Cisco Blog » The Platform

2016年3月1日星期二

Cisco Notification Alert -ASA 5500 Series NG Firewall-01-Mar-2016 17:49 GMT

 

 

 

 

 

 

 


Security Advisories & Responses - ASA 5500-X Series Firewalls

Title:
Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability
Description:

A vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.

The vulnerability is due to a buffer overflow in the affected code area. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.

Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.

Cisco has released software updates that address this vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike

Date:
16-FEB-2016

Find additional information in Cisco Security Advisories & Responses

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
7.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa725-15-k8.bin
File Description:

Cisco Adaptive Security Appliance Software. Read Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the 5505, 5510, 5520, 5540, and 5550. Note 5505-5540 may require memory upgrades prior to loading 8.3.2 image. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-22-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-13-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7

Alert Type:
Obsolete File
File Name:
asa917-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5510 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-52-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-13-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7

Alert Type:
Obsolete File
File Name:
asa917-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the 5505, 5510, 5520, 5540, and 5550. Note 5505-5540 may require memory upgrades prior to loading 8.3.2 image. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
7.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa725-15-k8.bin
File Description:

Cisco Adaptive Security Appliance Software. Read Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7

Alert Type:
Obsolete File
File Name:
asa917-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
7.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa725-15-k8.bin
File Description:

Cisco Adaptive Security Appliance Software. Read Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-49-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-13-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the 5505, 5510, 5520, 5540, and 5550. Note 5505-5540 may require memory upgrades prior to loading 8.3.2 image. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
 
Previously Suggested:
 

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7

Alert Type:
Obsolete File
File Name:
asa917-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-37-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
7.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa725-15-k8.bin
File Description:

Cisco Adaptive Security Appliance Software. Read Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the 5505, 5510, 5520, 5540, and 5550. Note 5505-5540 may require memory upgrades prior to loading 8.3.2 image. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-13-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5512-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580-20 and ASA5580-40. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-13-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.26 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5580 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-46-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.26 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-13-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-58-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5585-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5540 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5555-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5520 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5505 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5525-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa825-58-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-22-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.22 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-55-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-57-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-13-k8.bin
File Description:

Cisco Adaptive Security Appliance Software version 8.2.5.13 for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-46-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-49-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-50-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-52-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-41-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-48-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-26-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016
Alert Type:
New File
File Name:
asa825-59-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
13-FEB-2016
Alert Type:
Obsolete File
File Name:
asa825-51-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
13-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-33-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-37-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.3.2 Interim
Alert Type:
Obsolete File
File Name:
asa832-42-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the 5505, 5510, 5520, 5540, and 5550. Note 5505-5540 may require memory upgrades prior to loading 8.3.2 image. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
7.2.5 Interim
Alert Type:
Obsolete File
File Name:
asa725-15-k8.bin
File Description:

Cisco Adaptive Security Appliance Software. Read Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7

Alert Type:
Obsolete File
File Name:
asa917-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
8.4.7 Interim
Alert Type:
New File
File Name:
asa847-30-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release.

File Release Date:
10-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5550 Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2.153
Alert Type:
New File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

File Release Date:
04-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Device Manager
Release Version:
7.5.2
Alert Type:
Obsolete File
File Name:
asdm-752-153.bin
File Description:

Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5.

Obsolete Date:
04-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5515-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance REST API Plugin
Release Version:
1.2.2
Alert Type:
New File
File Name:
asa-restapi-122200-lfbff-k8.SPA
File Description:

Rest API package 1.2.2.200 for ASA

File Release Date:
08-FEB-2016
Find additional information in Software Downloads index.

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2.200

Alert Type:
Obsolete File
File Name:
asa952-203-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASAv. Includes support for VMware, KVM, AWS, and Hyper-V. Please read the Release Note prior to downloading this release.

Obsolete Date:
02-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.0.4 Interim
Alert Type:
Obsolete File
File Name:
asa904-37-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-33-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa904-35-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.3.3 Interim
Alert Type:
Obsolete File
File Name:
asa933-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-2-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa933-1-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.1 Interim

Alert Type:
Obsolete File
File Name:
asa951-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa951-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7 Interim
Alert Type:
New File
File Name:
asa917-4-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
19-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.2.4 Interim
Alert Type:
New File
File Name:
asa924-8-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
26-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.6 Interim
Alert Type:
New File
File Name:
asa916-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
16-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.2 Interim
Alert Type:
New File
File Name:
asa942-11-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.5.2 Interim
Alert Type:
New File
File Name:
asa952-5-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

File Release Date:
23-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.4.1 Interim

Alert Type:
Obsolete File
File Name:
asa941-6-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016
Alert Type:
Obsolete File
File Name:
asa941-7-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
12-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Release Version:
9.1.7.SMP

Alert Type:
Obsolete File
File Name:
asa917-smp-k8.bin
File Description:

Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release.

Obsolete Date:
22-FEB-2016

Software Updates for ASA 5500-X Series Firewalls

Product Name:
ASA 5545-X Adaptive Security Appliance
Software Type:
Adaptive Security Appliance (ASA) Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Known Bugs - ASA 5500-X Series Firewalls

Alert Type:
Updated *
Bug Id:
CSCuu84085
Title:
DHCP-DHCP Proxy thread traceback shortly after failover and reload
Status:
Fixed
Severity:
1 Catastrophic
Description:

Symptom:
Crash as soon as the standby unit becomes primary

Conditions:
DHCP configured on ASA running 9.1(6)5 or 9.1(6)6.

Workaround:
Downgrade to 9.1(6)4

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
100.14(0.16), 100.14(0.30), 100.14(0.42)
Known Fixed Releases: *
100.12(0.131), 100.13(0.81), 100.14(0.49), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54), 100.15(3.9)
Alert Type:
Updated *
Bug Id:
CSCur87011
Title:
ASA low DMA memory on low end ASA-X -5512/5515 devices
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA stops accepting new SSL connections - ASDM / webvpn / AnyConnect

Conditions:
The issue is seen when the following conditions are met :

1) ASA next generation devices - ASA 5512 , ASA 5515
2) SFP module installed on the ASA
3) ASA software 9.2.x or 9.3.1
4) WebVPN configured on an interface

Workaround:
None

Further Problem Description:
Memory was not sufficient, so we increased DMA memory

Last Modified:
29-FEB-2016
Known Affected Releases:
9.0, 9.2(1), 9.3(1), 9.3(3.2)
Known Fixed Releases: *
100.12(0.155), 100.13(0.122), 100.15(0.107), 100.16(0.18), 100.16(1.97), 100.16(14.1), 9.3(3.8), 9.4(2.5), 9.4(2.99), 9.6(0.52)
Alert Type:
Updated *
Bug Id:
CSCuy32321
Title:
Traceback in ldap_client_thread with ldap attr mapping and pw-mgmt
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback in thread name ldap_client_thread

Conditions:
VPN authentication with ldap attribute mapping and the "password-management password-expire-in-days" feature.

Workaround:
Disable the password-mangement feature, or at least the password-expire-in-days warning.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(2.6)
Known Fixed Releases: *
100.13(0.131), 9.2(4.7), 9.4(2.101), 9.4(2.8), 9.6(0.109), 96.1(1.80), 96.2(1.133), 97.1(1.2)
Alert Type:
Updated *
Bug Id:
CSCuv50709
Title:
Standby ASA inside IP not reachable after Anyconnect disconnect
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After Anyconnect VPN is disconnected, standby inside IP is not reachable from active unit or from LAN hosts.

In order to make it reachable again, issue write standby or reconnect VPN again

Conditions:
ASA pair in failover with Anyconnect VPN connecting to the outside interface

Workaround:
write standby or reconnect VPN again

Further Problem Description:
the standby ASA becomes unreachable (inside ip) after disconnecting Anyconnect VPN Client. Reconnecting VPN or ?wr standby? resolves the issue.

When customer disconnects Anyconnect Client session with the outside interface of the ASA, the inside interface of ASA starts dropping traffic with following logs :

Jun 10 12:49:14 192.168.5.21 %ASA-4-113019: Group = XXXX, Username = XXXX, IP = x.x.x.x, Session disconnected. Session Type: SSL, Duration: 0h:20m:55s, Bytes xmt: 0, Bytes rcv: 110890, Reason: User Requested
Jun 10 12:49:14 192.168.5.21 %ASA-4-737032: IPAA: Unable to remove x.x.x.x from standby: address not found

Jun 10 12:49:14 192.168.5.21 %ASA-4-106023: Deny icmp src inside:x.x.x.x dst inside:y.y.y.y (type 8, code 0) by access-group "inside_access_in" [0x0, 0x0]
Jun 10 12:49:19 192.168.5.21 %ASA-4-106023: Deny icmp src inside::x.x.x.x dst inside:y.y.y.y (type 8, code 0) by access-group "inside_access_in" [0x0, 0x0]
Jun 10 12:49:24 192.168.5.21 %ASA-4-106023: Deny icmp src inside::x.x.x.x dst inside:y.y.y.y (type 8, code 0) by access-group "inside_access_in" [0x0, 0x0]
Jun 10 12:49:29 192.168.5.21 %ASA-4-106023: Deny icmp src inside::x.x.x.x dst inside:y.y.y.y (type 8, code 0) by access-group "inside_access_in" [0x0, 0x0]

ACL lookup should not happen for self traffic but even if we add an ACL line to permit the traffic then drop reason is packet tracer is Drop-reason: (fo-standby) Dropped by standby unit

Pings work under normal conditions from active to standby and from lan hosts.

>> Pings work also when anyconnect client is connected.

ASA# sh vpn-sessiondb anyconnect

Session Type: AnyConnect

Username : xxxx Index : 147
Assigned IP : 44.22.254.154 Public IP : 194.98.70.113
Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel
License : AnyConnect Premium
Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES256 DTLS-Tunnel: (1)AES256
Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA1 DTLS-Tunnel: (1)SHA1
Bytes Tx : 13276 Bytes Rx : 96649
Group Policy : xxxx Tunnel Group : xxxx
Login Time : 14:08:02 CEDT Thu Jun 11 2015
Duration : 0h:07m:18s
Inactivity : 0h:00m:00s
VLAN Mapping : N/A VLAN : none
Audt Sess ID : c0a805130009300055797a22
Security Grp : none


syhana-validation/pri/act# ping 192.168.5.21
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.5.21, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

>> After Anyconnect is disconnected, standby ip becomes unreachable.


syhana-validation/pri/act# sh vpn-sessiondb anyconnect
INFO: There are presently no active sessions

syhana-validation/pri/act#
syhana-validation/pri/act#
syhana-validation/pri/act#
syhana-validation/pri/act# ping 192.168.5.21
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.5.21, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)

If Anyconnect VPN is connected again, standby is reachable.
Customer has tried with 2 simultaneous Anyconnect clients. Disconnected first. Standby is reachable.
Disconnected second VPN. Standby is Unreachable

The ide

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.107), 100.14(0.76), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2)
Alert Type:
Updated *
Bug Id:
CSCuv87760
Title:
Unicorn proxy thread traceback with RAMFS processing
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback in Unicorn Proxy Thread while using WebVPN.

Conditions:
Cisco ASA running release 9.3.3.223 with WebVPN enabled.

Workaround:
None.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(4), 9.3(3), 9.3(3.223), 9.4(1.112), 9.4(1.5)
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.14(5.34), 100.15(0.32), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15)
Alert Type:
Updated *
Bug Id:
CSCuu61573
Title:
9.5.2 Gold Setup - Traceback in DATAPATH-6-2596 snp_fp_get_frag_chain
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback on slave unit in cluster after running large amounts of fragmented traffic through the device.

Conditions:
Cisco ASA running release 9.1.6 in a 4-node cluster configure for L2 mode.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.13(0.31), 100.15(1.11), 9.0(1)
Known Fixed Releases: *
100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.29)
Alert Type:
Updated *
Bug Id:
CSCuv87150
Title:
ASA traceback in Thread Name: fover_parse (ak47/ramfs)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA 5525 running version 9.5(1) crashing in Thread Name: fover_parse (ramfs)

Conditions:
ASA is in failover pair.

Workaround:
No workaround

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1.5), 9.5(1)
Known Fixed Releases: *
100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.14(5.34), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3)
Alert Type:
Updated *
Bug Id:
CSCuv42720
Title:
Egress ACL with ICMP Types Misbehaving.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Configuring an ACL on the outbound port of a device may cause some traffic to be dropped even though the ACL policy permits the dropped packet(s).

Conditions:
The following policy applied to
the outbound port will drop packets with Types 2-129.

ASA5506X# show run access-list
access-list unh-out extended permit icmp6 any6 any6 unreachable 0
access-list unh-out extended permit icmp6 any6 any6 unreachable 1
access-list unh-out extended permit icmp6 any6 any6 unreachable 2
access-list unh-out extended permit icmp6 any6 any6 unreachable 3
access-list unh-out extended permit icmp6 any6 any6 unreachable 4
access-list unh-out extended permit icmp6 any6 any6 unreachable 5
access-list unh-out extended permit icmp6 any6 any6 unreachable 6
access-list unh-out extended permit icmp6 any6 any6 packet-too-big 0
access-list unh-out extended permit icmp6 any6 any6 time-exceeded 0
access-list unh-out extended permit icmp6 any6 any6 time-exceeded 1
access-list unh-out extended permit icmp6 any6 any6 parameter-problem 0
access-list unh-out extended permit icmp6 any6 any6 parameter-problem 1
access-list unh-out extended permit icmp6 any6 any6 parameter-problem 2
access-list unh-out extended permit icmp6 any6 any6 echo 0

%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 2, code 0) by access-group "unh-out" [0x0, 0x0]
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 3, code 0) by access-group "unh-out" [0x0, 0x0]
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 3, code 1) by access-group "unh-out" [0x0, 0x0]
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 0) by access-group "unh-out" [0x0, 0x0]
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 1) by access-group "unh-out" [0x0, 0x0]
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 2) by access-group "unh-out" [0x0, 0x0]

ASA5506X# show access-list unh-out
access-list unh-out; 14 elements; name hash: 0x91e2c362
access-list unh-out line 1 extended permit icmp6 any6 any6 unreachable 0 (hitcnt=0) 0x4e0ab796
access-list unh-out line 2 extended permit icmp6 any6 any6 unreachable 1 (hitcnt=20) 0xa549de20
access-list unh-out line 3 extended permit icmp6 any6 any6 unreachable 2 (hitcnt=0) 0x3e3005b5
access-list unh-out line 4 extended permit icmp6 any6 any6 unreachable 3 (hitcnt=0) 0x60363c63
access-list unh-out line 5 extended permit icmp6 any6 any6 unreachable 4 (hitcnt=0) 0xeb98c4e3
access-list unh-out line 6 extended permit icmp6 any6 any6 unreachable 5 (hitcnt=0) 0x4b9b65f1
access-list unh-out line 7 extended permit icmp6 any6 any6 unreachable 6 (hitcnt=0) 0x53e45a3f
access-list unh-out line 8 extended permit icmp6 any6 any6 packet-too-big 0 (hitcnt=0) 0x9b62e1db
access-list unh-out line 9 extended permit icmp6 any6 any6 time-exceeded 0 (hitcnt=0) 0x5362e1e1
access-list unh-out line 10 extended permit icmp6 any6 any6 time-exceeded 1 (hitcnt=0) 0xf7a7cc36
access-list unh-out line 11 extended permit icmp6 any6 any6 parameter-problem 0 (hitcnt=0) 0x453e9232
access-list unh-out line 12 extended permit icmp6 any6 any6 parameter-problem 1 (hitcnt=0) 0x780a5e2e
access-list unh-out line 13 extended permit icmp6 any6 any6 parameter-problem 2 (hitcnt=0) 0x4a0104ef
access-list unh-out line 14 extended permit icmp6 any6 any6 echo 0 (hitcnt=0) 0xf50e5b9d
ASA5506X#
ASA5506X# show runn access-group
access-group unh-out out interface priv

Workaround:
None

Further Problem Description:
N/A

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1)
Known Fixed Releases: *
100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.16(0.9), 100.16(1.36), 100.16(14.1), 100.16(15.1), 100.16(15.5), 9.4(1.7)
Alert Type:
Updated *
Bug Id:
CSCuw92005
Title:
Thread Name: DATAPATH-17-3095: Unit reboots when joining cluster
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA running 9.4.2 may reboot when attempting to join a cluster

Conditions:
ASA configured for Cluster

Workaround:
None at this time

Further Problem Description:

Last Modified:
01-MAR-2016
Known Affected Releases:
9.4(2), 9.5(1)
Known Fixed Releases: *
100.11(0.67), 100.12(0.156), 100.13(0.124), 100.15(0.109), 100.16(0.19), 100.8(40.113), 9.2(4.6), 9.3(3.8), 9.4(2.191), 9.4(2.99)
Alert Type:
Updated *
Bug Id:
CSCux29929
Title:
ASA 9.4.2 traceback in DATAPATH
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:
Traceback within a tcp keepalive timeout.

