable sets in sub domains
CSCvq45105 ENH: Add "Management-access" to FDM flex-config CLI and a CLI-console API
issue via SSE/CDO
CSCvq46587 After failover, Active unit tcp sessions are not removed when timeout reached
CSCvq50587 ASA/FTD may traceback and reload in Thread Name 'BGP Router'
CSCvq51284 FPR 2100, low block 9472 causes packet loss through the device.
Bug ID Headline
CSCvq67271 Retrieving an specfic rule by ID of a child Access Policy returns a 404 : Not Found
status.
CSCvq73599 Cisco VPN session replay vulnerability : STRAP fix on ASA for SSL(OpenSSL 1.0.2)
and SCEP proxy
CSCvq83019 Long processing time to insert policy deploy task if many application filter object used
in ACPolicy
CSCvq87797 Multiple context 5585 ASA, transparent context losing mangement interface
configuration.
CSCvq97346 NAT rules deleted from FDM backend after moving NAT rules in UI and deploying
CSCvr04954 Stack Units: Deploy fails after upgrade on different Domain with unable to load
NDPolicy obj err
CSCvr11395 Only a subset of devices where deployed from a device group during scheduled deploy
CSCvr13823 Cisco Firepower Threat Defense Software Management Access List Bypass
Vulnerability
CSCvr25954 FTD/LINA Standby may traceback and reload during logging command replication
from Active
CSCvr36687 Overrides cannot be added for network object if it is used in variable sets in sub domains
Bug ID Headline
CSCvr53058 AC policy lookup done for SYN+ACK packet when tcp-intercept and a monitor AC
policy is configured
CSCvr60111 configurations getting wiped off from standby, while deployment fails on active
CSCvr61239 Information systems must use the POST method over TLS when transmitting
CSCvr61241 Information Systems implementing file upload feature must validate the file size
CSCvr61252 systems must enforce controls that prevent confidential information from being stored
within cookie
CSCvr66768 Lina Traceback during FTD deployment when PBR config is being pushed
CSCvr81457 FTD traceback when TLS tracker (tls_trk_sniff_for_tls) attempted to free a block.
CSCvr85295 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
Remote
CSCvs10114 Nested network object group not getting expanded for NAP rules resulting in
deployment failure
Bug ID Headline
CSCvr52109 FTD may not match correct Access Control rule following a deploy to multiple devices
Bug ID Headline
Note Version 6.4.0.6 was removed from the Cisco Support & Download site on 2019-12-19. If you are running
this version, we recommend you upgrade. The bugs listed here are also fixed in Version 6.4.0.7.
Bug ID Headline
CSCvm48451 Intrusion Event Performance Graphs load blank on 4100 and 9300
CSCvn24920 VPN-Session doesn't get replicated to standby unit when standby device is upgraded
to 9.12 image
CSCvn77388 SDI - SUSPENDED servers cause 15sec delay in the completion of a authentication
with a good server
CSCvo11280 ASA Enhancement: Generate syslog message once member of the SDI cluster changes
state
CSCvo28118 Traceback in VPN Clustering HA timer thread when member tries to join the cluster
CSCvo43795 OSPF Process ID doesnot change even after clearing OSPF process
CSCvo88762 FTD inline/transparent sends packets back through the ingress interface
CSCvp12582 Option to display port number on access-list instead of well known port name on ASA
CSCvp23109 ASA HA IKEv2 generic RA - AnyConnect Premium All In Use incorrect on standby
CSCvp33341 Cisco ASA and Firepower Threat Defense Software WebVPN Cross-Site Scripting
Vulnerability
CSCvp55941 FILE RESUME BLOCK being randomly thrown causing access issues on files from
SMB share.
CSCvp56805 "Too much data during a write" messages flooding communication channel
Bug ID Headline
CSCvp76944 Cisco ASA and FTD Software WebVPN CPU Denial of Service Vulnerability
CSCvp85736 Cluster master reload cause ping failure to the Management virtual IP
CSCvp87623 Upload an update gives "update request entity too large" error when using CAC(HTTPS
Client Certs)
CSCvq05113 ASA failover LANTEST messages are sent on first 10 interfaces in the configuration.
