Security Advisories & Responses - ASA 5500-X Series Firewalls
| | Title: | Multiple Cisco Products libSRTP Denial of Service Vulnerability | Description: | Cisco released version 1.5.3 of the Secure Real-Time Transport Protocol (SRTP) library (libSRTP), which addresses a denial of service (DoS) vulnerability. Multiple Cisco products incorporate a vulnerable version of the libSRTP library. The vulnerability is in the encryption processing subsystem of libSRTP and could allow an unauthenticated, remote attacker to trigger a DoS condition. The vulnerability is due to improper input validation of certain fields of SRTP packets. An attacker could exploit this vulnerability by sending a crafted SRTP packet designed to trigger the issue to an affected device. The impact of this vulnerability on Cisco products may vary depending on the affected product. Details about the impact on each product are outlined in the "Conditions" section of each Cisco bug for this vulnerability. The bug IDs are listed at the top of this advisory and in the table in "Vulnerable Products." This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp | Date: | 20-APR-2016 | |
|
| | | | Title: | Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability | Description: | A vulnerability in the DHCPv6 relay feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of DHCPv6 packets. An attacker could exploit this vulnerability by sending crafted DHCPv6 packets to an affected device, resulting in a denial of service (DoS) condition. This vulnerability affects systems configured in routed firewall mode and in single or multiple context mode. Cisco ASA Software is affected by this vulnerability only if the software is configured with the DHCPv6 relay feature. The vulnerability is triggered only by IPv6 traffic. This vulnerability affects Cisco ASA Software release 9.4.1 only. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-asa-dhcpv6 | Date: | 20-APR-2016 | |
|
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-31-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.2.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa924-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 20-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa917-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.3
| |
| |
Alert Type: | New File | File Name: | asa943-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 25-APR-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.0.4 Interim
| |
| |
Alert Type: | New File | File Name: | asa904-39-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 08-APR-2016 | | | | |
Known Bugs - ASA 5500-X Series Firewalls
| | |
Alert Type: | Updated * | Bug Id: | CSCuw39685 | Title: | filter sfr traffic may cause memory corruption | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: ASAs running URL filtering (Websense) and traffic redirection to the SFR module may experience a crash on the thread name uauth_urlb clean process.
Conditions: - Seen on 9.4 ASA code - URL filtering configured and being used - Higher amounts of traffic (500+ mbps) - Traffic redirection to the SFR module
Workaround: Possible temporary workarounds:
- Disable of the traffic redirection to SFR module - Disable URL filtering (websense)
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.6) | |
Known Fixed Releases: * | 100.12(0.154), 100.13(0.121), 100.14(0.85), 100.15(0.100), 100.16(0.12), 100.16(1.70), 100.16(14.1), 9.3(3.171), 9.3(3.8), 9.4(1.190) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux37303 | Title: | Port-Channel Config on Gi 0/0 causes Boot Loop - FIPS related | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: * | Symptom: Boot Loop - Following the port-channel configuration utilizing gi0/0 and any other port. using CLI
Note: The customer mentioned using a "Fips Enable" command which I was unable to give that command, but still cause my test equipment to go into the boot loop. This is easily repeatable.
Conditions: Brand new out of the box with a clean configuration running version 9.1.2 and the same problem was observed after upgrading to 9.1.4 and 9.1.6. I think the customer even able to recreate the same problem using a 9.2.x version. Breaking in during boot up and going into ROMMON mode was the only way to stop the loop. After that he removed the configurations for port-channel on the gi0/0 and the ASA returned to normal use with out a problem.
Workaround: I told the customer to use some other ports to configure his port-channel and leave the gi0/0 as a single vanilla port. The customer was able to do this and the lab testing was a success. He confirmed his design and configurations with the AS team and it was approved for use by his engineering team.
Further Problem Description: The Crash Info file pointed to a FIPS problem.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(2), 9.1(4), 9.1(6), 9.2(4) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.157), 100.13(0.128), 100.15(0.112), 100.8(40.113), 9.1(7.5), 9.2(4.6), 9.3(3.171), 9.3(3.8), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux29978 | Title: | Cisco ASA IKEv1 and IKEv2 Buffer Overflow Vulnerability | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: * | Symptom: A vulnerability in the Internet Key Exchange (IKE) version 1 (v1) and IKE version 2 (v2) code of Cisco ASA Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code.