Conditions:
One piece of a TLS or DTLS connection hits a DPD timeout.

Then a second piece of the connection hits a TCP Keepalive timeout.

Timing between the two events matters, more time that passing increases the likelihood of hitting this crash.

Workaround:
Increase DPD timeouts.

Further Problem Description:

Last Modified:
01-MAR-2016
Known Affected Releases: *
9.1(6), 9.2(3), 9.4(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu02848
Title:
Disable ECDSA SSL Ciphers When Manually Configuring RSA Cert for SSL
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
-Starting in 9.4(x) releases, by default the ASA will attempt to negotiate an ECDSA cipher for TLSv1.2 and offer the ASA temporary self-signed ECDSA certificate to the client
-If an RSA certificate is specified in the configuration, it will only be used if an RSA cipher is decided upon
-This means that if we wish to use a explicitly configured RSA certificate, we must manually disable the ECDSA ciphers as discussed in the 9.4(x) release notes: http://www.cisco.com/c/en/us/td/docs/security/asa/asa94/release/notes/asarn94.html#pgfId-116497

-This enhancement is to change this behavior and make SSL deployment easier
-Ideally, the ECDSA ciphers should be automatically disabled when an RSA certificate is specified in the configuration.

Conditions:
-ASA running 9.4(x) or newer which has support for ECDSA certificate usage with SSL
-SSL services configured (SSLVPN, ASDM, HTTPS, etc;)
-RSA certificate for SSL ("ssl trust-point SSL_CERT_TRUSTPOINT")
-Default settings for SSL ciphers ("show ssl ciphers")

Workaround:
-Disable ECDSA ciphers for TLSv1.2, as discussed in the ASA 9.4(x) release notes
-Choose to use an ECDSA certificate for SSL rather than an RSA certificate

Further Problem Description:
N/A

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4, 9.4(1), 9.5(1)
Known Fixed Releases: *
100.13(0.113), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.4), 100.15(8.18), 100.16(0.4), 100.16(1.10), 9.4(2.1)
Alert Type:
Updated *
Bug Id:
CSCuy09689
Title:
ASA stops processing DHCP Offers in an IKEv1 based RAVPN setup
Status:
Open
Severity:
2 Severe
Description: *

Symptom:
Even though DHCP Offers reach the ASA, these are not processed and thus IPSec VPN session negotiation fails for the entire defined user base. Failure occurs during IKE MODE_CFG and the following syslog message is logged: %ASA-ipaa-7-737001: IPAA: Received message 'UTL_IP_DHCP_INVALID_ADDR'

Conditions:
ASA IKEv1 based RA IPSec VPN solution using external DHCP servers for address allocation.
A network scope attribute is defined in the group policy.
ASA SW 9.1.6

Workaround:
Either : replace the value of the dhcp-network-scope in the group-policy with another one
or, replace the value of the dhcp-network-scope in the group-policy with another one and then set it back to the original value. Both options are valid workarounds.

Further Problem Description:

Last Modified:
03-FEB-2016
Known Affected Releases:
9.1(6.6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus78450
Title:
ASA cert validation fails when suitable TP is above the resident CA cert
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When a client tries to authenticate by sending the cert chain, in this case Client-ID and Sub-CA certificate, because the Sub-CA TP has "no validation-usage" configured, ASA picks up Root-CA TP to validate the certificate chain.

When such a condition occurs, where the validating trustpoint is higher in the hierarchy compared to the highest CA certificate [sent by the client in the certificate chain] resident on the ASA.

Conditions:
ASA running on a version that contains the fix for CSCuq53421 such as 9.1(5)15, 9.3(2), 9.4(1).
Also, the client certificate is issued at least by a first level Sub-ordinate CA. i.e the client certificate hierarchy should be at least 3 levels:
Root -- Sub --- Client-ID

ASA is configured to authenticate clients using their ID certificate.

ASA would have Sub and Root CA loaded.
ASA should end up picking Root CA TP in order to validate the client cert chain.

For example:
the Sub-CA TP could have "no validation-usage" configured

Workaround:
Make sure the validating trustpoint is the same as the highest CA in the client certificate chain

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(5.16)
Known Fixed Releases: *
100.11(0.58), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11)
Alert Type:
Updated *
Bug Id:
CSCus30833
Title:
ASA: Page fault traceback in SXP CORE thread
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An ASA configured for CTS may generate a traceback and reload. The traceback will contain the following strings:

Thread Name: SXP CORE
Page fault: Unknown

Conditions:
The ASA must be configured to receive and process SXP packets from one or more devices. For example:

cts sxp enable
cts sxp connection peer 192.168.110.100 password none mode peer speaker

Workaround:
There is no known workaround at this time.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.3(2)
Known Fixed Releases: *
100.11(0.55), 100.12(0.111), 100.13(0.15), 100.13(1.38), 100.13(19.9), 100.13(21.6), 100.13(23.5), 100.13(24.4), 100.8(40.94), 9.1(6.9)
Alert Type:
Updated *
Bug Id:
CSCus64082
Title:
ASA fails to sync objects with name ANY after upgrade from 8.4 to 9.x
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Standby ASA fails to sync objects with name ANY used in ACE after the zero downtime upgrade from 8.4.x/8.6.x to 9.x.

The below errors are seen on the console during the configuration replication:
ERROR: specified object does not exist
ERROR: object () does not exist.

Due to missing configuration the standby ASA may enter into a boot loop.

Conditions:
ASA configured with object name ANY and that object is used in an access-list.

object network ANY
subnet 0.0.0.0 0.0.0.0

access-list outside-in extended permit tcp object ANY host

Workaround:
1. Use any other object name apart from 'ANY'
2. Rather than using object name 'ANY' use keyword 'any' in ACL configuration
3. Upgrade both the ASAs at the same time

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(2), 9.1(5)
Known Fixed Releases: *
100.11(0.56), 100.8(40.95), 9.0(4.31), 9.1(6.2), 9.1(6.99), 9.1(7), 9.2(3.101), 9.2(4)
Alert Type:
Updated *
Bug Id:
CSCut44075
Title:
Traceback in snp_cluster_get_buffer
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceback in snp_cluster_get_buffer

Conditions:
Single or two node cluster

Workaround:
none

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.0, 9.3(2.101), 9.4(0.117)
Known Fixed Releases: *
100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15), 100.14(26.6)
Alert Type:
Updated *
Bug Id:
CSCut30741
Title:
ASA redirection to Scansafe tower fails with log id "775002" in syslog
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA redirection to Scansafe tower fails with log id "775002" in syslog even when the platform limit for connections was not reached.

Conditions:
Was noticed in version 9.0(2) but could affect any release.

Workaround:
None

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.0(2)
Known Fixed Releases: *
100.11(0.57), 100.12(0.116), 100.13(0.52), 100.13(21.9), 100.13(29.28), 100.14(0.4), 100.14(1.4), 100.14(10.7), 100.14(11.7), 100.14(2.9)
Alert Type:
Updated *
Bug Id:
CSCus51289
Title:
ASA: Traceback when removing manual NAT rule
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA: Traceback when removing manual NAT rule

Conditions:
The user must be removing a manual NAT rule from the configuration with the following characteristics:

1. The destination portion of the rule must contain an object with a large range of addresses
and
2. The rule must contain a service object

An example rule that may trigger this crash is:

object network src
host 192.168.10.1
object network dest
range 10.0.0.0 10.255.255.255
object service port
service tcp source eq 80
nat (inside,outside) source static src src destination static dest dest service port port
no nat (inside,outside) source static src src destination static dest dest service port port

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-FEB-2016
Known Affected Releases:
8.4(5), 9.1(6)
Known Fixed Releases: *
100.11(0.55), 100.12(0.111), 100.13(0.22), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(12.1), 100.14(2.1)
Alert Type:
Updated *
Bug Id:
CSCsw20002
Title:
Cmd replication gets out of sync if config t is executed in sub-menu.
Status:
Terminated
Severity:
2 Severe
Description:


Symptom:

Standby ASA parser command out of sync with active ASA

Conditions:

ASA running failover. Active ASA already in the sub-command mode when
standby ASA join the HA cluster, or Active ASA did not issue exit cmd
to get out of sub-command mode.





Workaround:

Always start with main mode when standby ASA just joined the ASA cluster.
If standby ASA is stuck in the sub-mode, use exit cmd to bring it back to
main mode.


Further Problem Description:












Last Modified:
04-FEB-2016
Known Affected Releases: *
100.7(0.29), 7.0(7), 9.5(0.106), 96.1(1.59)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux98895
Title: *
ASA traceback in Thread Name: IPv6 ND
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
ASA crash in Thread Name: IPv6 ND

Conditions:
IPV6 Address configured on the ASA .

Workaround:
No workaround

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases:
9.0(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux82835
Title:
Nat pool exhausted observed when enabling asp transactional-commit nat
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Syslogs observed:

%ASA-3-202010: NAT pool exhausted. Unable to create ICMP connection from inside:90.90.90.2/0 to outside:4.2.2.2/0
%ASA-3-202010: NAT pool exhausted. Unable to create ICMP connection from inside:90.90.90.2/0 to outside:4.2.2.2/0
%ASA-3-202010: NAT pool exhausted. Unable to create TCP connection from inside:90.90.90.2/49167 to outside:10.105.130.1/80
%ASA-3-202010: NAT pool exhausted. Unable to create TCP connection from inside:90.90.90.2/49167 to outside:10.105.130.1/80


Also noticing udp section is missing for nat pool:

ciscoasa# show nat pool
TCP PAT pool outside, address 10.105.130.199, range 1-511, allocated 1
TCP PAT pool outside, address 10.105.130.199, range 512-1023, allocated 0
TCP PAT pool outside, address 10.105.130.199, range 1024-65535, allocated 0


ciscoasa# show run all xlate
xlate per-session permit tcp any4 any4
xlate per-session permit tcp any4 any6
xlate per-session permit tcp any6 any4
xlate per-session permit tcp any6 any6
xlate per-session permit udp any4 any4 eq domain
xlate per-session permit udp any4 any6 eq domain
xlate per-session permit udp any6 any4 eq domain
xlate per-session permit udp any6 any6 eq domain
xlate block-allocation size 512
xlate block-allocation maximum-per-host 4

Conditions:
1. asp rule-engine transactional-commit nat is enabled on the ASA.
2. At least one static nat rule is created for port forwarding for the same public pool IP.

Workaround:
Disable asp transactional commit and then reload the ASA.

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
9.5(2)
Known Fixed Releases: *
96.1(1.65), 96.2(1.117)
Alert Type:
Updated *
Bug Id:
CSCut10078
Title:
Standby ASA does not apply OSPF route after config replication
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Standby unit was not following the OSPF routes that were replicated from the Active unit and installed in its routing table. For example, when trying to ping 10.202.7.135 from the Standby unit the ASA claimed it had no route to the host:

Conditions:
OSPF configured on active/standby ASA 5555 pair running 9.1.5.21

Workaround:
A 'write standby' from the Active unit to force a bulk sync fixes the problem, though the routing table doesn't seem to change. I was able to reproduce the problem several times

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(5.21)
Known Fixed Releases: *
100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12)
Alert Type:
Updated *
Bug Id:
CSCuu86195
Title:
conn-max counter is not decreased accordingly
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Problem description:
- after the maximum number of TCP connections for a class-map are exceeded the counter for the active connections("current conns") starts to decrease into negative values
- all the new connections that are matching our configured policy are dropped even if we are not exceeding the number of configured connections
%ASA-3-201011: Connection limit exceeded -36/30 for input packet from 10.100.48.4/54675 to 172.29.41.10/8443 on interface in

Similar scenarios:
- legitimate connections are dropped when the counter:
- "current conns" is decreased into negative values; Ex: -36/30
- "current conns" is not dropping to zero(after all the connections are closed) and is stuck to a random value; Ex: 26/30 --> just 4 new connectios are allowed
- "current conns" is going over the maximum value and is not dropping to zero(after all the connections are closed); Ex: 32/30

Conditions:
issue observed in ASA software version 9.2.2 and 9.2.24(tested versions) just for TCP traffic

Workaround:
N/A

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.2(2), 9.2(2.4)
Known Fixed Releases: *
100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57)
Alert Type:
Updated *
Bug Id:
CSCuv12884
Title:
Unable to authenticate with remove aaa-server from different context
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Authentication error on a context when he removed aaa-server config from different context.

Conditions:
-Some contexts is using same LDAP server.

Workaround:
ASA reload

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
8.6(1), 9.1(5), 9.2(3)
Known Fixed Releases: *
100.11(0.61), 100.12(0.136), 100.13(0.89), 100.14(0.67), 100.14(16.8), 100.14(5.32), 100.15(0.21), 100.15(1.38), 100.15(10.4), 100.15(15.2)
Alert Type:
Updated *
Bug Id:
CSCut15570
Title:
Anyconnect SSL VPN certificate authentication fails o ASA
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Anyconnect SSL VPN certifcate authentication fails o ASA

Conditions:
-- certificate authentication
-- in debug crypto ca the following error is observed:

CERT-C: I pkixpath.c(1170) : Error #72

Workaround:

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(1)
Known Fixed Releases: *
100.11(0.57), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11)
Alert Type:
Updated *
Bug Id:
CSCuw00971
Title:
ASA truncates url-redirect at 160 chars for ra vpn clients (ISE 1.3+)
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
--- URL redirect is not working for clients connected via ra vpn clients

The url redirect feature is used to support some ISE posture assessment flows

Conditions:
--- ISE using the posture assessment feature
------ ISE 1.3 is more likely to require long url-redirect attributes
--- ASA 9.2.1 and above (ISE posture assessment not supported on ASA versions <9.2.1)
--- RA vpn client

Workaround:
--- Use Anyconnect SSL VPN client

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.2(1), 9.5(2)
Known Fixed Releases: *
100.11(0.62), 100.12(0.146), 100.13(0.98), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.79), 100.15(16.3), 100.15(17.1)
Alert Type:
Updated *
Bug Id:
CSCur09141
Title:
RRI static routing changes not updated in routing table
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Clearing the crypto config for a S2S tunnel does not remove the static reverse route from the routing table. We can see stuck route in the routing table.

Conditions:
RRI being used with static crypto map for a S2S tunnel. The crypto map config is removed using the clear config command.

Workaround:
None.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.12(0.131), 100.13(0.81), 100.14(0.48), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.53), 100.15(3.9)
Alert Type:
Updated *
Bug Id:
CSCuv01177
Title:
ASA: traceback in IDFW AD agent
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA5585 in failover pair may traceback in IDFW process.

Conditions:
ASA running IDFW features.

Workaround:
Disable IDFW.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.2(3)
Known Fixed Releases: *
100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57)
Alert Type:
Updated *
Bug Id:
CSCut12513
Title:
ASA allows citrix ICA connection without authentication
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cisco ASA Clientless SSL VPN integration with Citrix includes the download of a .ica file from the Citrix server and serving this to the client.
The .ica file includes a session token to connect to the Citrix server.

This file is stored on the client pc and deleted by the Citrix client once the session with Citrix is terminated.

If this file is copied on a different machine, it is possible to reuse this file to connect to the Citrix server via the Clientless SSL VPN
feature without requiring authentication as far as the session of the user that initially authenticated to the Clientless SSL VPN Portal is still
active.

Conditions:
The file needs to be copied from the initial pc and the authenticated user session should still be active.

Workaround:
none


PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:


Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.13(29.28), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15)
Alert Type:
Updated *
Bug Id:
CSCuu78835
Title:
Webvpn rewrite issues for Confluence - by atlassian on latest v6.4.5
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
On the latest atlassian version of 6.4.5 for Confluence, we have following issues when using it over clientless SSL:

1. For a new "create content" page, only the title of the page can be added, the body of the page is not editable.
2. When trying to add a comment, the body of the comment is missing, so cannot add anything.