CSCvq09093 VPN Pre-deploy validations takes around 20 seconds for each device
CSCvq24494 FP2100 - Flow oversubscribing ring/CPU core causing disruption to working flows
on FP2100 platforms
CSCvq54667 SSL VPN may not be able to establish due to SSL negotiation issue
CSCvq57591 When only IP communication is disrupted on failover link LANTEST msg is not sent
on data interfaces
CSCvq59702 Connection events stop coming from device after lost handshake message
CSCvq60131 ASA traceback observed when moving EZVPN spokes to the device.
CSCvq65542 Disable asp load-balance per-packet functionality from fp2100 until all bugs fixed
Bug ID Headline
CSCvq71217 High Disk Utilization due to mysql-server.err failing to rotate after CSCvn30118
CSCvq75743 ASA:BGP recursive route lookup for destination 3 hop away is failing.
CSCvq80318 ASA generates incorrect error message about PCI cfg space when enumerating
Internal-Data0/1
CSCvq81516 VPN events between 12 and 1 PM UTC are not displayed on the FMC
CSCvq83168 DNS lookup using mgmt VRF not possible because FMC doesn't allow interface after
server address
CSCvq94729 Deployment rollback causes momentary traffic drop when error in a LINA ONLY
section of delta cli
CSCvr00892 where clause not working for external data base access
CSCvr07421 Policy deployment fails with 400+ interfaces in security zone due to incorrect formation
of deployDB
Bug ID Headline
CSCvp95663 InlineResult for IPS event missing metadata "Would have blocked"
Bug ID Headline
CSCvq32681 Fail to Wire configuration disabled for multiple interface-pair inline-sets during FTD
upgrades
CSCvq39083 Security Intelligence does not drop HTTPS connections to blacklisted URLs when
SSL policy is enabled
CSCvq41936 Must disable and then re-enable SNMP in FMC UI after adding new user
CSCvq54242 Warning "There is an empty group in the source networks" in SSL policy
CSCvq56138 User login fails into FMC GUI for LDAP user if the password contains SPACE in the
string
CSCvq56462 File policy not inspecting some malware document (.doc) and Adobe flash (.swf) files.
CSCvr23858 Policy deployment from FMC to FTD fails (or takes more time) due to
domain_snapshot_timeout (20m)
Bug ID Headline
CSCvh13869 ASA IKEv2 unable to open aaa session: session limit [2048] reached
CSCvk22322 ASA Traceback (watchdog timeout) when syncing config from active unit (inc.
cachefs_umount)
Bug ID Headline
CSCvm39901 ENH: ASA - support for more than 4 servers in multiple mode.
CSCvn78870 ASA Multicontext traceback and reload due to allocate-interface out of range command
CSCvo03700 ASA may traceback in thread logger when cluster is enabled on slave unit
CSCvo14961 ASA may traceback and reload while waiting for "dns_cache_timer" process to finish.
CSCvo48838 Lina does not properly report the error for configuration line that is too long
CSCvo51265 Cisco Adaptive Security Appliance Software Secure Copy Denial of Service
Vulnerability
CSCvo65741 ASA: BGP routes is cleared on routing table after failover occur and bgp routes are
changed
CSCvo67421 ASA: EzVPN Client does not work after software upgrade to specific releases
CSCvo74350 ASA may traceback and reload. Potentially related to WebVPN traffic
CSCvo74625 6.4.0 - IPv6 routing doesn't work for WM and KP when mgmt gateway configure as
data-interfaces
CSCvo77796 Slow deployment due to slower IntrusionPolicy step in global snapshot population
CSCvo80501 Standby Firewall reloads with a traceback upon doing a manual failover
Bug ID Headline
CSCvo83169 Cisco ASA Software and FTD Software FTP Inspection Denial of Service Vulnerability
CSCvo90153 ASA unable to authenticate users with special characters via https
CSCvp14674 ASAv Azure: Route table BGP propagation setting reset when ASAv fails over
CSCvp19910 Unable to process gtpv1 identification req message for header TEID : 0
CSCvp19998 ASA drops GTPV1 SGSN Context Req message with header TEID:0
CSCvp23137 ASA/FTD generates syslog for missing SSD 2: /dev/sdb is present. Status: Inoperable.