The vulnerability is due to a buffer overflow in the affected code area. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed firewall mode only and in single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.
Cisco has released software updates that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160210-asa-ike
Conditions: see security advisory
Workaround: see security advisory
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 10/8.3: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2016-1287 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(4) | |
Known Fixed Releases: | 8.2(5.59), 8.4(7.30), 8.7(1.18), 9.0(4.38), 9.1(6.11), 9.1(6.140), 9.1(7), 9.2(4.5), 9.3(3.171), 9.3(3.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz08625 | Title: | ASA crashes with traceback in SSH thread | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: A issue in the displaying of captures network trace files over a Secure Shell (SSH) connection with the Cisco Adaptive Security Appliance (ASA) Software could the SSH process to unexpectedly restart.
The issue is due to lack of proper input validation of certain captured UDP packets.
Conditions: The default configuration of the affected device.
Workaround: None.
Further Problem Description: None.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(2.3), 9.5(2) | |
Known Fixed Releases: * | 100.13(0.138), 100.15(0.116), 9.5(2.7), 9.6(1.1), 96.2(0.4), 96.2(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz01658 | Title: | Traceback in gtp_remove_request with duplicate requests | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may crash if a race condition is hit. ASA needs to be configured with clustering and crashed unit is slave.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.6(0.128) | |
Known Fixed Releases: * | 100.15(0.113), 9.5(2.7), 9.6(1.1), 96.1(1.87), 96.2(1.169), 96.2(11.4), 97.1(0.9), 97.1(1.11), 97.1(2.8), 97.1(3.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy51918 | Title: | Buffer overflow in RAMFS dirent structure causing traceback | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When this condition is hit, the customer will see a crash with the following information displayed: "ASA:Traceback in Thread Name: Unicorn Proxy Thread".
Conditions: This can occur when processing Clientless VPN sessions.
Workaround: Disabling Clientless VPN access.
Further Problem Description: This issue is not easy to identify from the crash signature alone and typically requires a core file for confirmation.
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 100.8(40.113) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.132), 100.15(0.112), 100.8(40.115), 9.1(7.5), 9.2(4.9), 9.4(2.103), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy78802 | Title: | orignial master not defending all GARP packets after cluster split brain | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: - inter site cluster, ASA1 as master, ASA2 and ASA3 as slaves. - When connectivity is down for ASA3 CCL link, it will become master, and then sends GARP for the cluster IP and the physical IP pointing to its own MAC address - This GARP from ASA3 updates the table on the next hop router, traffic will start flowing through ASA3. - Also, this will reach ASA1. From ASA1 point of view, it is still the master and still holds the cluster IP, so it will respond to this packet with arp-defense sending a GARP for itself, correcting the ARP entries in the next hop router, debugs appears as follows: ! the old Master receives GARP from the new Master (5.5.5.10 is the Cluster IP): arp-in: request at inside from 5.5.5.10 f4cf.e200.30b3 for 5.5.5.10 f4cf.e200.30b3 having smac f4cf.e200.30b3 dmac ffff.ffff.ffff ! the old Master replies with GARP arp-send: arp request built from 5.5.5.1 f4cf.e200.3053 for 5.5.5.10 at 4146420 arp-defense: Sent gratuitous arp in response to arp collision on interface inside
- the interesting part here is that ASA3 sends 6 GARP messages, and ASA1 reacts to them all execpt the 2nd one.
- With the above, the next hop router and any other devices in this VLAN will get back to ASA1. - It doesn't matter how long we wait, ASA3 will stay as master and won't detect any failure - Once the CCL connectivity is back, ASA3 will move to disabled and then come back up as slave, again, this will not affect any traffic flowing through the original master which is ASA1
- in the case of CCL recovery before the 3rd GARP is sent, although the chance is very low, the surrounding devices will have the MAC address of ASA3, causing an outage. - another thing to note, 2nd GARP from ASA3 is sent in a very short time, less than 1 msec
Conditions: ASA cluster
Workaround: - clear ARP entries on the switch or set a small ARP expiration timeout - switch the cluster master to another unit and back
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(1), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.135), 100.15(0.112), 100.8(40.116), 9.1(7.5), 9.2(4.9), 9.4(2.107), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux96716 | Title: | Crash when unit joins cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback seen when a node is added back to cluster
Conditions: NAT64 configured in a user context and traffic is sent to hit the NAT configuration. With the NAT configuration disable cluster in the ASA and enable it to rejoin the cluster causes the crash.