Conditions:
Using Atlassian version 6.4.5 for Confluence

Workaround:
Use the older versions of Atlassian

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
100.8(40.67), 9.2(2), 9.3(2), 9.3(3.229), 9.4(1)
Known Fixed Releases: *
100.12(0.132), 100.13(0.82), 100.14(0.57), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12)
Alert Type:
Updated *
Bug Id:
CSCti05769
Title:
Migration of max_conn/em_limit to MPF is completely wrong in 8.3
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Migration to Modular Policy Framework may yield an incorrect configuration. This may result in loss of TCP Intercept protection against SYN
floods coming from the outside as MPF limits are configured in incorrect direction. Protection against server overloading may also be lost
because the migrated configuration incorrectly limits the number of outbound established connections from the server to the outside.

Conditions:

Workaround:
Configuration, created by migration process, must be removed and limits must be set manually via MPF and in proper direction.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
19-FEB-2016
Known Affected Releases:
8.3(1)
Known Fixed Releases: *
100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57)
Alert Type:
Updated *
Bug Id:
CSCuv38654
Title:
rewriter returns 302 for a file download
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CLientless rewriter returns 302 error code erronously

Conditions:
Downloading a file from a rewritten page

Workaround:
Unknown, none

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.4(1.4)
Known Fixed Releases: *
100.11(0.61), 100.12(0.137), 100.13(0.91), 100.13(29.28), 100.14(0.68), 100.14(16.4), 100.14(5.27), 100.15(0.22), 100.15(1.42), 100.15(10.4)
Alert Type:
Updated *
Bug Id:
CSCuu27334
Title:
ASA: Traceback with Thread Name - AAA
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA device Traceback with Thread Name:- AAA

Conditions:
ASA device running ASA 9.1(4) version

Workaround:
Upgrade to 9.1.6.4 or later.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(4)
Known Fixed Releases: *
100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.18), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53)
Alert Type:
Updated *
Bug Id:
CSCuu45813
Title:
ASA Name Constraints dirName improperly verified
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a dirName constraint, the ASA fails with the error:
CERT-C: I pkixpath.c(2726) : Error #751h
CRYPTO_PKI:Invalid certificate received (status = 1873)
CRYPTO_PKI:Invalid RA certificate received

Conditions:

Workaround:

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(1), 9.1(2), 9.3(1), 9.4(1)
Known Fixed Releases: *
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13)
Alert Type:
Updated *
Bug Id:
CSCut95793
Title:
ASA: Anyconnect IPv6 Traceroute does not work as expected
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traceroute does not work as expected while connected with anyconnect vpn client to ASA running software version 9.0(4)30. Traceroute completes but does not show intermediate hops, rather we see aestrick "*" for intermediate hops.

Conditions:
Anyconnect 3.1.05170
ASA 9.0.4(30), 9.1(4)

Workaround:
None

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.0(4.30)
Known Fixed Releases: *
100.11(0.61), 100.12(0.137), 100.13(0.93), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(15.11), 100.15(16.1)
Alert Type:
Updated *
Bug Id:
CSCut01856
Title:
ASA dropping traffic with TCP syslog configured in multicontext mode
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA dropping traffic in multiple-context mode with TCP syslog server unreachable.

Conditions:
-ASA in multiple context mode
-TCP syslog server configured on one of the contexts.
-"no logging permit host-down" configured on a context.

Workaround:
On removing and adding the context , which is having the issue,back the issue goes away.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.2(2.8)
Known Fixed Releases: *
100.11(0.58), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38)
Alert Type:
Updated *
Bug Id:
CSCuv45756
Title:
ASA may tracebeck when displaying packet capture with trace option
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA traceback.

Conditions:
ASA running 9.4(1) displaying captures with trace detail option.

Workaround:
Avoid using trace detail option in captures.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.4(1)
Known Fixed Releases: *
100.11(0.62), 100.12(0.140), 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86)
Alert Type:
Updated *
Bug Id:
CSCuv10938
Title:
'redistribute' cmds under 'router eigrp' removed on deleting any context
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
'redistribute' commands under 'router eigrp' removed from unrelated contexts when deleting any context with EIGRP configured and redistribution enabled. Error of following format is seen on ASA's console:

ERROR: unable to locate route-map

Conditions:
1. ASA is multiple context mode.
2. More than one context on the ASA has EIGRP enabled with redistribution configured.
3. Issue seen on deleting any of the contexts that meet the criteria in point 2 above using command "no context ".

Workaround:
None apart from re-adding all those commands back manually.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.4(1.3)
Known Fixed Releases: *
100.11(0.61), 100.12(0.134), 100.13(0.85), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62)
Alert Type:
Updated *
Bug Id:
CSCuu46569
Title:
ASA CA certificate import fails with different types of Name Constraints
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a URI or DNS constraint, the ASA fails with the error:
CERT-C: I pkixpath.c(2726) : Error #751h
CRYPTO_PKI:Invalid certificate received (status = 1873)
CRYPTO_PKI:Invalid RA certificate received

Conditions:

Workaround:

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(1), 9.1(2), 9.3(1), 9.4(1)
Known Fixed Releases: *
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13), 100.15(1.15)
Alert Type:
Updated *
Bug Id:
CSCuu56912
Title:
ASA change non-default port to 443 for https traffic redirected to CWS
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA change non-default port to 443 for https traffic redirected to CWS

When user type in web browser url htts://X.X.X.X:YYYY debug scansafe generates
...
Complete Connect Method (513)
CONNECT X.X.X.X:443 HTTP/1.0
HOST: X.X.X.X:443
...

For traffic captured on outside interface towards CWS tower in 'Follow TCP Stream' statistic Wireshark display
CONNECT X.X.X.X:443 HTTP/1.0
HOST: X.X.X.X:443

Conditions:
ASA is configured to redirect non-default port for https traffic to CWS.

Workaround:
NONE

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.0, 9.1, 9.4
Known Fixed Releases: *
100.12(0.129), 100.13(0.79), 100.13(29.28), 100.14(0.39), 100.14(16.1), 100.14(5.19), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8)
Alert Type:
Updated *
Bug Id:
CSCut39985
Title:
Per-session PAT RST sent to incorrect direction after closing session
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
When Per-session PAT is configured, RST,ACK is sent to Non close initiator side after closing TCP session. It should be sent to close initiator side(The device which send FIN first).

xlate per-session permit tcp any4 any4
no xlate per-session deny tcp any4 any4

Conditions:
Per-session PAT is configured like below

xlate per-session permit tcp any4 any4
no xlate per-session deny tcp any4 any4

Workaround:
Disable Per-session PAT

xlate per-session deny tcp any4 any4

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1
Known Fixed Releases: *
100.11(0.58), 100.12(0.121), 100.13(0.65), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13)
Alert Type:
Updated *
Bug Id:
CSCuv05386
Title:
Clientless webvpn on ASA does not display asmx files
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Clientless user selects bookmark from webportal. The page does not display correctly, there is a portion of the page that is garbled or is missing text

Conditions:
-Clientless user authenticates to the webportal, then selects bookmark that points to internal HTTP site.
-The user see's garbled or incomplete text returned from the ASA.

Workaround:
Smart Tunnel resolves the issue.
Using the stand alone AC client resolves the issue.

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.1(6)
Known Fixed Releases: *
100.11(0.61), 100.12(0.136), 100.13(0.90), 100.14(0.68), 100.14(16.8), 100.14(5.32), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4)
Alert Type:
Updated *
Bug Id:
CSCtg74172
Title:
Can get around dynamic-filter by using caps in domain name
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Cisco ASA BTF feature should not be case sensitive. User can get around BTF feature with using CAP letters in domain names.

Conditions:
Configuring whilte and black lists for BTF

Workaround:

Not known

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
8.2(2.12)
Known Fixed Releases: *
100.11(0.62), 100.12(0.145), 100.13(0.97), 100.14(16.8), 100.14(5.32), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45)
Alert Type:
Updated *
Bug Id:
CSCti76899
Title:
rtcli: traceback in rtcli async executor process, eip ci_set_mo
Status:
Fixed
Severity:
2 Severe
Description: *

Symptom:

ASA crash

Conditions:

export ... stdout" CLI commands that were issued on the Active and Standby as a part of backup procedure

Workaround:

none

Last Modified:
24-FEB-2016
Known Affected Releases:
8.0(5.9)
Known Fixed Releases:
100.5(5.45), 100.7(0.65), 100.7(6.10), 100.7(8.1), 8.0(5.21), 8.1(2.49), 8.2(4.2), 8.2(5), 8.3(2.8), 8.4(0.99)
Alert Type:
Updated *
Bug Id:
CSCuw55813
Title:
Standby ASA traceback in Thread Name: EIGRP-IPv4
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Standby ASA crashing in Thread Name: EIGRP-IPv4

Conditions:
ASA failover pair running EIGRP.

Workaround:
no workaround

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
9.5(1)
Known Fixed Releases: *
100.13(0.130), 9.3(3.8), 9.4(2.101), 9.6(0.101), 96.1(1.76), 96.2(1.128)
Alert Type:
New
Bug Id:
CSCuy46176
Title:
ASA Crashed during transition to active during upgrade with traceback
Status:
Open
Severity:
2 Severe
Description:

Symptom:
Customer was in the process of upgrading a pair of our customer's firewalls from 9.1.6 to 9.1.7. They first reloaded the standby firewall into the new code without issue. However, once making the standby firewall active, it would immediately crash and generate the below traceback.

fw/sec/act# failover active


Switching to Active
fw/sec/act#
fw/sec/act#
fw/sec/act#
Thread Name: Dispatch Unit
Page fault: Address not mapped
vector 0x0000000e
edi 0x111d8f86
esi 0x00000000
ebp 0x73f49c88
esp 0x73f49bf0
ebx 0x7b3f395c
edx 0x00000000
ecx 0x6d925b40
eax 0x00000000
error code 0x00000004
eip 0x08a1c247
cs 0x00000073
eflags 0x00013246
CR2 0x0000002c

Conditions:
It crash when ASA running 91.7 and customer try to make it active.

Workaround:
No Workarounds

Further Problem Description:
Na

Last Modified:
25-FEB-2016
Known Affected Releases:
9.1(7)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy47428
Title:
ASA reload in Thread Name: websns_rcv_tcp
Status:
Open
Severity:
2 Severe
Description:

Symptom:
ASA reloads in Thread Name: websns_rcv_tcp when configuring WebSense url-server server

Conditions:
ASA version 9.1.6.8

Workaround:
NA

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux81683
Title:
ASA Traceback on Thread Name: Unicorn Admin Handler
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA crashed after nat config change

Conditions:
TCM enabled for NAT, and object static PAT being edited

Workaround:
Turn off the TCM for NAT and reload

Further Problem Description:

Last Modified:
26-FEB-2016
Known Affected Releases:
9.5(2)
Known Fixed Releases: *
100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.2(4.6), 9.3(3.8), 9.4(2.99), 96.1(1.54)
Alert Type:
Updated *
Bug Id:
CSCux08783
Title:
CWS: ASA does not append XSS headers
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
User intermittently receive "access denied" messages when browsing through the Cisco Cloud Web Security service.

Conditions:
ASA Connector redirection to CWS.

Workaround:
Adding static egress IP(s) as Scanning IPs in the ScanCenter portal will prevent users from seeing the "access denied" messages, but user/group information will not be passed to the service, so policies will not be applied.

Further Problem Description:
This message does not reflect the default block page from CWS.

Last Modified:
28-FEB-2016
Known Affected Releases:
9.2(4), 9.4(1)
Known Fixed Releases: *
100.13(0.131), 9.4(2.101), 9.6(0.109), 96.2(1.133)
Alert Type:
Updated *
Bug Id:
CSCux71197
Title:
"show resource usage" gives wrong number of routes after shut/no sh
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
when running in multiple context mode, shut/no shut on the interface will update the route resource usage, the ASA does not reset the counter, but add new routes, resulting in reaching the limit

when there is high network fluctuation, route resource will eventually deplete and the ASA will fail to add routes, resulting in an outage

Conditions:
none

Workaround:
reload the ASA

Further Problem Description:

Last Modified:
28-FEB-2016
Known Affected Releases:
100.8(40.111), 9.5(2), 96.1(1.71)
Known Fixed Releases: *
100.13(0.131), 9.6(0.109), 96.2(1.134)
Alert Type:
New
Bug Id:
CSCuy50264
Title:
VPN-LB L2L "cluster encryption" is failing
Status:
Open
Severity:
2 Severe
Description:

Symptom:
VPN-Load Balacing L2L (cluster encryption) fails to establish. Get IKE/ipsec error:
"Can't load an IPSec SA! The corresponding IKE SA contains an invalid logical ID."

Conditions:
VPN-LB secure (custer encryption) L2L between ASAs.

Workaround:
Disable VPN-LB cluster encryption (no cluster encryption).

Further Problem Description:

Last Modified:
28-FEB-2016
Known Affected Releases:
9.4(2.101)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy11084
Title:
ASA standby unit may traceback while running EEM script
Status:
Terminated
Severity:
2 Severe
Description:

Symptom:
The EEM script , a list of ASA CLIs, is replicated to the standby ASA, just like any other configuration CLI. Depending on the CLI, it may cause unwanted behavior, including causing the ASA to traceback. For example, operationally, it makes no sense to add/import a Clientless SSL VPN bookmark on active and standby units simultaneously. The Failover HA synchronization will conflict with the import operation in this case and cause an unstable condition, including a traceback.

Conditions:
Running Embedded Event Manager on ASA, with action-config-based CLIs on the Failover-standby ASA.

Workaround:
Limit monitoring-based CLIs (show) in the EEM script executing on the ASA standby unit.
Remove action-based-config and execution commands from the Standby ASA EEM script.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases: *
9.4(2.100), 96.1(1.62)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv96011
Title:
OSPF over IKEv2 L2L tunnel is broken on ASA with 9.2.1 onwards
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
OSPF over IKEv2 L2L tunnel is broken on ASA in 9.2(1) onwards. Routes are installed into OSPF database successfully, but they are absent in the main routing table.

Conditions:
-IKEv2 L2L configured to propagate routes over OSPF on ASA running 9.2.1 or above.

Workaround:
-Downgrade the ASA to 9.1(5), if an option.
-Use IKEv1 tunnel

Further Problem Description:
None

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(1), 9.3(3), 9.4(1), 9.5(1)
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15)
Alert Type:
Updated *
Bug Id:
CSCut40770
Title:
Interface TLV to SFR is corrupt when frame is longer than 2048 bytes
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Some configured ASA interfaces missing or not displayed from Firesight Management Center

Conditions:
Interface TLV ethernet frame greater than 2048 bytes. Usually occurs with multiple interfaces and sub-interfaces configured with lengthy names for each interface.

Workaround:
Enable jumbo-frame reservation on ASA.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(1.221), 9.4(2)
Known Fixed Releases: *
100.11(0.64), 100.11(0.67), 100.12(0.153), 100.12(0.156), 100.13(0.119), 100.13(0.127), 100.14(0.82), 100.15(0.80), 100.15(20.14), 100.15(20.15)
Alert Type:
Updated *
Bug Id:
CSCuy43839
Title:
ASA reloads in thread name: DATAPATH while encrypting L2L packet
Status:
Open
Severity: *
2 Severe
Description:

Symptom:
ASA reloads in DATAPATH thread

Conditions:
ASA running 9.2.4.5 reloads in DATAPATH thread after upgrade from 9.2.4. IPSec L2L is configured. Other branches may be affected.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(4.5)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuu48197
Title:
ASA: Stuck uauth entry rejects AnyConnect user connections
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Intermittently, the User VPN sessions fail to establish due to a stuck uauth entry associated with the same Pool/to-be-Assigned IP address of the new User.

Syslog:
%ASA-5-722010: Group User IP SVC Message: 16/ERROR: Detected internal error in SSL connection..
%ASA-4-113019: Group = , Username = , IP = , Session disconnected. Session Type: SSL, Duration: 00:00m:12s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested

- While debugging, we see the following:

debug webvpn anyconenct:
webvpn_cstp_accept_address: 192.168.1.10/255.255.255.0
''snip''
vpn_put_uauth failed!
webvpn_cstp_send_error: 503 Service Unavailable

sh ip local pool :
shows that the address 192.168.1.10 is available.

debug pix uauth:
vpn_putuauth: ERR: uxlate collision for ip 192.168.1.10 user USER-B on interface OUTSIDE

show uauth:
remote access VPN user 'USER-A' at 192.168.1.10, authenticated <<< Stuck entry for "another user"

show vpn-sessiondb anyconnect filter name USER-A :
no entries

here, notice that the address that is being assigned to USER-B is 192.168.1.10, and this is available in the local pool I.e. This address was assigned to another user [USER-A] in the past. This user does not show up in the vpn-sessiondb indicating that he has already logged off.