CSCvp30447 Syslog alerts are not sent to server when Global Rule Thresholding is disabled on
Intrusion Policy
CSCvp35384 IKEv2 RA Generic client - stuck outgoing asp table entry - traffic encrypted with stale
SPI
CSCvp38530 Unable to configure more than 100 aaa-server group limit reached
CSCvp45882 Cisco ASA Software and FTD Software SIP Inspection Denial of Service Vulnerability
CSCvp49790 Cisco ASA Software and FTD Software OSPF LSA Processing Denial of Service
Vulnerability
CSCvp54261 Audit syslog for SFR module/7000/8000 devices uses TCP instead of UDP for syslog
communication
CSCvp59864 IP Address stuck in local pool and showing as "In Use" even when the AnyConnect
client disconnects
Bug ID Headline
CSCvp65134 ASA does not respond to DHCP request packet on BVI interface
CSCvp70699 ASA Failover split brain (both units active) after rebooting a Firepower chassis
CSCvp71180 MCA+AAA+OTP with RADIUS challenge fails to send aggauth handle in challenge
CSCvp72412 Timezone displayed in SYSLOG messages but not in the logging buffer
CSCvp80775 Unsupported runtime JavaScript exception handling in the client side WebVPN rewriter
CSCvp84546 ASA 9.9.2 Clientless WebVPN - HTML entities are incorrectly decoded when
processing HTML
CSCvq00005 FTD Traceback and Reload on LINA Caused by SSL Decryption DND Preservation
CSCvq00675 Linux Kernel sas_expander.c Race Condition Arbitrary Code Execution ...
CSCvq06790 Snort processes dump core with memory corruption on Series 3 devices
CSCvq08767 Deployment failing in snort validation- SMTP: Could not allocate SMTP mime
mempool
CSCvq12411 ASA may traceback due to SCTP traffic despite fix CSCvj98964
CSCvq13442 When deleting context the ssh key-exchange goes to Default GLOBALLY!
CSCvq16123 Firepower Dynamic Snort Rules are Disabled After a Deployment Involving a Snort
Reload
CSCvq21607 "ssl trust-point" command will be removed when restoring backup via CLI
CSCvq24134 ASA IKEv2 - ASA sends additional delete message after initiating a phase 2 rekey
Bug ID Headline
CSCvq26794 GTP response messages with non existent cause are getting dropped with error message
TID is 0
CSCvq39828 SFDC crashes inserting into packet_log table after upgrading to 6.4.0
CSCvq50314 Failed SSH Login attempts not being exported via syslog
CSCvq57710 Firepower Primary Detection Engine process might terminated after Manager upgrade
CSCvq61651 URL DB download failure alerts on FMC; new URL DB updates not taking effect on
FMC/FDM
CSCvq86553 Traffic not matching expected ACP rule after updating to 6.4.0
CSCvq97301 Fatal Error message in FMC GUI when upgrading 5525 from 6.4.0-102 > 6.4.0.4-31
but upgrade completes
Bug ID Headline
CSCve24102 GUI should allow max 256 addresses per DHCP pool
CSCvo68448 ASA report SFR module as 'Unresponsive' after reloading ASA module on 5585
platform
CSCvp10132 AnyConnect connections fail with TCP connection limit exceeded error
CSCvp23579 Network FIle Trajectory page takes 90 seconds to load each time
CSCvp25570 Unable to create RAVPN Conn-Profile if group-policy attr and FQDN are edited in
the same wizard flow
CSCvp33052 Firepower 8000 interfaces might flap due to unhandled resource temporarily unavailable
issue
Bug ID Headline
CSCvp58028 natd thread of nfm_exceptiond uses about 90% to 100% CPU time
CSCvp66559 Deploy fails on FTD HA due to exception when parsing big xml response
CSCvp72601 FMC UI: VPN Hub and Spoke topology slow loading
CSCvp72770 BCDB file copy from FMC on to vFTD getting truncated, vFTD running on Azure
platform.