Workaround: Avoid NAT configuration in clustering/HA environment
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 100.15(0.87), 96.1(1.54) | |
Known Fixed Releases: * | 100.15(0.114), 9.5(2.7), 9.6(0.99), 9.6(1.1), 96.1(1.65), 96.1(1.88), 96.2(1.118), 96.2(1.175), 96.2(11.6), 97.1(0.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux82835 | Title: | Nat pool exhausted observed when enabling asp transactional-commit nat | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Syslogs observed:
%ASA-3-202010: NAT pool exhausted. Unable to create ICMP connection from inside:90.90.90.2/0 to outside:4.2.2.2/0 %ASA-3-202010: NAT pool exhausted. Unable to create ICMP connection from inside:90.90.90.2/0 to outside:4.2.2.2/0 %ASA-3-202010: NAT pool exhausted. Unable to create TCP connection from inside:90.90.90.2/49167 to outside:10.105.130.1/80 %ASA-3-202010: NAT pool exhausted. Unable to create TCP connection from inside:90.90.90.2/49167 to outside:10.105.130.1/80
Also noticing udp section is missing for nat pool:
ciscoasa# show nat pool TCP PAT pool outside, address 10.105.130.199, range 1-511, allocated 1 TCP PAT pool outside, address 10.105.130.199, range 512-1023, allocated 0 TCP PAT pool outside, address 10.105.130.199, range 1024-65535, allocated 0
ciscoasa# show run all xlate xlate per-session permit tcp any4 any4 xlate per-session permit tcp any4 any6 xlate per-session permit tcp any6 any4 xlate per-session permit tcp any6 any6 xlate per-session permit udp any4 any4 eq domain xlate per-session permit udp any4 any6 eq domain xlate per-session permit udp any6 any4 eq domain xlate per-session permit udp any6 any6 eq domain xlate block-allocation size 512 xlate block-allocation maximum-per-host 4
Conditions: 1. asp rule-engine transactional-commit nat is enabled on the ASA. 2. At least one static nat rule is created for port forwarding for the same public pool IP.
Workaround: Disable asp transactional commit and then reload the ASA.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.134), 100.15(0.112), 100.8(40.116), 9.1(7.5), 9.2(4.9), 9.4(2.106), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux08838 | Title: | ASA: Traceback in Checkheaps | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in Checkheaps
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6.8) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.133), 100.15(0.112), 100.8(40.115), 9.1(6.130), 9.1(7.5), 9.2(4.9), 9.4(2.104), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy45475 | Title: | ASA : Configuration not replicated on mate if standby IP is missing | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Failover to an ASA running on code 9.5.2 and above leading to Webvpn , http and ssh issues/outages. Configuration related to webvpn ,SSH ,http configured on an interface which does not have a standby IP is not synchronised.
For e.g.
Software : 9.5.2
interface GigabitEthernet0/1 nameif outside security-level 0 ip address 11.11.11.1 255.255.255.0 !
Enabling webvpn on an interface with no standby address .
act/pri(config-webvpn)# sh run webvpn webvpn enable outside anyconnect-essentials cache disable error-recovery disable
stby/sec# sh run webvpn webvpn anyconnect-essentials cache disable error-recovery disable
Conditions: ASA failover pair running on code 9.5.2 onwards.
Standby IP address not configured for interfaces on which features such as Webvpn , SSH, HTTP are enabled.
Workaround: Configure standby IP address.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2), 9.5(2.2) | |
Known Fixed Releases: * | 100.15(0.112), 9.5(2.7), 9.6(1.1), 96.2(1.152), 96.2(11.1), 97.1(0.4), 97.1(1.4), 97.1(2.2), 97.1(3.2), 97.1(4.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus37458 | Title: | ASA traceback in Thread name DATAPATH when handling multicast packet | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA or ASASM traceback in Thread name DATAPATH
Conditions: ASASM/ASA running software version 9.3(2), 9.4(2.6), 9.5(1), 9.5(2.2). Other versions can be affected as well.
Workaround: We believe that the issue is not present in the 9.3(1.1) release, but downgrade to this release is not recommended due to various reasons, including security reasons (PSIRT issues) and limited support lifetime of the 9.3(1) release train.