Conditions:
ASA running on OS version [Ex: 9.2(1)] that has the fix for:
CSCuh08432 Anyconnect sessions do not connect due to uauth failure

This ASA is acting as AnyConnect SSLVPN Server.

Workaround:
None.
Either reload the ASA or failover to the standby ASA.

Or Start using a new IP address pool for the Connection entry

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(1)
Known Fixed Releases: *
100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.70), 100.16(14.1), 100.8(40.109), 9.1(6.109), 9.1(7)
Alert Type:
Updated *
Bug Id:
CSCuu82229
Title:
ikev2 with DH 19 and above fails to pass traffic after phase2 rekey
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
after rekey fails to pass traffic

Conditions:
after rekey using DH 19 or above

Workaround:
use lower DH (1,2,5,14)

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4, 9.4(1), 9.5(1)
Known Fixed Releases: *
100.13(0.113), 100.14(0.79), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9), 9.4(2.1), 9.4(2.99)
Alert Type:
Updated *
Bug Id:
CSCur46371
Title:
TLSv1.2 Client Cert Auth Connection Establishment Failure
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Connection establishment failure only for TLS 1.2 using ECDSA in client mode, so ASA connecting out to an SSL server with certificate authentication configured.

Conditions:
ASA connecting out to an SSL server with certificate authentication configured.

Workaround:
Do not configure certificate authentication on the SSL web server.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.13(15.11), 9.3(2)
Known Fixed Releases: *
100.13(0.112), 100.14(0.78), 100.15(0.53), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9), 9.4(2.5), 9.4(2.99)
Alert Type:
Updated *
Bug Id:
CSCuv43902
Title:
ASA: Watchdog Traceback with Thread Name:- SXP CORE
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA device traceback in thread name:- SXP CORE

Conditions:
ASA device configured with the trust sec configuration.

Workaround:
No workaround as of now

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(3)
Known Fixed Releases: *
100.12(0.138), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.53), 100.15(15.14), 100.15(16.1), 100.15(2.83)
Alert Type:
Updated *
Bug Id:
CSCut71095
Title:
ASA WebVPN clientless cookie authentication bypass
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In some instances, the ASA WebVPN clientless session ID is included the URL. Session ID's should only be stored in cookies and transmitted over
secure channels.

Conditions:
-- WebVPN

Workaround:
none

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1, 9.4(1)
Known Fixed Releases: *
100.11(0.64), 100.12(0.130), 100.12(0.153), 100.13(0.118), 100.13(0.80), 100.13(29.28), 100.14(0.44), 100.14(0.82), 100.14(16.1), 100.14(5.21)
Alert Type:
Updated *
Bug Id:
CSCut49034
Title:
ASA: High CPU on standby due to RDP conn to AC client from CL SSL portal
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
CPU on standby ASA spikes to 100%

Conditions:
Host (connecting through clientless VPN with RDP plugin)rdp to a host connected through anyconnect VPN.
Stateful failover configured on an active-standby failover pair.

Workaround:
None

Further Problem Description:
High CPU on standby ASA unit due to a specific connection on the ASA from a host connecting to clientless VPN when stateful failover is enabled.
Host (connecting through clientless VPN )rdp to a host connected through anyconnect VPN.

When this particular connection goes through the ASA, we find that the active ASA builds a single connection.
standby ASA builds numerous connections with same source and destination ports.
Connection on the primary/active:
act/pri/alan3usv01# sh conn all add 66.241.60.197 | i 3389
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:00, bytes 4131029, flags UO
Connections on secondary:(close to 2500)
stby/sec/alan3usv01# sh conn all add 66.241.60.197 | i 3389
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:05, bytes 4131029, flags UO
TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:06, bytes 4131029, flags UO

We see a lot of connection teardown on the standby for this connection.
Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554151 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:02 bytes 252687 TCP Reset-O
Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554254 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:01 bytes 252687 TCP Reset-O

We also see a lot of reset packets in asp drops in the standby ASA.
1: 19:00:25.358578 0000.0000.0000 0000.0000.0000 0x0800 Length: 54
66.241.60.197.62481 > 10.145.44.253.3389: R [tcp sum ok] 0:0(0) ack 0 win 0 (ttl 255, id 52738)
Drop-reason: (mp-svc-no-channel) SVC Module does not have a channel for reinjection
The interesting thing is the source MAC and the destination MAC is 0 in this ASP drop.

We see overruns on the failover interface of the standby unit.
stby/sec/alan3usv01# show int gig0/3
Interface GigabitEthernet0/3 "failover1", is up, line protocol is up
Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec
Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps)
Input flow control is unsupported, output flow control is off
Description: LAN/STATE Failover Interface
MAC address 5475.d091.518f, MTU 1500
IP address 10.99.101.114, subnet mask 255.255.255.248
432217782 packets input, 556229026142 bytes, 0 no buffer
Received 556 broadcasts, 0 runts, 0 giants
204523310 input errors, 0 CRC, 0 frame, 204523310 overrun, 0 ignored, 0 abort
And we see a lot of packets being transferred from active to standby ASA.

In the failover debugs we only find the following messages in the debugs of fover rx.
lu_rx: HA TRANS: receive message for client vpnfo, length 48
lu_rx: HA TRANS: receive message for client vpnfo, length 72
lu_rx: HA TRANS: receive message for client vpnfo, length 72

The CPU profiler points that the high CPU on the standby ASA is due to LU updates when we decode the CPU profile output from the standby ASA.

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(2), 9.1(5.21)
Known Fixed Releases: *
100.11(0.62), 100.11(0.63), 100.12(0.142), 100.12(0.148), 100.13(0.106), 100.13(0.95), 100.14(0.71), 100.14(0.76), 100.14(16.8), 100.14(16.9)
Alert Type:
Updated *
Bug Id:
CSCuv66333
Title:
ASA picks incorrect trustpoint to verify OCSP Response
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA may fail to verify a valid OCSP response during OCSP revocation check for VPN clients.

Conditions:
Revocation check is enabled under the trustpoint using OCSP and an override using cert-map is not configured

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.0, 9.2(3)
Known Fixed Releases: *
100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.48), 100.15(17.20), 100.15(3.71), 100.15(8.17), 100.16(0.3), 100.16(1.7)
Alert Type:
Updated *
Bug Id:
CSCus10787
Title:
Transactional ACL commit will bypass security policy during compilation
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Traffic can bypass the security policy when transactional-commit access list is configured. This can happen only when a new ASA is added to a
cluster and the access-list configuration is newly applied. The bypass can happen only during the compilation time.
Additionally interface security policy will still be respected so no traffic will be passed from an interface with lower security level to an
interface with higher security level.

Conditions:
Cisco ASA Software is affected by this issue if the transactional-commit access list feature is enabled. This can be determined by using the show
running-config asp rule-engine transactional-commit access-group command and verifying that it returns output.
The following example shows a Cisco ASA configured with transactional-commit feature:

ciscoasa# show running-config asp rule-engine transactional-commit access-grou$
asp rule-engine transactional-commit access-group

Note: Transactional-commit feature is not configured by default.

Workaround:
There is no workaround other then disabling the feature

Further Problem Description:
A vulnerability in the transactional-commit access list feature of Cisco Adaptive Security Appliance (ASA) Software could allow an
unauthenticated, remote attacker to bypass interfaces access control policies and send traffic through the affected system.

The vulnerability is due to improper implementation of the feature. . An attacker could exploit this vulnerability by sending traffic through the
affected system while the system boot for the first time or while an affected system join a cluster. Additionally interface security policy will
still be respected so no traffic will be passed from an interface with lower security level to an interface with higher security level. An
exploit could allow the attacker to send traffic through the system bypassing the interfaces access control policies.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.111), 9.1(6.104), 9.1(6.112)
Alert Type:
Updated *
Bug Id:
CSCun21186
Title:
ASA traceback when retrieving idfw topn user from slave
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Slave unit crashes when trying to join the master. This happens in configuration replication.

Conditions:
After configuring a Context on an active cluster the Slave disables clustering.

When correcting differences in context configuration try to have slave rejoin. The slave will crash.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.0(2)
Known Fixed Releases: *
100.13(0.128), 100.8(38.121), 100.8(40.62), 100.8(56.26), 100.8(64.3), 100.8(65.3), 100.8(66.4), 100.8(67.1), 9.0(4.8), 9.1(5.1)
Alert Type:
Updated *
Bug Id:
CSCus16416
Title:
Share licenses are not activated on failover pair after power cycle
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
The Share/Combine licenses are not activated on failover pair after power cycle the failover pair.
Both active and standby units turns off power and boots up the standby unit only, the Shared/Combined licenses on standby unit will be lost.

Conditions:
Failover environments.

Workaround:
Execute once the 'reload command' on failover pair.

Further Problem Description:
None

Last Modified:
29-FEB-2016
Known Affected Releases:
9.0, 9.1(5.19)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.16(0.9), 100.16(14.1), 100.16(15.1), 100.16(15.5)
Alert Type:
New
Bug Id:
CSCuy50752
Title:
ASA 5585 9.2.4 crash
Status:
Other
Severity:
2 Severe
Description:

Symptom:
ASA crashed with Thread Name: DATAPATH-1-2076

Conditions:
ASA-SSP-40 running version 9.2.4

Workaround:
none

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv49446
Title:
ASA traceback on Standby device during config sync in thread DATAPATH
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA traceback on Standby device in thread DATAPATH

Standby ASA crashes during failover synchronization.
There are cases where the ASA crashed multiple times and then got stabilized.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(3)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.95), 100.15(20.22), 100.16(0.10), 100.16(1.50), 100.16(14.1), 100.16(15.7)
Alert Type:
Updated *
Bug Id:
CSCuo08193
Title:
Traceback in Thread Name: DATAPATH-1-1382 while processing nat-t packet
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA may traceback in Thread Name: DATAPATH-1-1382

Conditions:
ASA Version 8.4 and 9.x configured to terminate IPSecVPN. In rare circumstances, the ASA may reload while processing an inbound nat-t packet.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.4(7.15), 9.0(4.30)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.77), 100.15(20.13), 100.15(8.24), 100.16(0.8), 100.16(1.26), 100.16(14.1)
Alert Type:
Updated *
Bug Id:
CSCuc11186
Title:
ARP: Proxy IP traffic is hijacked.
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
In certain conditions, ASA doesn't check the source of the ARP request or GARP packets for addresses it performs NAT translation for.
Proxy-arp cache may thus get polluted and cause traffic hijacking for addresses ASA does NAT for.

Conditions:
Configured NAT on the ASA for which it performs proxy-arp.

Workaround:
None

Further Problem Description:
NOTE: The fix for this issue may cause the ASA to not reply to ARP requests if the Source IP in the ARP request overlaps with a NAT rule on the ASA. This may occur when the nat configuration line is overly broad (such as an all zeros configuration, or any. To workaround this, add the keyword "no-proxy-arp" to the nat config line.



The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.8/4.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:P/A:P/E:F/RL:U/RC:C&version=2.0
CVE ID CVE-2012-5010 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
29-FEB-2016
Known Affected Releases:
8.2(4)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.15(8.32), 100.16(0.9), 100.16(1.36), 100.16(14.1)
Alert Type:
Updated *
Bug Id:
CSCus53126
Title:
ASA traffic not sent properly using 'traffic-forward sfr monitor-only'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
After using 'traffic-forward sfr monitor-only', traffic is forwarded from MGMT0/0 interface instead of forwarding from selected interface. It is also causing lack of IP connectivity to the ASA through MGMT0/0

Conditions:
Running ASA in transparent mode. Issuing the command for any ASA built-in ports (G0/0, G0/1 etc). When using blade ports (G1/0, G1/1 etc.) the command works as described in the manual.

Workaround:
unknown

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(2.4)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.85), 100.15(0.99), 100.16(0.12), 100.16(1.51), 100.16(14.1), 100.16(15.7), 9.2(4.6)
Alert Type:
Updated *
Bug Id:
CSCtz98516
Title:
Observed Traceback in SNMP while querying GET BULK for 'xlate count'
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
An ASA firewall may crash when being polled by SNMP in rare circumstances.

Conditions:
This has been seen primarily in the 8.4.x ASA code train. The first fix is in ASA interim code 8.4.4.2. To
trigger the bug, the ASA must be queried via SMP for GETBULK of the xlate OID:

1.3.6.1.4.1.9.10.77.1.2.1

Workaround:
Stop polling the ASA firewall via SNMP until an upgrade to the fixed code can be performed or modify the
OID's being polled by your SNMP monitor station to not include the affected OIDs.

Last Modified:
29-FEB-2016
Known Affected Releases:
100.7(22.1)
Known Fixed Releases: *
100.11(0.57), 100.12(0.118), 100.12(0.156), 100.13(0.127), 100.13(0.58), 100.13(28.2), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9)
Alert Type:
Updated *
Bug Id:
CSCuv58559
Title:
Traceback in Thread Name: DATAPATH on modifying "set connection" in MPF
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASA Traceback in Thread Name: DATAPATH

Conditions:
1) While modifying the "set connection" config under MPF.
2) Live traffic is passing through both units matching the MPF connection policy.

Workaround:
Do not modify the connection MPF policy while live traffic is inspected through it.

Further Problem Description:
Sample config :

policy-map global_policy
class conn-test
set connection conn-max 4000 embryonic-conn-max 2500

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(3.2)
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2)
Alert Type:
Updated *
Bug Id:
CSCut10103
Title:
ASA 5545x Upgrade to 9.2(2)4 causes Traceback in Thread Name SSL
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Upgrade from 9.0(2) directly to 9.2(2)4 causes 5545x to traceback in thread name SSL

Conditions:
Using out of the box (Default Configuration) upgrade 5545x from 9.0(2) to 9.2(2)4

Workaround:
none

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(2.4)
Known Fixed Releases: *
100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 9.4(2.99), 9.6(0.99), 96.1(1.26)
Alert Type:
Updated *
Bug Id:
CSCuu91304
Title:
Immediate FIN from client after GET breaks scansafe connection
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
Connections through the ASA to a scansafe tower may fail if the client sends a FIN packet immediately following a GET packet. This hangs the TCP connection and causes the transaction to fail.

Conditions:
This is seen if the CLIENT sends a TCP FIN packet before any data comes back from the TOWER.

Workaround:
None at this time

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(5.21)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.71), 100.15(17.32), 100.15(20.11), 100.15(8.23), 100.16(0.6), 100.16(1.19)
Alert Type:
Updated *
Bug Id:
CSCuu06081
Title:
ASAv licesing enforcement should not be CLI parser based
Status:
Fixed
Severity:
2 Severe
Description:

Symptom:
ASAv doesn't accept CLI commands without proper license in place.

Conditions:
NA

Workaround:

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(2)
Known Fixed Releases: *
100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2), 100.16(1.2), 9.4(1.203), 9.5(1.201), 9.5(1.99)
Alert Type:
Updated *
Bug Id:
CSCup93708
Title:
Error when same-security-traffic is deleted and added
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:Below mentioned error is seen whenever same-security-traffic permit intra-interface command is cleared and configured.
Error:
ciscoasa(config)# same-security-traffic permit intra-interface
ERROR: Unable to install security ruleson NP

Conditions:When the command is entered for the first time there is no error seen. If the command is reconfigured or if it is deleted and re-added then the error will pop up and the command will not be accepted.
Workaround:No Workaround

Last Modified:
01-FEB-2016
Known Affected Releases:
100.12(1.17)
Known Fixed Releases: *
100.12(10.30), 100.12(21.1), 100.8(40.113)
Alert Type:
Updated *
Bug Id:
CSCux36742
Title:
ASA: Neighbor command not being removed on clearing interface config
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Neighbor command not being removed on clearing interface configuration under the eigrp configuration.

Conditions:
ASA configured with eigrp configuration using the static neighbor commands.

Workaround:
Remove the complete router configuration or configure the interface again with the nameif and then remove the neighbor command

Further Problem Description:

Last Modified:
01-FEB-2016
Known Affected Releases:
9.1(6.10)
Known Fixed Releases: *
100.8(40.113)
Alert Type:
Updated *
Bug Id:
CSCuu19489
Title:
ASA inspection-MPF ACL changes not inserted into ASP table properly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
New ACL changes not taking effect for inspection policies.