CSCvp94588 HTTP blacklist - blacklist rules are not removed from sensor when unassigned and
deplyed from FMC
CSCvp97799 Policy deploy failure 6.5.0-1148 post upgrade with CC mode with openSSL call during
SSL pol Export
CSCvp97916 Executing 'failover' twice on active unit, clears interface configuration on standby unit
CSCvq07914 FMC 6.4.0 - Policy deployment failure - Duplicate domain entries in domains.conf
Bug ID Headline
CSCuz85967 New added management interface does not have "management-only" configuration
CSCvi63474 Unable to edit the system policy of a SFR module via ASDM after upgrading to 6.2.2
CSCvk06386 FTD Files are Allowed Through Multiple Pre-existing Connections Despite the File
Policy Verdict
CSCvk14242 sfstunnel process in FTD is holding large cloud db files that are already deleted
CSCvn07452 712x devices become unstable when switching inline set from TAP to inline
Bug ID Headline
CSCvn34246 Loading AC policy editor takes too long, needs loading indicator
CSCvn45750 FMC Audit Logs will only display Admin and System as owners when deploying to
3D devices -GUI/SYSLOG
CSCvn74112 FTDv does not have configuration on initial bringup with mix of vmxnet3 and ixgbevf
interfaces
CSCvn86777 Deployment on FTD with low memory results on interface nameif to be removed -
finetune mmap thresh
CSCvo17775 EIGRP breaks when new sub-interface is added and "mac-address auto" is enabled
CSCvo47562 VPN sessions failing due to PKI handles not freed during rekeys
CSCvo50168 Audit Log Settings Failing Leading to being unable to edit System Settings
CSCvo56836 SCALE: with 500+ devices, UMS causes the UI to hang, especially during deploy
CSCvo58847 Enhancement to address high IKE CPU seen due to tunnel replace scenario
CSCvo60580 ASA traceback and reloads when issuing "show inventory" command
Bug ID Headline
CSCvo70545 Cisco Firepower Detection Engine RTF/RAR Malware and File Policy Bypass
Vulnerabilities
CSCvo72179 For SMB, remote storage configuration should allow configuring version string with
dot(.)
CSCvo74745 cloud agent core after generating a large number of continuous URL lookups (>30M)
CSCvo88188 SSL rules with App-ID conditions can limit decryption capability
CSCvo88306 NAT rules can get applied in the wrong order when you have duplicate rules
CSCvo89224 FMC times out after 10 mins to fetch device list for deployment
CSCvo90550 Firepower Recommendations does not enable IPS rules that are GID 3
CSCvp16536 ASA traceback and reload observed in Datapath due to SIP inspection.
CSCvp21837 Allow FTDs to perform URL lookups directly without having to go through the FMC
Pre 6.5.0
CSCvp24787 (snort)File is not getting detected when going over HTTPS (SSL Resign)
CSCvp25583 FTD sets automatically metric 0 when we redistribute OSPF into BGP via FMC GUI.
CSCvp27263 Multiple ClamAV Vulnerabilities For Cisco Firepower Management Center for pre
6.5.0
CSCvp29692 FIPS mode gets disabled after rollback from a failed policy deploy
CSCvp35359 FMC-ISE integration doesn't work if explicit UPN doesn't match implicit UPN
Bug ID Headline
CSCvp36425 Cisco ASA & FTD Software Cryptographic TLS and SSL Driver Denial of Service
Vulnerability
CSCvp43536 On upgraded FMC Device FXOS devices are shown dirty even after successful
deployment.
CSCvp66222 Cisco Firepower Detection Engine RTF/RAR Malware and File Policy Bypass
Vulnerabilities
CSCvp67392 ASA/FTD HA Data Interface Heartbeat dropped due to Reverse Path Check
CSCvp75098 Misleading deploy Warning message when Flex Config policy is being deployed
CSCvp81967 Slowness in loading Device Management page on FMC when there are over 500
managed devices
CSCvp96934 Ensure Error Message with Dup NATs Is Clear and Actionable
CSCvq07573 FMC Global Pre-deployment Phase takes longer after upgrade to 6.4
CSCvq09209 Policy deployment failed with error snort validation failed (Bad value specified for
memcap )
CSCvq34224 Firepower Primary Detection Engine process terminated after Manager upgrade
Bug ID Headline
CSCvp59960 Network discovery not working with network groups containing literals - user or Cisco
created.