Further Problem Description: The crash happens during forwarding of multicast packets. So far the crash was observed for the following protocols: WS-Discovery (UDP/3702), Service Location Protocol (UDP/427), Simple Service Discovery Protocol (UDP/1900). One possible workaround would be to block multicast traffic for these protocols on neighboring routers/switches so that it doesn't reach ASA, or block all multicast traffic and allow only production multicast traffic.
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.3(2), 9.4(2.6), 9.5(1), 9.5(2.2) | |
Known Fixed Releases: * | 100.13(0.137), 100.15(0.115), 9.5(2.7), 9.6(1.1), 96.1(1.89), 96.2(1.179), 96.2(11.9), 97.1(0.12), 97.1(1.24), 97.1(3.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy87597 | Title: | ASA - Traceback in CP Processing Thread During Private Key Decryption | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may crash and reload unexpectedly during TLS operations
Conditions: 1. Observed in ASA releases 9.4 and 9.5 but may affect other versions as well. 2. Must be utilizing the TLS proxy feature to bridge encrypted connections
Workaround: Downgrade to the latest ASA 9.1 release or disable the TLS Proxy feature. There are currently no other known workarounds in affected versions.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(2.4), 9.3(2.2), 9.4(3), 9.5(2), 9.5(2.5), 9.5(2.6) | |
Known Fixed Releases: * | 100.13(0.138), 100.15(0.116), 9.5(2.7), 96.2(0.8), 96.2(11.12), 97.1(0.13), 97.1(1.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux59122 | Title: | ASA L7 policy-map comes into affect only if the inspection is re-applied | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA L7 policy-map comes into affect only after the inspection is re-applied.
Conditions: 1. L7 policy map configured but is not working 2. The inspection was applied previously without L7 pmap and it was added later
Eg. Initially the configuration is: policy-map global_policy class inspection_default inspect dcerpc
Later L7 pmap was added:
policy-map type inspect dcerpc MSRPC-MAP parameters endpoint-mapper lookup-operation
policy-map global_policy class inspection_default inspect dcerpc MSRPC-MAP
Workaround: Remove the inspection and re-apply:
conf t policy-map global_policy class inspection_default no inspect dcerpc MSRPC-MAP inspect dcerpc MSRPC-MAP
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.112), 9.1(7.5), 9.2(4.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux08783 | Title: | CWS: ASA does not append XSS headers | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: User intermittently receive "access denied" messages when browsing through the Cisco Cloud Web Security service.
Conditions: ASA Connector redirection to CWS.
Workaround: Adding static egress IP(s) as Scanning IPs in the ScanCenter portal will prevent users from seeing the "access denied" messages, but user/group information will not be passed to the service, so policies will not be applied.
Further Problem Description: This message does not reflect the default block page from CWS.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.131), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.2(4.9), 9.4(2.101), 9.4(3), 9.5(2.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux72610 | Title: | ASA TACACS+: process tacplus_snd uses large percentage of CPU | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: process tacplus_snd consuming the CPU up to 85% when we have pending requests or timeouts.
Conditions: ASA configured with a TACACS server, when a number of requests (authentication, authorization or accounting) times out, the issue will happen
Workaround: None, but tacplus_snd is consuming a high percentage of the CPU because there are no other process requesting to use the CPU. As general system load increases, the tacplus_snd load will decrease.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2(5), 9.1(5), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.124), 100.15(0.108), 100.16(0.19), 100.16(1.97), 100.16(14.1), 100.8(40.113), 9.1(7.5), 9.2(4.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw59382 | Title: | Rewriter errors when access IEEE website search feature through portal | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Search feature does not work when the following Internet page is opened through WebVPN: http://ieeexplore.ieee.org/Xplore/home.jsp
Conditions: When the page is opened and any keyword is searched
Workaround: Use smart-tunnel
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.100), 9.4(2), 9.4(2.1), 9.5(0.191), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.73), 100.15(17.33), 100.15(20.12), 100.15(8.23), 100.16(0.7), 100.16(1.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy32321 | Title: | Traceback in ldap_client_thread with ldap attr mapping and pw-mgmt | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback in thread name ldap_client_thread
Conditions: VPN authentication with ldap attribute mapping and the "password-management password-expire-in-days" feature.