When adding new rules to the top of an existing ACL which is mapped to an inspection policy, the ASA installs this rule incorrectly at the bottom of its ASP table. This is applicable for any inspection policy that has an ACL bound to it.

Conditions:
There should be an ACL bound to an inspection policy.

Workaround:
Remove and re-apply the service-policy or remove and re-apply the effected class-map in the policy-map.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.0(4)
Known Fixed Releases: *
100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54), 100.15(3.8)
Alert Type:
Updated *
Bug Id:
CSCus83476
Title:
More than 255 messages in multicast packet with jumbo frames
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
PIM join messages are lost after passing through the ASA.

Conditions:
1. ASA has jumbo-frames enabeld and has an MTU of 5134 or higher
2. Multicast routing is enabled on ASA and there are more than 255 (*/S,G) groups on it

Workaround:
Disable jumbo frames or use MTU lower than 5134

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
8.4(6)
Known Fixed Releases: *
100.11(0.57), 100.12(0.115), 100.13(0.47), 100.13(21.8), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.8)
Alert Type:
Updated *
Bug Id:
CSCur21069
Title:
Cisco ASA Failover Command Injection Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Cisco Adaptive Security Appliance (ASA) Software is affected by the following vulnerabilities:

Cisco ASA Failover Command Injection Vulnerability
Cisco ASA DNS Memory Exhaustion Vulnerability
Cisco ASA VPN XML Parser Denial of Service Vulnerability

Successful exploitation of the Cisco ASA Failover Command Injection Vulnerability would allow an attacker to submit failover commands to the failover units, which may result in an attacker taking full control of the systems.

Successful exploitation of the Cisco ASA DNS Memory Exhaustion Vulnerability may result in system instability and dropped traffic.

Successful exploitation of the Cisco ASA VPN XML Parser Denial of Service Vulnerability may result in a crash of the WebVPN process, which may lead to the reset of all SSL VPN connections, system instability, and a reload of the affected system.


Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available for the Cisco ASA Failover Command Injection Vulnerability and Cisco ASA DNS Memory Exhaustion Vulnerability. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-asa

Note: The resolution of the vulnerability in the Cisco Security Advisory Cisco ASA FirePOWER Services and Cisco ASA CX Crafted Packets Denial of Service Vulnerability, cisco-sa-20150408-cxfp, released on the 8th of April may require an upgrade of the Cisco ASA Software release. Cisco ASA customers should review cisco-sa-20150408-cxfp before deciding which Cisco ASA Software release to upgrade to.

The Cisco Security Advisory Cisco ASA FirePOWER Services and Cisco ASA CX Crafted Packets Denial of Service Vulnerability is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-cxfp

Conditions:
See published Cisco Security Advisory

Workaround:
See published Cisco Security Advisory

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS sscores as of the time of evaluation are 8.3/6.9:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-0675 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-FEB-2016
Known Affected Releases:
9.2(0.1)
Known Fixed Releases: *
100.11(0.55), 100.11(0.56), 100.12(0.108), 100.12(0.114), 100.13(0.13), 100.13(0.40), 100.13(1.22), 100.13(16.26), 100.13(19.7), 100.13(20.3)
Alert Type:
Updated *
Bug Id:
CSCuu16983
Title:
ASA: failover logging messages appear in user context
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Failover syslog messages should appear in the admin context, but they appear in user context.

Conditions:
ASA in multi-context mode.

Workaround:

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(5.19), 9.2(2.8)
Known Fixed Releases: *
100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9)
Alert Type:
Updated *
Bug Id:
CSCuu02761
Title:
DNS should perform IPv4 lookups if IPv6 address is not reachable
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
DNS returns IPv6 addresses which are not reachable by ASA

Conditions:
IPv6 is enabled on at least one ASA interface.

DNS lookups are configured.

Hosts are accessed by name rather than IP or IPv6 address.

Workaround:
Options:
1. If this is a manual operation (e.g. ping), then specify the IP or IPv6 address.

2. disable IPv6 on all interfaces.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.11(0.58), 100.12(0.123), 100.13(0.69), 100.13(21.13), 100.14(0.10), 100.14(10.14), 100.14(26.11), 100.14(5.14), 100.14(6.16), 100.14(7.16)
Alert Type:
Updated *
Bug Id:
CSCup89922
Title:
ASA DNS lookups always prefer IPv6 response
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A DNS server configured on the ASA will always use IPv6 DNS requests
(type=AAAA) if any of the interfaces are configured with IPv6. There is
no way to prevent this behaviour, or make the ASA prefer and sending
type=A requests.

Conditions:
This only occurs if IPv6 is enabled on any interface of the ASA, even if no Globally Unique Address is assigned. If IPv6 is enabled, then the ASA only makes Type=AAAA DNS requests. This will always result in an IPv6 DNS response, and potentially cause features that depend on DNS to fail (ie. Smart Call Home).

Workaround:
Disable all IPv6 addresses on the ASA.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(0.2), 9.1(1), 9.1(5)
Known Fixed Releases: *
100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15)
Alert Type:
Updated *
Bug Id:
CSCuc16228
Title:
Can't use an object-group for NAT which was used for pat-pool earlier
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Same object-group cannot be used in NAT when it was used in PAT earlier


Conditions:
PAT configured, followed by removal of NAT or clear-conf-nat, New NAT rule try to use that object-group as now NAT pool


Workaround:
No workaround


Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
8.4(2), 8.4(4.3), 8.4(4.8)
Known Fixed Releases: *
100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.61), 100.14(16.1), 100.14(5.24), 100.14(7.45), 100.15(1.26), 100.15(19.1), 100.15(2.58)
Alert Type:
Updated *
Bug Id:
CSCus03141
Title:
ipsec-datapath:TFW management connection via VPN takes a few minutes
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Telnet/ssh access via IPsec VPN takes a few minutes on transparent ASA.

Conditions:
- Connect to a transparent ASA using telnet/ssh via IPsec VPN
- ASA 8.4.4.1 or later

Workaround:
Do not use IPsec for management access.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
8.4(4.1), 8.6(1.2), 9.1(4), 9.1(5)
Known Fixed Releases: *
100.11(0.55), 100.12(0.109), 100.13(0.14), 100.13(1.27), 100.13(16.28), 100.13(19.8), 100.13(20.4), 100.13(21.5), 100.13(23.2), 100.13(24.1)
Alert Type:
Updated *
Bug Id:
CSCuj59405
Title:
Current IP on Standby not updated if standby IP is not configured
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
A standby firewall may continue to 'show' that it has a STANDBY IP address configured if a standby was one configured, but then removed from the configuration.

Conditions:
This is seen when an interface has a standby IP address configured and then removed:

asa(config)# interface Ethernet0/1
asa(config-if)# ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2

The standby shows that it has IP 192.168.1.2 assigned to its interface, now simply re-apply the 'ip address' command again without the standby address

asa(config-if)# ip address 192.168.1.1 255.255.255.0

The standby will continue to show it is using 192.168.1.2

Workaround:
Completely remove the IP address entry prior to re-adding it:

asa(config-if)# no ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2
asa(config-if)# ip address 192.168.1.1 255.255.255.0

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
100.8(38.31), 9.1, 9.1(6.10)
Known Fixed Releases: *
100.10(0.37), 100.10(1.21), 100.10(2.3), 100.10(3.1), 100.10(9.1), 100.8(38.63), 100.8(40.41), 100.8(45.8), 100.8(46.28), 100.8(51.5)
Alert Type:
Updated *
Bug Id:
CSCut64327
Title:
L2TP/IPsec traffic dropped due to "vpn-overlap-conflict"
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
After upgrading the code from 911 to 912/916 l2tp/Ipsec users are not able to access inside resources.

Inside hosts can reach connected l2tp/Ipsec client fine

Set up:
*******
10.48.100.0/24-----[inside] ASA [outside]---------ISP---------------Site-to-Site-VPN-peer----10.48.0.0/16 ( contains multiple subnets in 10.48.x.0/24 range, so it has been summarized to /16)
|
|
|------------------l2tp/ipsec-vpn user (10.48.252.128-10.48.252.254)

NOTE: VPN pool falls under remote site to site network /16 range, to prevent it from matching static crypto map a deny entry has been added.

*************
access-list test line 1 extended deny ip 10.48.100.0 255.255.255.0 10.48.252.0 255.255.255.0
access-list test line 3 extended permit ip 10.48.100.0 255.255.255.0 10.48.0.0 255.255.0.0
*************
Presence of either of two ACE shown above causes the drop/"vpn-overlap-conflict", only removal of both fixes the traffic issue and l2tp/Ipsec client can reach inside resources fine.


'sh asp drop' shows huge increments in 'vpn-overlap-conflict' counter.

Conditions:
VPN pool falls under remote site to site network /16 range, to prevent it from matching static crypto map; a deny entry has been added to static map ACL.


access-list test line 1 extended deny ip 10.48.100.0 255.255.255.0 10.48.252.0 255.255.255.0 //** Deny vpn pool
access-list test line 3 extended permit ip 10.48.100.0 255.255.255.0 10.48.0.0 255.255.0.0 //** site to site vpn ACE

Workaround:
Use a different range/subnet for RA users.

Further Problem Description:

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(1), 9.1(6)
Known Fixed Releases: *
100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12)
Alert Type:
Updated *
Bug Id:
CSCus06165
Title:
ASA:Dataplane capture doesn't capture packets From Service module to ASA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASA Data plane capture does not capture packets From Service module to ASA.

Conditions:
This works fine till 9.1.2.8 (It captures packets in both directions) and is broken in all images after that.

Workaround:
Downgrade to 9.1.2.8 or lower.

Further Problem Description:
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via
normal resolution channels.

If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another
evaluation.

Additional information on Cisco's security vulnerability policy can be found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(3)
Known Fixed Releases: *
100.11(0.56), 100.12(0.113), 100.13(0.35), 100.13(19.9), 100.13(20.11), 100.13(21.7), 100.14(0.3), 100.14(1.2), 100.14(10.4), 100.14(11.4)
Alert Type:
Updated *
Bug Id:
CSCum28756
Title:
ASA: Auth failures for SNMPv3 polling after unit rejoins cluster
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When SNMPv3 is enabled on an ASA cluster, polling will fail if the master unit leaves and then rejoins the cluster. SNMP requests will be dropped with the following syslog:

%ASA-3-212006: Dropping SNMP request from 10.1.110.100/7330 to inside:10.1.103.32/snmp because: authentication algorithm failure for user: myuser

This occurs because the hash for the user's auth/priv string is not correctly re-hashed against the physical unit's engine ID after it rejoins the cluster. Since engine IDs are not synced between members of the cluster, the hash on each physical unit should be different:

ASA1:
Engine ID: 80000009fe5d4579a9207e3747684083e2f4c5d427fc8c165b
snmp-server user myuser mygroup v3 encrypted auth sha f7:a2:da:02:3e:89:9f:42:a6:b7:e8:f4:24:8f:23:b9:aa:d6:a0:60 priv aes 128 f7:a2:da:02:3e:89:9f:42:a6:b7:e8:f4:24:8f:23:b9

ASA2:
Engine ID: 80000009fee3fa40539e73ff2d3b3c29eeca4794c9ccb3ada7
snmp-server user myuser mygroup v3 encrypted auth sha ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5:85:2c:a7:2c priv aes 128 ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5

In a broken state, the hashes will be in sync. This means that authentication attempts to that physical unit will fail since a hash against the engnie ID yields a mismatched result:

ASA1: <<<<< SNMPv3 authentication against this physical unit will fail since it is configured with a hash from ASA2
Engine ID: 80000009fe5d4579a9207e3747684083e2f4c5d427fc8c165b
snmp-server user myuser mygroup v3 encrypted auth sha ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5:85:2c:a7:2c priv aes 128 ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5

ASA2:
Engine ID: 80000009fee3fa40539e73ff2d3b3c29eeca4794c9ccb3ada7
snmp-server user myuser mygroup v3 encrypted auth sha ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5:85:2c:a7:2c priv aes 128 ff:c3:34:8a:3c:1a:1e:62:7f:19:10:27:6e:29:a8:d5

Conditions:
This issue only occurs if the unit leaves and rejoins the cluster. If the SNMPv3 user is configured while the units are still members of the cluster, the auth/priv strings will be hashed correctly.

Workaround:
Removing and re-configuring the SNMPv3 user will cause the hashes to get recalculated against the respective engine IDs correctly. For example:

clear config snmp-server user
snmp-server user v3 auth md5 priv aes 128

Note that the clear-text strings are provided here and the 'encrypted' keyword is specifically left out of the command. This ensures the ASA will recalculate new encrypted hashes based on the clear-text strings and appropriate engine ID.

Further Problem Description:
After this bug-fix, you will notice the following behavior change introduced:

SNMPv3 "snmp-server user" CLI will no longer replicate be replicated in the cluster units.

It is recommended that the customers clear existing SNMPv3 "snmp-server user" CLI from cluster configurations and, after this fix, re-add in the "snmp-server user" CLI on the master using the clear text passwords. The clear text passwords would then be localized on each host (a "write memory" should be executed on each host to make sure the localized versions get saved). Configuring this on the master after the cluster has been fully established means that the customer only has to run this CLI once per user.

Last Modified:
04-FEB-2016
Known Affected Releases:
9.1(3)
Known Fixed Releases: *
100.11(4.1), 100.8(38.114), 100.8(40.60), 100.8(56.20), 100.8(62.2), 100.8(64.1), 100.8(65.3), 100.8(66.4), 100.8(67.1), 9.1(6.100)
Alert Type:
Updated *
Bug Id:
CSCtb71323
Title:
Cisco ASA Webtype ACL By-Pass Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
On ASA web type access-list''s do not honor case sensitivity and hence it does not
allow us to configure two access-list entries as below:

access-list abcd webtype permit url http://cisco/TEST
access-list abcd webtype permit url http://cisco/test
INFO: Specified entry already exists in access-list ''abcd''

Conditions:
ASA Software version 9.1(2)

Workaround:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 3.5/3.3:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0
No CVE ID has been assigned to this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:


Last Modified:
08-FEB-2016
Known Affected Releases: *
100.5(0.26), 100.8(38), 8.2(1), 8.4
Known Fixed Releases:
100.10(0.76), 100.10(2.8), 100.10(6.1), 100.10(7.1), 100.10(9.1), 100.11(4.1), 100.8(38.112), 100.8(40.59), 100.8(56.17), 100.8(63.2)
Alert Type:
Updated *
Bug Id:
CSCux41432
Title:
PLR: ASAv clone produces an error when requesting a new request token
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
If you clone an ASAv licensed in PLR (in KVM or VMWare) the clone comes up with information about being licensed. If you issue a 'license smart reservation request' the ASAv thinks it is licensed. The show license commands verify that the ASAv is not licensed.

Conditions:
ASAv was licensed in PLR before cloning.

Workaround:
The workaround is to issue a 'license smart reservation return' to generate a return code. This allow the ASAv to be licensed with PLR.

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases:
100.15(8.39)
Known Fixed Releases: *
100.15(8.45), 96.2(1.120)
Alert Type:
Updated *
Bug Id:
CSCux07142
Title:
Issues with smart license expired, revoked and invalid tokens
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When an ASAv tries to register with a bad idtoken, the registration process is locked for 15 minutes or more. Expired tokens, revoked tokens, and mis-typed tokens all fall in the category of "bad tokens".

Conditions:
This issue occurs when an attempt to register the ASAv with the license server is attempted and then reloaded.

Workaround:
First issue the 'license smart deregister' command to clear the condition that cause registration attempts to hang. Then attempt to register the ASAv.

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases:
100.15(8.27)
Known Fixed Releases: *
100.15(8.41), 96.2(1.120)
Alert Type:
Updated *
Bug Id:
CSCsi43680
Title:
lots of cpu-hog events with failover enabled
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
There are many CPU hog events displayed on the ASA 5550 right after a reload.
The CPU hoggers are various failover threads.

Conditions:
Cisco ASA 5550 running release 8.0. The device has been booted or reloaded
and user inputs show proc cpu command. cpu-hog events are
displayed.

Workaround:
No workaround avaible.


Last Modified:
09-FEB-2016
Known Affected Releases:
8.0(1.3)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux14937
Title:
PLR: number of connections not correct on ASAv30 when licensed
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The number of connections on the ASAv30 is not reporting correctly. It is showing the default value of 100. It should be 500,000. Issue is not present on ASAv5 and ASAv10 models.