Bug ID Headline
CSCuz85967 New added management interface does not have "management-only" configuration
CSCvc56570 Policy deployment failure causes momentary traffic drop and established connection
failure
CSCvg11366 Make sure cleanup happens after calls to for File::Temp when used by MOJO, Syncd.pl,
etc
CSCvh93045 FMC should clean database itself if same device(same SN) with different ip try to get
registered
CSCvi01404 ssl inspection policy may cause sites using ECDSA signed certificates to fail
CSCvi16039 Firepower Management Center not accepting various characters in SNMPv3 password
CSCvi16074 Firepower Management Center misleading errors when entering SNMPv3 passwords
CSCvi25965 Sybase upgrade: After SRU Install, zombie defunct process causes policy deployment
failure
CSCvi32569 Excessive logging in mysql-server.err log causes huge log files in FTD
CSCvi49522 POST or PUT rule with application tag, search, or category filter -> Unable to access
ACP rules GUI
CSCvj08826 FMC: ibdata1 file is growing to large in size (From 300Gb to 2.4TB+ seen)
CSCvj39253 File policy is blocking xlsm when inspect archive option is enabled
Bug ID Headline
CSCvj57511 ASDM: Disabled Rule state of layer policy is reverted to inherit after committing the
changes
CSCvj81798 OOM when deployed an access rule with 10 src/10 dest n/w, 10 src/10 dest ports, 10
subintf in a zone
CSCvk20209 External Auth for FMC not working for RADIUS object through ISE.
CSCvk20381 Traceback loop seen on fresh ASAv Azure, KVM and VMWare deployments
CSCvk29558 FTD VPN : Disabling S2S option "Certificate OU field to determine the tunnel" won't
take effect
CSCvk33503 Flexconfig ethertype command is not parsed which results in deployment failure
CSCvk34648 Firepower 2100 tunnel flap at data rekey with high throughput IPsec VPN traffic
CSCvk43854 Cisco Firepower Threat Defense Detection Engine Policy Bypass Vulnerability
CSCvk45941 Need better logging for deploy failure - bad character in VPN policy
CSCvm04150 All health modules were marked as deleted in health module table after first boot script
ran twice
CSCvm41983 Policy Deployment page final 'deploy' click takes it back to 'Deploy' window.
CSCvm50153 FMC - Deployment failure due to VPN split-tunnel extended ACL using manually
entered ip range
CSCvm54029 6.4.0 - invalid IPV6 RA_VPN sessions are processed by ADI and put into user_ip_map
files
CSCvm54062 Action-queue task got stuck after a file copy from active to standby.
CSCvm60056 After downloading custom DNS security intelligence feed, the webGUI timestamp is
not updated
CSCvm63199 newly configured interface's are not showing for capture command
CSCvm72980 FDM :- FTD does not send complete chain in SSL handshake
Bug ID Headline
CSCvm78028 Unable to add 2 filters with same 'Traffic direction' & 'Filter on Route Type' in RIP
configuration
CSCvm85453 FMC HA : SNMP traps not being sent from New Active FMC post the failover
CSCvm86008 Policy Deployment: Delta config doesn't get copied to running config, LINA config
remains unchanged
CSCvm88294 High Disk utilization due to partition force drain not occurring
CSCvm92210 Unable to deploy anyconnect Group-Url in FTD if it contains user defined port number
CSCvm96642 DSA certificates are currently not supported for Active Authentication.