Workaround: Disable the password-mangement feature, or at least the password-expire-in-days warning.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2.6) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.131), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.2(4.7), 9.2(4.9), 9.4(2.101), 9.4(2.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv49446 | Title: | ASA traceback on Standby device during config sync in thread DATAPATH | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback on Standby device in thread DATAPATH
Standby ASA crashes during failover synchronization. There are cases where the ASA crashed multiple times and then got stabilized.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.95), 100.15(20.22), 100.16(0.10), 100.16(1.50), 100.16(14.1), 100.16(15.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux28324 | Title: | The copy command does not verify the integrity of the image | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Starting from release 9.3.2 the copy command was not validating the integrity of an ASA image downloaded through this method, although the command output would mention that the verification succeeded.
Conditions: none
Workaround: none
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.157), 100.13(0.128), 100.15(0.112), 9.3(3.171), 9.3(3.8), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.63) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur87011 | Title: | ASA low DMA memory on low end ASA-X -5512/5515 devices | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA stops accepting new SSL connections - ASDM / webvpn / AnyConnect
Conditions: The issue is seen when the following conditions are met :
1) ASA next generation devices - ASA 5512 , ASA 5515 2) SFP module installed on the ASA 3) ASA software 9.2.x or 9.3.1 4) WebVPN configured on an interface
Workaround: None
Further Problem Description: Memory was not sufficient, so we increased DMA memory
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0, 9.2(1), 9.3(1), 9.3(3.2), 9.5(2.2) | |
Known Fixed Releases: * | 100.12(0.155), 100.13(0.122), 100.15(0.107), 100.16(0.18), 100.16(1.97), 100.16(14.1), 9.3(3.171), 9.3(3.8), 9.4(2.5), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut71095 | Title: | ASA WebVPN clientless cookie authentication bypass | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In some instances, the ASA WebVPN clientless session ID is included the URL. Session ID's should only be stored in cookies and transmitted over secure channels.
Conditions: -- WebVPN
Workaround: none
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1, 9.4(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.130), 100.12(0.153), 100.13(0.118), 100.13(0.80), 100.13(29.28), 100.14(0.44), 100.14(0.82), 100.14(16.1), 100.14(5.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv94338 | Title: | ASA traceback in Thread Name: CP Crypto Result Processing. | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashing in Thread Name: CP Crypto Result Processing.
Conditions: N/A
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(3.4) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.152), 100.13(0.117), 100.14(0.81), 100.15(0.67), 100.15(17.30), 100.15(20.10), 100.15(8.22), 100.16(0.5), 100.16(1.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw22130 | Title: | ASA traceback when removing dynamic PAT statement from cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Master ASA in clustering running code 9.3.3.2 presented a DATAPATH-1-1958 resulted by Address not mapped fault.
Statement removed was: no nat (visitors,outside) source dynamic Guest_network PAT-Guest-Pool
Conditions: > ASA running code 9.3.3.2 > Individual (L3) mode > Removing Dynamic PAT rule
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.94), 100.15(20.22), 100.15(8.33), 100.16(0.10), 100.16(1.50), 100.16(14.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz98516 | Title: | Observed Traceback in SNMP while querying GET BULK for 'xlate count' | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA firewall may crash when being polled by SNMP in rare circumstances.
Conditions: This has been seen primarily in the 8.4.x ASA code train. The first fix is in ASA interim code 8.4.4.2. To trigger the bug, the ASA must be queried via SMP for GETBULK of the xlate OID:
1.3.6.1.4.1.9.10.77.1.2.1
Workaround: Stop polling the ASA firewall via SNMP until an upgrade to the fixed code can be performed or modify the OID's being polled by your SNMP monitor station to not include the affected OIDs. | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.7(22.1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.12(0.156), 100.13(0.127), 100.13(0.58), 100.13(28.2), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux37442 | Title: | Cisco signed certificate expired for WebVpn Port Forward Binary on ASA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When the port forwarding component begins on the end host, a warning pops up stating the Cisco signed certificate has expired. For users that have policy set to not allow expired certificates, this is causing the functionality to break. The user has to modify their workstation Java security settings in order to proceed by accepting the risk.
Conditions: The issue occurs in default setting of IE or Firefox.