Configuration last modified by enable_15 at 13:31:12.619 UTC Fri Nov 13 2015
ciscoasa(config)# sho resource usage resource conns
Resource Current Peak Limit Denied Context
Conns 0 1 100 0 System
ciscoasa(config)# sho license status

Conditions:
Permanent License Reservation mode
ASAv30

Workaround:
none

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases:
100.15(8.31)
Known Fixed Releases: *
100.15(8.39), 9.5(1.194), 96.2(1.120)
Alert Type:
Updated *
Bug Id:
CSCux20680
Title:
PLR: Day0-config with SL token on ESXi does not license ASAv properly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
An ASAv deployed with a Day 0 configuration with commands for unattended licensing fails to license itself.

Conditions:
An ASAv deployed with a day0-config file or deployed in VMware with the licensing information provided in the VM deployment dialog.

Workaround:
The workaround is to manually re-enter part of the Smart Licensing entitlement configuration after the ASAv is up and running. The can be accomplished by entering configuration mode using the configure terminal command, entering Smart Licensing configuration mode using the configure terminal command and re-configuring the Feature Tier using the feature tier standard command.

Performing the steps above will cause the ASAv to initiated a license request for the configured license entitlement.

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases:
9.5(1.193)
Known Fixed Releases: *
100.15(8.43), 96.2(1.120)
Alert Type:
Updated *
Bug Id:
CSCtj57256
Title:
L2TP/IPSec connection from Android doesn't establish to the ASA55xx
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:L2TP/IPSec connection from Android doesn't establish to the ASA55xx VPN gateway appliance.
Conditions:
Workaround:

Last Modified:
12-FEB-2016
Known Affected Releases:
8.2(3)
Known Fixed Releases: *
100.5(5.48), 100.7(0.66), 100.7(6.12), 100.7(8.1), 8.2(4.101), 8.2(4.6), 8.2(5), 8.3(2.12), 8.3(2.180), 8.4(0.99)
Alert Type:
Updated *
Bug Id:
CSCtw82147
Title:
ASA lets static NAT mapped IP to be same as standby address on interface
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:

ASA lets one to configure static NAT with mapped IP same as standby (failover) IP address on the mapped interface. For example:

ciscoasa(config)# sh run int e0/0
!
interface Ethernet0/0
nameif vm
security-level 0
ip address 192.168.10.1 255.255.255.0 standby 192.168.10.2
ciscoasa(config)# sh run nat
!
object network obj-10.76.76.160
nat (tftp,vm) static 192.168.10.2
!
The above static NAT configuration will never work as intended.

Conditions:

Mapped interface configured with standby IP address.

Workaround:

Do not configure static 1:1 NAT with mapped IP same as standby IP address.

Last Modified:
17-FEB-2016
Known Affected Releases:
8.4
Known Fixed Releases: *
100.7(13.59), 100.7(18.10), 100.7(19.9), 100.8(0.65), 100.8(11.10), 100.8(14.9), 100.8(24.35), 100.8(30.6), 100.8(32.5), 100.9(0.1)
Alert Type:
Updated *
Bug Id:
CSCuu18527
Title:
ASA WebVPN: HTTP 302 Location URL rewritten incorrectly
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In some corner conditions, if the Backend Server responds with HTTP "302 Found" where in the Location URL the fqdn and the URI are not separated by "/", but are separated instead by a "?", ASA appends the same URI prefix as the one it got redirected from resulting in a "HTTP 404" condition.

For example:
Client Performs: GET /abcd/login.php
Backend Server Responds with HTTP 302 Found: Location: http://server.company.com?email=bsg73kdpo1098
At this stage, ASA rewrites this HTTP header as: HTTP 302 Found: Location: http://server.company.com/abcd/?email=bsg73kdpo1098

Here, notice that the ASA appends /abcd/ from the original URI

Conditions:
ASA acting as Clientless SSLVPN Server, and the users access Intranet Websites through the WebVPN portal. The WebSites are served through ASA's Rewriter engine

Workaround:
Use Smart-Tunnel feature

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.3(3.1)
Known Fixed Releases: *
100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.23), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.15)
Alert Type:
Updated *
Bug Id:
CSCus34033
Title:
ASA fails to pass ipv6 address to anyconnect client when using RADIUS
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
when ip address assignment is done using RADIUS and not local pool,anyconnect does not get ipv6 address from Radius

debugs on anyconnect/webvpn show below message
webvpn_cstp_accept_ipv6_address: No IPv6 Address

Conditions:
when using Radius for assigning ipv6 address to anyconnect client

Workaround:
1. use local pool for ipv6 address assignment
2. downgrade to 9.2.1 as issue was seen on 9.2.2.4

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.2, 9.3(2)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.22), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(12.1), 100.14(2.1)
Alert Type:
Updated *
Bug Id:
CSCut85049
Title:
Issue with downloading images from Sharepoint
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Image cannot be downloaded from Sharepoint

Conditions:
After cookies and cache are cleared from browser

Workaround:
Right click on the image and do a 'Save As' and select local disk

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
100.14(3.8), 9.4(1.112)
Known Fixed Releases: *
100.12(0.137), 100.13(0.93), 100.14(0.13), 100.14(10.23), 100.14(5.15), 100.14(6.7), 100.14(7.6), 100.15(0.11), 100.15(1.12), 100.15(1.2)
Alert Type:
Updated *
Bug Id:
CSCut54218
Title:
ASA tunnel-group"password-expire-in-days"not prompting a password change
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
"password-expire-in-days" option of "password-management" is not prompting the users for password change

Conditions:
Use of anyconnect remote access and WebVPN tunnel-group "password-management"

Workaround:
Revert to version 9.3.1

Further Problem Description:

Last Modified:
19-FEB-2016
Known Affected Releases:
9.3(2)
Known Fixed Releases: *
100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11), 100.14(2.21)
Alert Type:
Updated *
Bug Id:
CSCui43057
Title:
WebVPN: IPv6 address is padded with zeros in FF browser 3.6
Status:
Terminated
Severity:
3 Moderate
Description: *

Symptom:
Redirection not working

Conditions:
IPv6 address is used to login to ASA on FF 3.6

Workaround:
Using Google Chrome may be an option

Further Problem Description:

Last Modified:
22-FEB-2016
Known Affected Releases:
9.1(2.4)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuj04699
Title:
ASA WebVPN: Java Signer Certificate chain is incomplete with >3 CA Certs
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When the SSLVPN client accesses the Java plugins, ASA signs the plugin using the Java Signer Certificate, however the Certificate chain sent by the ASA does not include the entire chain. As per the standards, ASA should at least send Intermediate CA-1 + Intermediate CA-2 + Java Signer Certificate

Instead we see the following chain:
Intermediate CA-2 + Java Signer Certificate

On PCs which have only Root-CA certificate installed in the Java Signer Store or OS Certificate store, Java flags the publisher as UNKNOWN

Conditions:
ASA is acting as SSLVPN Server with Java Trust-point configured to sign the Java plugins with a valid 3rd party Signer Certificate. And the Java signer certificate is issued by an Intermediate CA, which has two or more issuers in the hierarchy. In other words, we have:
Root -- Intermediate CA-1 -- Intermediate CA-2 -- Java Signer Certificate

Workaround:
Install the whole CA Chain in the End PC's Certificate store or Java Signer CA Store. i.e. in this case the store should contain at least Root CA and Intermediate CA-1 Certificates.

Further Problem Description:

Last Modified:
23-FEB-2016
Known Affected Releases:
8.2(5.41), 9.1(6)
Known Fixed Releases: *
100.11(0.62), 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.56), 100.15(16.1), 100.15(2.86), 100.15(3.31), 100.15(6.19)
Alert Type:
Updated *
Bug Id:
CSCuv11963
Title:
TP Auth fails when sub CA using RSA keys is signed by root using ECDSA
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
The ASA fails to validate the Anyconnect client certificate issued by the intermediate CA under below conditions.

Conditions:
1. ASA running 9.3.3.1, should be configured for certificate authentication.

2. Root CA cert must have ECDSA Signature algorithm and ECDSA
public key

3.Intermediate CA cert must have ECDSA signature algorithm with RSA public key.

4.ASA ID cert must have RSA signature algorithm with RSA public key.

5.Client cert must have RSA signature algorithm with RSA public key.

Workaround:
NONE

Further Problem Description:
When we connect to ASA from Anyconnect client machine, we see the client is sending its ID cert and ASA fails to verify the cert chain with below debug.

CRYPTO_PKI: Verify chain of certs, Getting public key from signersCert.
CRYPTO_PKI:Failed to set key info for get public key obj, status: 542, keylen: 294
CRYPTO_PKI: Verify chain of certs failed to get pubkey from signer.

Root, intermediate and ID certs are installed in separate Trustpoints in ASA. We have also tried installing intermediate and ID cert in single Trustpoint which results in same failure.

Last Modified:
23-FEB-2016
Known Affected Releases:
9.3(3.1), 9.4(1), 9.5(1)
Known Fixed Releases: *
100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.2), 100.15(3.50), 100.15(6.33), 100.15(8.13), 9.4(1.112)
Alert Type:
New
Bug Id:
CSCuy43841
Title:
AnyConnect sessions stuck in vpn-sessiondb after logoff all
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
Performed "vpn-session logoff all" on several AnyConnect SSL VPN sessions
"show vpn-sessiondb" still showed a few AnyConnect sessions as being established still on Active ASA
Standby ASA correctly showed all sessions logged off
New VPN sessions could be established on the the Active unit, however.

Conditions:
SSL VPN sessions and logoff from ASA

Workaround:
Perform a soft- failover "failover active " on the standby ASA to become active. The vpn-sessiondb correctly shows all session as having been cleared.

Further Problem Description:

Last Modified:
24-FEB-2016
Known Affected Releases:
9.4(2.101)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux43460
Title:
http://ASDM fails to redirect to https://ASDM:non-default-server-port
Status:
Terminated
Severity:
3 Moderate
Description:

Symptom:
Attempting to access the management/ASDM interface on the ASA, by entering an URL such as http://ASDM-Mngt in the browser, fails to redirect to https://ASDM-Mgt:

Expected behavior with the below sample http server and redirect config:
When entering in a browser http://ASDM-IP should be redirected to https://ASDM-IP:60000

ASAt# show run http
http server enable 60000
http 0.0.0.0 0.0.0.0 asdm-mngt-net
http redirect asdm-mngt--net 80

Note:The urls are only examples to be replaced by each specific network configuration.

Conditions:

Workaround:
1.use https insteads of http , no redirect, in the browser address, https://ASDM-IP-or-FQDN
2.use the default http/ASDM server port, SSL (443) , "http server enable" . Redirect works in this case.

Further Problem Description:

Last Modified:
24-FEB-2016
Known Affected Releases: *
9.0(0.1), 9.1(5), 9.1(6), 9.1(6.108), 9.2(4), 9.4(2.101)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy43857
Title:
ASA WebVPN: Java Exception with Kronos application
Status:
Open
Severity:
3 Moderate
Description:

Symptom:
When a Kronos based application is used with the WebVPN rewriter, parts of the portal which use Java may fail with a 'ClassNotFound' exception or 'NoClassDefFound' error.

Conditions:
Application accessed using ASA WebVPN rewriter

Workaround:
None

Further Problem Description:

Last Modified:
24-FEB-2016
Known Affected Releases:
9.4(1), 9.4(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCux90767
Title:
Resolve CSCtz82865 - Equivalent of "show xlate count" command
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Resolve CSCtz82865 - Equivalent of "show xlate count" command

Conditions:
Cisco ASA running release 9.1.4 and higher with SNMP enabled. On certain version it's not running.

Workaround:
none

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
9.4(2)
Known Fixed Releases: *
100.12(0.156), 100.13(0.127), 9.4(2.99), 96.1(1.59), 96.2(1.110)
Alert Type:
Updated *
Bug Id:
CSCtk35575
Title:
Debug trace for mps_shash_release with logging.
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Seeing debug trace related to mps_shash_release with logging

Conditions:
mps_shash_release attempted to process_suspend but failed because
tmatch_release_actual acquired a lock. The syslog reported such failure.

But in fact, the process_suspend is not needed in this particular case, because
the we have removed all elements in the hash table before releasing it.

Workaround:
The original intention for the process_suspend here is to prevent watchdog in
mps_shash_release when many elements are still in there.

In other words, the syslogs I saw is a false alarm.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.4(0.106)
Known Fixed Releases: *
9.6(0.99), 96.1(1.65), 96.2(1.118)
Alert Type:
Updated *
Bug Id:
CSCuu88412
Title:
When > 510 characters entered in CLI, context switches to admin/system
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When user exceeded 510 characters from the CLI and is not within the admin/system context, user is unintentionally switched into the "admin/system" context. This issues was observed when running the command on ASASM after first logging into the 6500 switch and performing a "session" connection to the module.

Conditions:
ASASM with v9.1.6.1

Workaround:
none

Further Problem Description:
none

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(6)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.73), 100.15(17.33), 100.15(20.12), 100.15(8.23), 100.16(0.7), 100.16(1.20)
Alert Type:
Updated *
Bug Id:
CSCuq21426
Title:
Inspect-DNS: PTR Query failed when DNS-Doctoring enabled
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
revDNS response going through ASA is received for different IP address than original query.

Conditions:
ASA has nat configured with 'dns' keyword and there is revDNS query for mapped IP address used in this translation.

Workaround:
1. remove 'dns' keyword from NAT statement,
2. query for real IP address

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.0(4.18)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.87), 100.15(20.17), 100.15(8.29), 100.16(0.9), 100.16(1.34), 100.16(14.1)
Alert Type:
Updated *
Bug Id:
CSCuv76342
Title:
ISA3000 crashed while generating crypto rsa keys
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ISA3000 can produce back-trace after executing "crypto key generate rsa usage-keys label usage_key modulus 4096" command.

Conditions:
After the unit is installed with not much initial configuration issue the command 'crypto key generate rsa label Key1_4096 modulus 4096'
Try the same command manually 7-8 times. The ISA can crash and produce back trace around 8th iteration. However the issue cannot be reproduced consistently.

Workaround:
ISA should reload after the back trace

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.13(29.28), 9.4(1)
Known Fixed Releases: *
100.13(0.104), 100.13(29.101), 100.13(29.36), 100.14(0.75), 100.15(0.29), 100.15(0.42), 100.15(1.94), 100.15(16.7), 100.15(17.18), 100.15(17.9)
Alert Type:
Updated *
Bug Id:
CSCsh75522
Title:
Increase Content-length counter from 4 to 8 byte size
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Deep inspect http (i.e. http app-fw or inspect http http-policy-map) reports
the http connections as protocol-violation if the request part of "Content-
Length: " value n > 268435455.
ASA supports content-length value up to 0x0FFFFFFF (i.e. 268435455) only.

Conditions:
HTTP Requests, Content-Length : headers value should be greater than
268435455

Workaround:
No workaround.

Further Problem Description:
One way to get rid of the issues is to disabled the connection drop or reset
for protocol-violation. But this causes inspection won't be done on the http
data.

Last Modified:
29-FEB-2016
Known Affected Releases:
7.0, 8.0(0.195)
Known Fixed Releases: *
100.13(0.131), 96.1(1.80), 96.2(1.134), 97.1(1.2)
Alert Type:
Updated *
Bug Id:
CSCuv72826
Title:
object-group-search access-control enabled, nested object group issue
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
asa denied traffic after moving an group object to another group object

Conditions:
object-group-search access-control enabled

Workaround:
reapply access-list to the interface

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(6), 9.2(3), 9.4(1)
Known Fixed Releases: *
100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.56), 100.15(8.15), 100.16(0.2), 100.16(1.2)
Alert Type:
Updated *
Bug Id:
CSCuv49100
Title:
ASA: Unable to ping fover IPv6 address in multiple mode
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Ping command fails when trying to ping the IPv6 address assigned to the failover lan interface.

Conditions:
ASA is in multiple mode with IPv6 addresses assigned to the failover lan interface.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1.3)
Known Fixed Releases: *
100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3), 100.16(1.5)
Alert Type:
Updated *
Bug Id:
CSCub30181
Title:
ASA doesn't set ACE inactive when time-range expires
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
In some scenarios, after a time-range expires, an ASA does not mark the ACE as inactive. This causes traffic to be incorrectly permitted or
denied after the time range is no longer valid.