CSCvn00312 Deploy getting stuck when trying to display errors and warnings
CSCvn13880 Unit traceback at Thread PIM IPv4 or IGMP IPv4 due to timer events when multicast
routing is enabled
CSCvn14511 FMC does not accept curly brace (e.g. "{") in SNMP user authentication configuration
CSCvn19609 Flex Object editor might introduce unexpected line breaks resulting in poliocy
deployment failure
CSCvn23926 OSPFv3 interface authentication SPI must be unique for each interface of a device
CSCvn24920 VPN-Session doesn't get replicated to standby unit when standby device is upgraded
to 9.12 image
CSCvn29101 Cisco Firepower Management Center MySQL Unix Millennium 2028 Date
Vulnerability
CSCvn31882 Flex configuration statements gets duplicated if Deployment mode is set to "Everytime"
CSCvn36022 FMC Object Management to provide information about every ACP/Device that uses
a given object
CSCvn39960 Configuring protected networks for hub and spoke VPN in FMC doesn't take affect
on lina CLI.
CSCvn46358 overloading of the lina msglyr infra due to the sending of VPN status messages
Bug ID Headline
CSCvn47504 VMware balloon driver should be disabled for 6.x
CSCvn71592 After FMC reboot, intrusion events generated by Snort are not sent to FMC and show
up in webGUI
CSCvn81898 Device name doesn't exist in a syslog message if syslog alerting for connection events
is configured
CSCvn82823 FTD HA Interface Monitoring change does not take effect, when interface nameif is
case sensitive
CSCvn85761 FMC Does not allow to create a secret key using special characters in object name
CSCvn91775 FMC GUI should not allow to create a certificate map with numeric name in Objects
> VPN > Cert Maps
CSCvo06383 FMC upgrade from version 6.0.1 to 6.1.0 fails due to database being down
CSCvo19433 Flexconfig document should specify the extent of effect from incorrect config
CSCvo20847 Active FTP fails through Cluster due to xlate allocation corruption upon sync
CSCvo31831 Deleting a base policy does not delete the EOs of child policies
CSCvo35283 Cluster unit getting crash for unit addition/removal for HTTP/POP3 traffic over GRE
CSCvo42884 Cannot make Site-to-site VPN changes on FTD after upgrading to 6.3
CSCvo45675 FMC upgrade process should check configuration that would be invalid after upgrade
Bug ID Headline
CSCvo63232 UIMP not updating users from a realm that resides in a child domain.
CSCvo66575 pxGrid connection broken with ISE 2.6 and ISE 2.4p6 and 2.3p6
CSCvo70866 SGT tag shows untagged in server packet for every client packet with SGT tag with
some value
CSCvo72238 FMC backup fails when FTD cluster is managed in domain and sub-domain AC Policy
is assigned to it
CSCvo74765 FDM policy deployment failure due to Lina Response timed out after 10000
milliseconds
CSCvo80725 vFTD 6.4 fails to establish OSPF adjacency due to "ERROR: ip_multicast_ctl failed
to get channel"
CSCvo81073 Unable to load Device Management page or upgrade FMC due to missing NGFWHA
EO
CSCvo83574 Device goes into a bad state when switching the inline set from TAP mode
CSCvp48453 [DOC] Restoring Version 6.x+ Firepower 7000/8000 device from backup does not
reset the mgmt IP
CSCvp66488 FirePower sent unexpected SNMP trap based off of a snort rule
CSCvp67392 ASA/FTD HA Data Interface Heartbeat dropped due to Reverse Path Check
Bug ID Headline
CSCvp70833 ASA/FTD: Twice nat Rule with same service displaying error "ERROR: NAT unable
to reserve ports"
CSCvq24494 FP2100 - Flow oversubscribing ring/CPU core causing disruption to working flows
on FP2100 platforms
CSCvr45752 FTD HA: deployment fails if one of the units is unhealthy (FDM)
CSCvr51998 ASA Static route disappearing from asp table after learning default route via BGP
CSCvr52410 After registering a new FTD, the subsequent policy deploy fails
CSCvr60111 configurations getting wiped off from standby, while deployment fails on active
CSCvs52227 Firewall engine debug logs being produced in syslog without actually enabling debugs.
CSCvs59056 ASA/FTD Tunneled Static Routes are Ignored by Suboptimal Lookup if Float-Conn
is Enabled
CSCvs81763 vFTD not able to pass vlan tagged traffic (trunk mode)