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(7), 9.1(6.10), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 100.8(40.111), 9.1(6.117), 9.1(6.240) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtx43501 | Title: | CPU hog due to snmp polling of ASA memory pool information | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA provides access to three different memory pools via SNMP. 1) The "System memory" pool (which is a superset of 2 and 3 below) 2) The MEMPOOL_DMA pool 3) The MEMPOOL_GLOBAL_SHARED pool
If the MEMPOOL_GLOBAL_SHARED pool information is queried via SNMP, a CPU hog might occur. The ASA's CPU may be held by the SNMP process for too long before yielding the CPU to other processes. If the data rate is high enough through the ASA, packets might be dropped.
If an ASA is experiencing this problem, it could generate syslogs that look like this: %ASA-4-711004: Task ran for 374 msec, Process = snmp, PC = 12229dc, Call stack = 0x00000000012229dc 0x000000000122175c 0x000000000121e45a 0x0000000001221247 0x00000000011fba3a 0x00000000011fa1ca 0x00000000004245a5
Also, the output of 'show process cpu-hog' will show entries for SNMP:
Process: snmp, PROC_PC_TOTAL: 9443, MAXHOG: 13, LASTHOG: 12 LASTHOG At: 12:47:00 CST Jan 23 2012 PC: 8c45b98 (suspend)
Process: snmp, NUMHOG: 9443, MAXHOG: 13, LASTHOG: 12 LASTHOG At: 12:47:00 CST Jan 23 2012 PC: 8c45b98 (suspend) Call stack: 8b6aac3 8b4ae5d 8b49bbc 8063b33
Conditions: To encounter this problem, memory information for the "Global Shared" pool must be queried via SNMP.
Workaround: Avoid polling the memory information for the Global Shared pool:
Exclude: .1.3.6.1.4.1.9.9.48.1.1.1.X.7 - "MEMPOOL_GLOBAL_SHARED"
where X is the integer corresponding to a particular statistic about the pool.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:N/I:N/A:P/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2012-4664 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.1(2.23), 8.2(3.6), 8.4(2.8), 8.4(3.8), 8.4(4), 9.1(2), 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.140), 100.12(0.144), 100.12(0.145), 100.13(0.95), 100.13(0.96), 100.13(0.98), 100.14(0.70), 100.14(0.71), 100.15(0.24) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux81683 | Title: | ASA Traceback on Thread Name: Unicorn Admin Handler | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashed after nat config change
Conditions: TCM enabled for NAT, and object static PAT being edited
Workaround: Turn off the TCM for NAT and reload
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.1(7.5), 9.2(4.6), 9.3(3.171), 9.3(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc11186 | Title: | ARP: Proxy IP traffic is hijacked. | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In certain conditions, ASA doesn't check the source of the ARP request or GARP packets for addresses it performs NAT translation for. Proxy-arp cache may thus get polluted and cause traffic hijacking for addresses ASA does NAT for.
Conditions: Configured NAT on the ASA for which it performs proxy-arp.
Workaround: None
Further Problem Description: NOTE: The fix for this issue may cause the ASA to not reply to ARP requests if the Source IP in the ARP request overlaps with a NAT rule on the ASA. This may occur when the nat configuration line is overly broad (such as an all zeros configuration, or any. To workaround this, add the keyword "no-proxy-arp" to the nat config line.
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.8/4.6: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:P/A:P/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2012-5010 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2(4) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.15(8.32), 100.16(0.9), 100.16(1.36), 100.16(14.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy36897 | Title: | Can't navigate to OWA 2013 due to ssl errors | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: OWA 2013 login page is not shown
Conditions: - TLSv1.2 is enabled - EC certificate is used by OWA 2013
Workaround: - Use TLSv1 or TLSv1.1
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.13(0), 9.6(1) | |
Known Fixed Releases: * | 100.13(0.132), 100.15(0.112), 9.4(2.103), 9.4(3), 96.1(1.83), 96.2(1.144), 96.2(11.1), 97.1(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw87331 | Title: | ASA: Traceback in Thread name DATAPATH-7-1918 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may unexpectedly reload and generate a traceback in Thread Name Datapath
Conditions: n/a
Workaround: Disable threat detection tcp intercept statistics.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.124), 100.15(0.109), 100.16(0.19), 100.16(1.98), 100.8(40.113), 9.1(7.5), 9.2(4.6), 9.3(3.171) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy22561 | Title: | VPN Load-Balancing does not send load-balancing cert for IPv6 Address | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA does not send load-balancing certificate for initial client access to load-balancing IPv6 address. * It works fine when connecting to the IPv4 address.