Conditions:
This affects 8.4.1 - 8.4.4 version of ASA

Workaround:
Make any change to the ACL policy that will force it to re-apply the configuration. For example, move the start time of the time-range forward by
1 minute.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.5:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:W/RC:C&version=2.0
CVE ID CVE-2012-3925 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.7(13.93), 8.4(1)
Known Fixed Releases: *
100.11(0.64), 100.12(0.151), 100.13(0.115), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.4), 100.15(8.18), 100.16(0.4)
Alert Type:
Updated *
Bug Id:
CSCuy49315
Title:
Default route on outside interface breaks DNS on management interface
Status:
Open
Severity: *
3 Moderate
Description: *

Symptom:
DNS name resolution fails on the Management interface when a default route is present on another interface.

Conditions:
ASAv with default route configured on the Management 0/0 interface and on another interface. DNS is configured to use management interface but name-server is not:

dns domain-lookup management
DNS server-group DefaultDNS
name-server 10.11.12.13



Workaround:
Explicitly configure name-server command with the interface option set to management:

dns domain-lookup management
DNS server-group DefaultDNS
name-server 10.11.12.13 management


Further Problem Description:

Last Modified:
01-MAR-2016
Known Affected Releases:
9.5(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv88898
Title:
WEBVPN Rewriter: Stops mangling after hex code of Period on Bookmark URL
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When the hex code of the characters on a URL is used on the bookmark for Clientless webvpn, the URL mangling stops after the Hex equivalent of "period" is seen.
For example :
For http://www.cisco.com we use "http://www.cisco.com"
The mangled URL looks like this
https://ASA IP/+CSCO+0h756767633A2F2F6A6A6A++/.cisco.com

The mangling stops at . which is the Hex equivalent for "period"

Conditions:
HEX code is used on the Bookmark URL

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1.3)
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.106), 100.14(0.76), 100.15(0.39), 100.15(17.14), 100.15(3.63), 100.15(8.16), 100.16(0.2), 100.16(1.3)
Alert Type:
Updated *
Bug Id:
CSCus74398
Title:
Cisco ASA PIM Multicast Registration Vulnerability
Status:
Fixed
Severity:
3 Moderate
Description: *

Symptom:
A vulnerability in Protocol Independent Multicast (PIM) application of the Cisco Adaptive Security
Appliance (ASA) could allow an unauthenticated, remote attacker to disrupt the multicast traffic
forwarding on the affected device via a denial-of-service (DoS) attack.

The vulnerability is due to an inconsistency in how the PIM Registration is implemented for multicast
forwarding. An attacker could exploit this vulnerability by sending a crafted multicast packet to the affected
device. An exploit could allow the attacker to disrupt the multicast forwarding via a DoS attack.

Conditions:
The ASA is configured for PIM multicast configuration running an affected version of software. To determine if PIM
Multicast is configured on this device the following command can be used:

1. This will verify if the PIM Rendezvous Point (RP) is configured.

ciscoasa# show running-config | in pim
pim rp-address 192.128.1.1

2. The command ''show pim interface'' to verify that multicast is properly configured on the interface.

Workaround:
None.

Further Problem Description:
None

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-0742 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html


Last Modified:
29-FEB-2016
Known Affected Releases:
100.13(0.21), 100.13(20.3), 100.14(1.1), 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115)
Known Fixed Releases:
100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15), 100.14(26.6)
Alert Type:
Updated *
Bug Id:
CSCuu61981
Title:
http servershows as enable in running config while not
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
When configuration command "http server enable" fails due to port usage conflict with AAA with error message ERROR: Port 443 is being used on interface public by an aaa authentication listener", the configuration is incorrectly updated to include "http server enable".

Conditions:
When configuration "http server enable [port-number] is attempted but the designated port is already in use (e.g., by AAA).

Workaround:
remove the conflict configuration before "http server enable"

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1)
Known Fixed Releases: *
100.11(0.63), 100.12(0.149), 100.13(0.108), 100.14(0.77), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9)
Alert Type:
Updated *
Bug Id:
CSCtj56778
Title:
Incorrect ARP MAC Address conversion
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
ASA converts the following cli
arp inside 1.2.3.4 abc.de.f
to
arp inside 1.2.3.4 ab0c.de00.0f00
it should convert to
arp 1.2.3.4 0abc.00de.000f
like IOS and IPv6 Neighbor cache

Conditions:

Workaround:
Enter proper mac address

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.3(1)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.94), 100.15(20.22), 100.16(0.10), 100.16(1.50), 100.16(14.1), 100.16(15.7)
Alert Type:
Updated *
Bug Id:
CSCur19070
Title:
PBR:Route-map is accepting interface which is not configured with nameif
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
Route-map is accepting interface name substring after giving ambiguous command error while configuring

Conditions:
Configure two nameif interface with name test1 and test2, now when calling out interface "test" under route-map set interface, ASA is complaining ambiguous command but configured "test1" in route-map

Workaround:
No Workaround

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.13(12.13), 9.4(1)
Known Fixed Releases: *
100.15(0.105), 100.16(0.15), 100.16(1.74), 100.16(1.76), 100.16(12.2), 100.16(14.1), 9.6(0.99), 96.1(1.21), 96.1(1.26), 96.1(5.4)
Alert Type:
Updated *
Bug Id:
CSCus08552
Title:
show traffic protocol stats show large counter values-enhanced pkt stats
Status:
Fixed
Severity:
3 Moderate
Description:

Symptom:
show traffic protocol statistics show huge counter values after enhanced packet stats are enabled
.

Conditions:
After enhanced packet statistics are enabled with the command "sysopt traffic detailed-statistics", some of the counter values arevery large as displayed wiht "show traffic" command.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.12(0.101), 9.3(1.108)
Known Fixed Releases: *
100.12(0.156), 100.13(0.127), 9.4(2.99), 9.6(0.99), 96.1(1.59), 96.2(1.110)
Alert Type:
Updated *
Bug Id:
CSCuy25445
Title:
Master shows slave interfaces as "up" when slave rejoining
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
If a slave unit in a cluster reboots, while it is rejoining, the master will show its interfaces as "up" instead of "init" for a short period of time.

The issue does not have functionality impacts.

Conditions:
Cisco ASA running release 9.0 and later.

Workaround:
None.

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
9.1(6.184)
Known Fixed Releases: *
100.13(0.130), 9.4(2.101), 96.1(1.77), 96.1(1.79), 96.2(1.129), 96.2(1.131), 97.1(0.2)
Alert Type:
Updated *
Bug Id:
CSCur42057
Title:
Smart Licensing: License config warning needs message classification
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Incomplete smart licensing config will be reported as an error by ASDM.

Conditions:
User configures only one part of smart licensing. There are two parts: feature tier and throughput. If the user specifies only one and then exits, the message that is displayed will be interpreted as an error by ASDM.

Workaround:
Configure both parts of smart licensing before exiting smart licensing config.

Further Problem Description:
This should be displayed as a warning by ASDM. The code should be modified to prepend "WARNING:" so that ASDM properly displays it as a warning.

Last Modified:
29-FEB-2016
Known Affected Releases:
100.12(6.24)
Known Fixed Releases: *
100.16(0.20), 9.6(0.99), 96.1(1.56), 96.2(1.107)
Alert Type:
Updated *
Bug Id:
CSCua66518
Title:
Help arp SYNTAX section misses "permit-nonconnected" entry
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Help arp misses permit-nonconnected entry in SYNTAX section.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.4(4), 8.4(4.2)
Known Fixed Releases: *
100.11(0.65), 100.12(0.154), 100.13(0.120), 100.13(0.121), 100.14(0.83), 100.14(0.84), 100.15(0.87), 100.15(0.90), 100.15(20.17), 100.15(20.18)
Alert Type:
Updated *
Bug Id:
CSCua71298
Title:
Help arp in context shows arp permit-nonconnected
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
Help arp in admin and user contexts shows arp permit-nonconnected entry, which is only available in system context.

Conditions:

Workaround:

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.4(4.2)
Known Fixed Releases: *
100.11(0.63), 100.12(0.149), 100.13(0.114), 100.14(0.79), 100.15(0.56), 100.15(17.24), 100.15(3.77), 100.15(8.18), 100.16(0.4), 100.16(1.9)
Alert Type:
Updated *
Bug Id:
CSCur80711
Title:
dhcprelay enabled interface pops memory message when address is assigned
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
dhcprelay enable interface when enabled pops memory message "No memory for DHCP interface ''

Conditions:
ASA in multicontext mode.

Workaround:
None, but this is a benign message

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(2)
Known Fixed Releases: *
100.13(0.128), 9.6(0.99), 96.1(1.66), 96.2(1.118)
Alert Type:
Updated *
Bug Id:
CSCuo65775
Title:
Cisco ASA Information Disclosure Vulnerability
Status:
Fixed
Severity:
4 Minor
Description: *

Symptom:
A vulnerability in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated,
remote attacker to disclose sensitive data which includes the ASA software version. This information
could be used for reconnaissance
attacks.

The vulnerability is due to insufficient protections of sensitive data before authentication with the
AnyConnect client. An attacker could exploit this vulnerability by attempting to authenticate to the
device with AnyConnect which could disclose the sensitive information.

Conditions:
Device running with IKE/WVPN enabled on an interface on an affected version of software using the AnyConnect client.

The AnyConnect client can be running any version of software.

Workaround:
None.

Further Problem Description:
None.

PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2016-1295 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
24-FEB-2016
Known Affected Releases:
8.4, 9.1, 9.3, 9.4
Known Fixed Releases:
100.11(0.47), 100.12(0.48), 100.12(6.7), 100.13(0.3), 100.13(11.2), 100.13(12.3), 100.13(13.1), 100.13(14.2), 100.13(15.1), 100.13(16.1)
Alert Type:
Updated *
Bug Id:
CSCus14480
Title:
ASA sends DNS query with type AAAA even when only IPv4 config on mgmt
Status:
Open
Severity: *
4 Minor
Description:

Symptom:
ASAv may not be able to license if DNS server returns IPv6 address for the Licensing server "tools.cisco.com" and there is no route to reach the server using IPv6 address.

Conditions:
When only IPv6 and IPv4 addresses are present on the inside/outside interfaces, but management is configured with only IPv4 address, ASAv sends DNS query for "tools.cisco.com' over management interface. In this case, DNS server responds with IPv6 address of the Licensing sever. But since IPv6 route is not present, ASAv cannot reach "tools.cisco.com" over IPv6.

Workaround:
Need to change the Smart Call Home url ("show run call-home"), for CiscoTAC-1 and License profile to hardcode ipv4 address of "tools.cisco.com".e.g. destination address http https://72.163.4.38/its/service/oddce/services/DDCEService. Assumption is that there a IPv4 route configured to reach 72.163.4.38 over management interface.

Further Problem Description:

Last Modified:
15-FEB-2016
Known Affected Releases:
9.2(2.109), 9.3(1.111)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy09302
Title:
inspect-http: "show service-policy" only returns a max of 64 entries
Status:
Open
Severity:
4 Minor
Description: *

Symptom:
'show service-policy interface' will return up to 64 entries/rules

Conditions:
a class-map configured with more than 64 match lines

Workaround:
none

Further Problem Description:

Last Modified:
15-FEB-2016
Known Affected Releases:
9.5(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw75736
Title:
ASA 9.4 - The source of CoA packet does not match tunnel-group config
Status:
Fixed
Severity:
4 Minor
Description:

Symptom:
-- change in configuration order resulted in failed CoA NAK, with the following error:

"The source of CoA packet does not match tunnel-group config."

Conditions:
non-working configuration
======================
sh run aaa-
aaa-server ACCT protocol radius
accounting-mode simultaneous
interim-accounting-update
reactivation-mode timed
aaa-server ACCT (inside) host 172.16.1.13
key *****
aaa-server ACCT (inside) host 172.16.1.14
key *****
aaa-server ISE protocol radius
authorize-only
interim-accounting-update
dynamic-authorization
aaa-server ISE (inside) host 172.16.1.13
key *****

Workaround:
working configuration
======================
sh run aaa-
aaa-server ISE protocol radius
authorize-only
interim-accounting-update
dynamic-authorization
aaa-server ISE (inside) host 172.16.1.13
key *****
aaa-server ACCT protocol radius
accounting-mode simultaneous
interim-accounting-update
reactivation-mode timed
aaa-server ACCT (inside) host 172.16.1.13
key *****
aaa-server ACCT (inside) host 172.16.1.14
key *****

Further Problem Description:
N/A

Last Modified:
03-FEB-2016
Known Affected Releases:
9.4(1.5)
Known Fixed Releases: *
100.11(0.67), 100.12(0.156), 100.13(0.127), 96.1(1.58), 96.2(1.110)
Alert Type:
Updated *
Bug Id:
CSCus83799
Title:
Debug menu ike-common couters not getting incremented
Status:
Open
Severity:
5 Cosmetic
Description:

Symptom:

Conditions:

Workaround:
N/A

Further Problem Description:

Last Modified:
09-FEB-2016
Known Affected Releases: *
9.4(2.212)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv10516
Title:
Security alert:Python JSON Module Vulnerability
Status:
Other
Severity:
6 Enhancement
Description:

Symptoms:

This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2014-4616

This bug was opened to address the potential impact on this product.

Conditions:

Device with default configuration.

Workaround:

Not currently available.

Further Problem Description:

Additional details about the vulnerabilities listed above can be found
at http://cve.mitre.org/cve/cve.html.

PSIRT Evaluation:

The Cisco PSIRT has assigned this bug the following CVSS version 2
score. The highest Base and Temporal CVSS scores of all vulnerabilities
tracked by this bug as of the time of evaluation are 5.0:

https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C

The Cisco PSIRT has assigned this score based on information obtained
from multiple sources. This includes the CVSS score assigned by the
third-party vendor when available. The CVSS score assigned may not
reflect the actual impact on the Cisco Product.

CVE ID CVE-2014-4616 have been assigned to document this issue.

Additional information on Cisco's security vulnerability policy can be
found at the following URL:

http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

Last Modified:
01-FEB-2016
Known Affected Releases: *
1.1(2), 1.1(3), 1.1(4), 6.0, 9.5(2), 9.5(2.200), 96.2(1), 99.1, 99.1(2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy30152
Title:
ENH: Do not require "no rest-api image" to upgrade REST API
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
User is unable to configure a new REST API image unless they remove the old image first. The user will receive the following error:

ERROR: REST API image is already installed. Please uninstall the old image before installing a new one.

Conditions:
-There is already a REST API image installed on an ASA
-Attempting to upgrade to a new version of the REST API image

Workaround:
Use the "no" command to un-configure the old image:

no rest-api image oldimage.bin
rest-api image newimage.bin

Further Problem Description:

Last Modified:
16-FEB-2016
Known Affected Releases:
9.6(0.56)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv00272
Title:
ASA: PBR policies should be applied for output route-lookup
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
ASA doesn't check Policy Based Routing (PBR) configuration for next-hop determination if egress interface is selected either by an exitsing connection or destination NAT lookup.

ASA 951 Beta Ticket:
https://stg-beta-tickets.cisco.com/Ticket/Display.html?id=684080

Conditions:
ASA configured for PBR.

Workaround:
None.

Further Problem Description:

Last Modified:
18-FEB-2016
Known Affected Releases:
9.4(1), 9.5(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuw37752
Title:
FTP data conn scaling fails with dynamic PAT
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
FTP connections cannot be full scaled in cluster environment with dynamic PAT configured.

Conditions:
Cluster deployment with dynamic PAT configured for FTP.

Workaround:
Replace dynamic PAT with dynamic NAT or change the L2/L3 load balancing such that all control and data conns belonging to an FTP session are handled by a single node.

Further Problem Description:

Last Modified:
20-FEB-2016
Known Affected Releases:
100.8(40), 9.4(2), 9.5(1), 9.5(2)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv19728
Title:
Allow user to select SSH Encryption Cipher Mode on ASA
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The SSH encryption ciphers are not configurable. It is desired to make them configurable so the admin can customize the ciphers to be consistent with the required security level and to inter-operability requirements.

Conditions:
All

Workaround:
None

Further Problem Description:
This issue is addressed in 9.1(7) with the introduction of the "ssh cipher encryption" config command.