Conditions: Configuing separate certificate for load-balancing-IP and real-IP, and configure both ipv4 and ipv6 address for load-balancing address.
Workaround: Using a Unified Client Certificate(UCC) or Wildcard.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.157), 100.13(0.130), 100.15(0.112), 9.4(2.101), 9.4(3), 9.5(2.6), 9.6(0.104), 96.1(1.78), 96.2(1.130), 97.1(0.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux85863 | Title: | FIPS: Continuous RNG test can mistakenly report an error | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The FIPS Continuous RNG test can incorrectly fail and reset the ASA.
Conditions: This condition appears to be triggered by a race condition under load.
Workaround: Disabling FIPS mode will prevent the issue; however, that may not be a feasible option in some cases. There is currently no other workaround.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.10) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.124), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv21478 | Title: | Cisco ASA tunnel group parameter validation | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Cisco ASA configured for webvpn does not perform validation of the of the tgroup paramter. In some cases this can be used to pass additional parameters to the internal resources that are being proxied via the webvpn service.
Conditions: Clientless SSL VPN should be configured
Workaround: None
Further Problem Description: This is not an issue on the ASA itself, however additional hardening have been implemented to avoid this problem.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(2), 8.4(7.2), 8.4(7.27), 8.4(7.28), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.11(0.64), 100.12(0.150), 100.12(0.151), 100.13(0.111), 100.13(0.114), 100.14(0.78), 100.14(0.79), 100.15(0.50), 100.15(0.56) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw19671 | Title: | ASA traceback while restoring backup configuration from ASDM | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashes in Thread Name: Unicorn Admin Handler while restoring backup configuration through ASDM.
Conditions: ASA in failover running 9.4(1).
Workaround:
Further Problem Description: None
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.85), 100.15(0.99), 100.16(0.12), 100.16(1.53), 100.16(14.1), 100.16(15.7), 100.8(40.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux71197 | Title: | "show resource usage" gives wrong number of routes after shut/no sh | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: when running in multiple context mode, shut/no shut on the interface will update the route resource usage, the ASA does not reset the counter, but add new routes, resulting in reaching the limit
when there is high network fluctuation, route resource will eventually deplete and the ASA will fail to add routes, resulting in an outage
Conditions: none
Workaround: reload the ASA
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.8(40.111), 9.2(1), 9.2(4.8), 9.3(3.8), 9.4(2.165), 9.5(1), 9.5(2), 96.1(1.71) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.131), 100.15(0.112), 9.2(4.9), 9.4(2.102), 9.4(3), 9.5(2.6), 9.6(0.109), 96.1(1.80) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv39775 | Title: | ASA cluster-Incorrect "current conns" counter in service-policy | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Incorrect "currents conns" counter on service-policy ASA cluster. Does not match up with the current connection "show connection count" on the unit, will lead to traffic drops in the service-policy once the limit is hit in the service-policy.
Conditions:
1) ASA in a cluster setup. 2) Applies to both single or multiple mode. 3) Typical config : class connection_limit set connection conn-max 500000 embryonic-conn-max 2000 per-client-max 200 per-client-embryonic-max 50
Workaround: None.
Further Problem Description: CLSTR1-Primary/ASAFW# cluster exec show service-policy | i conns CLSTR1-Primary(LOCAL):************************************************ current embryonic conns 3, current conns 5732, drop 0 CLSTR1-Secondary:******************************************************* current embryonic conns 1, current conns 88720, drop 0 <<<< CLSTR1-Primary/ASAFW# cluster exec show conn count CLSTR1-Primary(LOCAL):************************************************ 5823 in use, 36602 most used Cluster stub connections: 3300 in use, 30142491 most used CLSTR1-Secondary:******************************************************* 3270 in use, 120262 most used <<<<<<<<<<<<<< | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(2), 9.2(2.4), 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(15.11), 100.15(16.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu48197 | Title: | ASA: Stuck uauth entry rejects AnyConnect user connections | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Intermittently, the User VPN sessions fail to establish due to a stuck uauth entry associated with the same Pool/to-be-Assigned IP address of the new User.