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(3.4)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.104), 100.15(0.98), 100.15(20.13), 100.15(8.24), 100.16(0.12), 100.16(0.14)
Alert Type:
New
Bug Id:
CSCuy47373
Title:
DOC: ASA Syslog Message ASA-1-103001 Code = 6
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Currently we only list codes 1-5 for syslog 103001. There is a 6th code that is not listed in the following guide:
http://www.cisco.com/c/en/us/td/docs/security/asa/syslog-guide/syslogs/logmsgs1.html#pgfId-4768587

Conditions:
Failover
Syslog

Workaround:
N/A

Further Problem Description:

Last Modified:
25-FEB-2016
Known Affected Releases:
8.0, 9.0
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuv83951
Title:
ASA webvpn: Citrix SSO for Storefront 2.6 does not work
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
SSO for Citrix Storefront 2.6 does not work. This is an enhancement request to support the same.

Conditions:
Using SSO for Storefront version 2.6

Workaround:
none

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1)
Known Fixed Releases: *
100.16(1.16), 100.16(14.1), 9.6(0.99), 96.1(1.54), 96.1(1.57)
Alert Type:
Updated *
Bug Id:
CSCuw55535
Title:
Port-security on switch is causing ASA module to set DNL/DIL bit
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
Unable to reach destination when packets are routed via ASA.

When ASA module dose the routing and sends the packet back to supervise the CPU is placing the packet back to original VLAN. For example:
1. Packet enters port Gi2/1/1 VLAN 33 that has port-security configured.
2. Packet is forwarding to ASA module inside Cat6k switch
3. ASA module performs routing to VLAN 38 and sends the packet back to Sup2T.
4. Sup2T doesn't have destination MAC present in mac address table, insteady flooding the packet to VLAN 38 packet is sent to the supervisor CPU.
5. CPU is receiving packet from VLAN 38, decreases TTL, overwrites the L2 information and places it back in VLAN 33. Destination MAC is again ASA MAC in VLAN 33. And this creating the loop until TTL will expire for particular packet. (NetDR example below)


F340.07.02-6500-1# debug netdr capture destination-ip-address 2.2.2.2
F340.07.02-6500-1# show netdr captured-packets

------- dump of incoming inband packet -------
l2idb Te1/2/3, l3idb NULL, routine inband_process_rx_packet, timestamp 14:14:17.967
dbus info: src_vlan 0x26(38), src_indx 0x42(66), len 0x76(118)
bpdu 0, index_dir 0, flood 0, dont_lrn 0, dest_indx 0x5FA9(24489), CoS 0
cap1 0, cap2 0
580200C0 00260000 00420000 76000000 0001046C 0E000004 00000010 5FA9683F
destmac 00.18.BA.88.5F.C1, srcmac E8.B7.48.29.34.2C, ethertype 0800
protocol ip: version 0x04, hlen 0x05, tos 0x00, totlen 100, identifier 3727
df 0, mf 0, fo 0, ttl 255, src 1.1.1.1, dst 2.2.2.2
icmp type 8, code 0

------- dump of outgoing inband packet -------
l2idb NULL, l3idb Vl32, routine etsec_tx_pak, timestamp 14:14:17.967
dbus info: src_vlan 0x20(32), src_indx 0x380(896), len 0x82(130)
bpdu 0, index_dir 0, flood 0, dont_lrn 0, dest_indx 0x0(0), CoS 0
cap1 0, cap2 0
00020000 0020A800 03800000 82000000 00000000 00000000 00000000 00000000
destmac E8.B7.48.29.34.2C, srcmac 00.17.0F.9D.2C.00, shim ethertype CCF0
earl 8 shim header IS present:
version 0, control 0(0x0), lif 16391(0x4007), mark_enable 0,
feature_index 0, group_id 0(0x0), acos 0(0x0),
ttl 15, dti 0, dti_value 540704(0x84020)
000800E0 0003C008 4020
ethertype 0800
protocol ip: version 0x04, hlen 0x05, tos 0x00, totlen 100, identifier 3727
df 0, mf 0, fo 0, ttl 254, src 1.1.1.1, dst 2.2.2.2
icmp type 8, code 0

Conditions:
For this bug to trigger port-security needs to be configured in interface via which packets are entering the switch. Port-security on outgoing interfaces dosen't change much here.

Workaround:
- From ASA ping the destination or source IP address. Sometimes problem is fixed by pinging DST, sometimes by pinging SRC.
- Failover of ASA doesn't clear the problem

Further Problem Description:

Last Modified:
28-FEB-2016
Known Affected Releases:
8.4
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCsf31461
Title:
Capture type asp-drop needs to be filterable by ACL
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:

Conditions:
When using a capture type asp-drop we need to be able to use an ACL to limit the
scope of the capture. Currently capture type asp-drop does not let someone use
an ACL to identify particular flows that are being dropped.

For instance, if I know a flow is being dropped because of packet inspection but I
need to capture the actual packet that fails inspection, I have to know exactly what
asp type to capture. If there is a large number of drops, it makes it difficult to find
the specific flow.
Further Problem Details:
This is needed to be able to pick out a single flow that is failling with the capture type asp-drop.
This will allow users to pinpoint the failing packets. In particular this is helpfull if the "show
asp-drop" statistics are incrementing very quickly making it difficult to narrow down the exact
drop reason.
Example:
This is how an asp-drop capture is currently configured.
capture aspcap type asp-drop all

This is what could be configured if we tied the capture to an ACL.
access-list aspcap permit ip host 10.1.1.1 host 172.16.2.2
access-list aspcap permit ip host 172.16.2.2 host 10.1.1.1

capture aspcap type asp-drop all access-list aspcap

Workaround:
Use capture of type "asp-drop all" and use an ACL in the show capture command to selectively show packets of interest.

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
100.16(1.1), 7.0, 7.1, 7.2, 8.4(1)
Known Fixed Releases: *
100.16(1.32), 100.16(14.1), 96.2(1.109), 96.2(1.116), 96.2(1.138)
Alert Type:
New
Bug Id:
CSCuu59710
Title:
Enhance CTL to connect with CUCM10.5
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Need to enhance the CTL on ASA

Conditions:
When we need to use cucm10.5, we will see the major minor version compatibility issue

Workaround:
don't connect with cucm10.5

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.4(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCum63371
Title:
ENH: Allow configurable HMAC and encryption algorithms on ASA SSH server
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The Cisco ASA SSH server is not configurable as to encryption and HMAC algorithms. Since 8.4.4, certain versions are able to use the 'ssh key-exchange group' command to use different key exchange algorithms, but the encryption and HMAC algorithms are still not configurable. Some customers claim that this is causing them to fail security audits.

Conditions:
Normal operation

Workaround:
None

Further Problem Description:
This issue is addressed in 9.1(7) with the introduction of the "ssh cipher encryption" and "ssh cipher integrity" config commands.

Last Modified:
29-FEB-2016
Known Affected Releases:
9.2(1), 9.2(3.4)
Known Fixed Releases: *
100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.104), 100.15(0.98), 100.15(20.13), 100.15(8.24), 100.16(0.12), 100.16(0.14)
Alert Type:
Updated *
Bug Id:
CSCuv50747
Title:
ENH: HTTP redirect support for IPV6
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
We see the logs below when we try to access ASA outside interface over IPV6 on port 80:

%ASA-7-710005: TCP request discarded from 1eee::f49a:c93c:38d9:d034/50771 to outside:1eee::1/80
%ASA-3-710003: TCP access denied by ACL from 1eee::f49a:c93c:38d9:d034/50772 to outside:1eee::1/80


ciscoasa# sh asp table socket

Protocol Socket State Local Address Foreign Address
SSL 0023fff8 LISTEN 123.123.123.1:443 0.0.0.0:*
SSL 007801a8 LISTEN 10.106.45.221:443 0.0.0.0:*
SSL 004ffff8 LISTEN [1eee::1]:443 [::]:*
DTLS 004003d8 LISTEN [1eee::1]:443 [::]:*
DTLS 004004c8 LISTEN 10.106.45.221:443 0.0.0.0:*
TCP 009003d8 LISTEN 10.106.45.221:80 0.0.0.0:* ============ > listen on port 80 for ipv4 but similar entry for ipv6 is missing.

Conditions:
The command: http redirect outside 80 is present

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.11(0.65), 100.12(0.155), 100.13(0.121), 100.15(0.102), 100.16(0.13), 100.16(1.70), 100.16(14.1), 100.8(40.108), 9.1(6.108), 9.1(7)
Alert Type:
New
Bug Id:
CSCuy51563
Title:
Slow downloads with WebSense URL-server
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Slow downloads may be experienced when a WebSense URL-Server is configured.

Conditions:
ASA multi-context mode running 9.1 and above

Workaround:
Exclude IP address from URL filtering

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(6)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCus85257
Title:
ASA Connector - Provide Higher Layer Health Checks for CWS Tower
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
The ASA may not failover to the backup CWS tower when the CWS tower is in a degraded state but remains responsive to ASA TCP health checks. This may cause traffic interruption in the network environment when the ASA continues to redirect web traffic to the degraded tower. This is an enhancement request to provide more granular health checking between the ASA and the CWS tower.

Conditions:
This can occur if the CWS tower is degraded (not down) but is still able to complete the 3-way TCP handshake with the CWS tower.

Workaround:
Manually point the ASA to the backup CWS tower

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.3(2)
Known Fixed Releases: *
100.13(0.128), 9.2(3.160), 9.2(3.161), 9.2(4.6), 9.6(0.99), 96.1(1.70), 96.2(1.122)
Alert Type:
Updated *
Bug Id:
CSCuw93539
Title:
RAMCP2: Virtualize AnyConnect Localisation
Status:
Fixed
Severity:
6 Enhancement
Description: *

Symptom:
The import/export/revert and respective show commands are not available in multicontext.

Conditions:
NA

Workaround:
None. This is an enhancement.

Further Problem Description:

Last Modified:
17-FEB-2016
Known Affected Releases:
100.16(11)
Known Fixed Releases:
100.16(1.29), 100.16(14.1), 96.2(1.120), 96.2(1.122)
Alert Type:
Updated *
Bug Id:
CSCuq38206
Title:
ENH: ASA show tech should include 'dir all-filesystems'
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Enhancement to add 'dir all-filesystems' to show tech output

Conditions:
n/a

Workaround:
n/a

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
9.1(5)
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2)
Alert Type:
Updated *
Bug Id:
CSCtw80509
Title:
add "show resource usage summary count all 1" to show tech
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
Add "show resource usage summary count all 1" to the show tech.

Conditions:
This is a request to add "show resource usage summary count all 0" to the show tech output so more information regarding xlates, conns, inspects, syslogs, etc can be evaluated as part of the show tech snapshot. This information would also be helpful in diagnosing performance issues and would be useful to have as part of the show tech portion of the show crashinfo.

Workaround:
None

Further Problem Description:

Last Modified:
29-FEB-2016
Known Affected Releases:
8.2
Known Fixed Releases: *
100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2)
Alert Type:
Updated *
Bug Id:
CSCsj50741
Title:
ASA: DHCP relay does not validate the Server Identifier of a reply
Status:
Fixed
Severity:
6 Enhancement
Description:

Symptom:
If you have multiple DHCP servers configured the ASA if configured as a DHCP relay will forward all DHCP requests to all DHCP servers.

When a client requests an address with a DHCPDISCOVER message it gets a DHCPOFFER from one server. Then it will confirm the lease with the server with the DHCPREQUEST message, this message identifies the server that offered the lease with the "Server Identifier" and only that server should reply.

The ASA relays the DHCP traffic, but stops at the first ACK, NACK or decline it receives, wthout validating the Server Identifier.

If a wrong server replies with the wrong Server Identifier then the ASA will close the relay, but the client ignore that wrong reply and will wait for the correct reply. Which the ASA will not relay anymore, because it saw a ACK.







Conditions:
- ASA configured as a DHCP relay
- multiple DHCP servers, some of which reply for messages not intended for them.

Workaround:
None. You should configure the DHCP servers to only reply to valid requests.

Further Problem Description:
If you do debug dhcprelay packet 255 and debug dhcprelay event 255 you will see:

DHCPRA: relay binding created for client 0015.5881.0e9c.
DHCPD: setting giaddr to 192.168.1.254.
dhcpd_forward_request: request from 0015.5881.0e9c forwarded to 192.168.1.1.
dhcpd_forward_request: request from 0015.5881.0e9c forwarded to 192.168.1.2.
dhcpd_forward_request: request from 0015.5881.0e9c forwarded to 192.168.1.3.
DHCPRA: Received a BOOTREPLY from interface 2
DHCPRA: relay binding found for client 0015.5881.0e9c.
DHCPRA: exchange complete - relay binding deleted for client 0015.5881.0e9c.
DHCPD: returned relay binding 192.168.1.254/0015.5881.0e9c to address pool.
DHCPRA: forwarding reply to client 0015.5881.0e9c.
DHCPRA: Received a BOOTREPLY from interface 2
DHCPRA: dhcp_relay_agent_receiver:can't find binding

Last Modified:
04-FEB-2016
Known Affected Releases:
7.2(2.22)
Known Fixed Releases: *
100.11(0.57), 100.12(0.115), 100.13(0.45), 100.13(20.12), 100.13(21.7), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.7)
Alert Type:
Updated *
Bug Id:
CSCtg38746
Title:
Knob to allow h.225 traffic before h.225 setup
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
Phones fail when sending h.225 traffic before h.225 setup message

Conditions:
Phone sending h.225 before h.225 setup
h.323 inspection enabled on ASA
Syslog %ASA-4-405104: H225 message INFORMATION received from 10.122.42.221/496
to 10.11.185.8/47110 before SETUP will be trggered.

Workaround:
Disable inspection and open all neccessary ports to allow traffic.

Last Modified:
29-FEB-2016
Known Affected Releases:
8.2
Known Fixed Releases: *
100.16(1.49), 100.16(14.1), 100.16(15.7), 9.6(0.99), 96.1(1.5), 96.1(1.57), 96.1(6.1), 96.2(1.104)
Alert Type:
Updated *
Bug Id:
CSCuy09345
Title:
SCH: Quick Start Configuration Guide - Transport Options
Status:
Open
Severity:
6 Enhancement
Description: *

Symptom:
SCH: Quick Start Configuration Guide - Transport Options issue

Conditions:
For both HTTPS and HTTP, the command for configuration is same :

(cfg-call-home-profile)# destination transport-method http

Change the commands to easily differentiate both HTTPS and HTTP transport options.

Workaround:
NA

Further Problem Description:
NA

Last Modified:
03-FEB-2016
Known Affected Releases:
8.1(2.7)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy07912
Title:
ENH: Syslog notification of trace buffer depletion
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
No notification that debug trace buffer is being depleted. Debug messages are simply missing which further impedes the troubleshooting effort.

Conditions:
Enabling debugs to troubleshoot an issue and the amount of debugs exceeds the trace buffer

Workaround:
none

Further Problem Description:

Last Modified:
01-FEB-2016
Known Affected Releases:
9.6(1)
Known Fixed Releases:
Alert Type:
Updated *
Bug Id:
CSCuy27484
Title:
ASA doesn't remove all entries in re-written ICA file
Status:
Open
Severity: *
6 Enhancement
Description:

Symptom:
Windows user receives an error when using citrix receiver version 10 or later to connect to a Citrix server through the webvpn portal:

"The Citrix online plug-in received a corrupt ICA File. ICA File section Internet Explorer contains duplicate keys named (HttpBrowserAddress)"

The actual duplicate field name may vary.

Conditions:
Launching Citrix application through webvpn portal when using Citrix receiver version 10 or later.

Workaround:
After receiving the failure you can manually edit the ICA file, remove the duplicate entries, re-launch the file, and connect successfully.

Further Problem Description:

Last Modified:
16-FEB-2016
Known Affected Releases:
9.2(2)
Known Fixed Releases:
Alert Type:
New
Bug Id:
CSCuy30326
Title:
enh: Add support for ST on Mac OS X 10.10 and 10.11
Status:
Open
Severity:
6 Enhancement
Description:

Symptom:
smart-tunnel doesn't work for Office365 on Mac OS X 10.10 and 10.11. Tried to launch Office365 access from Safari/Firefox/Chrome, and all failed.

Conditions:
Customer is running ASA 9.3(2)2 with ST bookmark configured to Office365.

Customer Mac is running MacOS 10.11.2

Workaround:
None currently

Further Problem Description:

Last Modified:
16-FEB-2016
Known Affected Releases:
100.10(0.90), 9.1(5), 9.3(2.2)
Known Fixed Releases:

Find additional information in Bug Search index.

 

2015 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论