Syslog: %ASA-5-722010: Group User IP SVC Message: 16/ERROR: Detected internal error in SSL connection.. %ASA-4-113019: Group = , Username = , IP = , Session disconnected. Session Type: SSL, Duration: 00:00m:12s, Bytes xmt: 0, Bytes rcv: 0, Reason: User Requested
- While debugging, we see the following:
debug webvpn anyconenct: webvpn_cstp_accept_address: 192.168.1.10/255.255.255.0 ''snip'' vpn_put_uauth failed! webvpn_cstp_send_error: 503 Service Unavailable
sh ip local pool : shows that the address 192.168.1.10 is available.
debug pix uauth: vpn_putuauth: ERR: uxlate collision for ip 192.168.1.10 user USER-B on interface OUTSIDE
show uauth: remote access VPN user 'USER-A' at 192.168.1.10, authenticated <<< Stuck entry for "another user"
show vpn-sessiondb anyconnect filter name USER-A : no entries
here, notice that the address that is being assigned to USER-B is 192.168.1.10, and this is available in the local pool I.e. This address was assigned to another user [USER-A] in the past. This user does not show up in the vpn-sessiondb indicating that he has already logged off.
Conditions: ASA running on OS version [Ex: 9.2(1)] that has the fix for: CSCuh08432 Anyconnect sessions do not connect due to uauth failure
This ASA is acting as AnyConnect SSLVPN Server.
Workaround: None. Either reload the ASA or failover to the standby ASA.
Or Start using a new IP address pool for the Connection entry
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.70), 100.16(14.1), 100.8(40.109), 9.1(6.109), 9.1(7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCun21186 | Title: | ASA traceback when retrieving idfw topn user from slave | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Slave unit crashes when trying to join the master. This happens in configuration replication.
Conditions: After configuring a Context on an active cluster the Slave disables clustering.
When correcting differences in context configuration try to have slave rejoin. The slave will crash.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(2) | |
Known Fixed Releases: * | 100.12(0.157), 100.13(0.128), 100.15(0.112), 100.8(38.121), 100.8(40.62), 100.8(56.26), 100.8(64.3), 100.8(65.3), 100.8(66.4), 100.8(67.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv86500 | Title: | Webvpn: JS parser may crash if the underlying connection is closed | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback when WebVPN client connected and ASA is processing JavaScript.
Conditions: ASA running release 9.3.3.221.
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.221) | |
Known Fixed Releases: * | 100.12(0.145), 100.13(0.98), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.91), 100.15(16.5), 100.15(17.6), 100.15(3.51) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux36112 | Title: | PBR: Mem leak in cluster mode due to policy based route | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Memory usage on ASA increases over a period of time
Conditions: 1. Policy Based Routing is applied on an interface. 2. ASA is configured in cluster mode and there are two or more units in the cluster.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.128), 100.15(0.112), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.63), 96.2(1.116) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu87823 | Title: | ASAv traceback in DATAPATH when used for WebVPN | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAv traceback in DATAPATH when used for WebVPN
Conditions: ASAv running release 9.4.1 and configured for WebVPN
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.143), 100.13(0.95), 100.13(29.28), 100.14(0.71), 100.14(16.5), 100.14(5.30), 100.15(0.24), 100.15(1.68), 100.15(16.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy96391 | Title: | ASA clientless rewriter failure at 'CSCOPut_hash' function | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When clicking on bookmark within webportal, the resulting page does not display.
Conditions: This issue was observed with the following: -ASA 9.2.2.4 -Issue seen with clientless only, not with AnyConnect
Workaround: Use AnyConnect instead of clientless
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.137), 100.15(0.114), 100.8(40.117), 9.2(4.9), 9.4(2.112), 9.4(3), 9.6(1.1), 96.1(1.88), 96.2(1.177) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz38180 | Title: | ASA: Page Fault traceback in DATAPATH on standby ASA after booting up | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA may generate a traceback and reload in the DATAPATH thread just after it boots up and joins failover with an already active ASA.This may make the ASA go into a boot loop.
Conditions: The reload happens just after the ASA boots up and joins failover with an already active ASA
Workaround: Force the ASA to skip the config using config-register. Clear the startup config. Configure failover again and let the ASA join the failover.
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 9.1(6.10), 9.1(7.6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz25410 | Title: | Traceback due to SNMP Notify Thread | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: Traceback due to SNMP polling
Conditions: ASA configured with SNMP polling
Workaround: Disable SNMP or stop polling the ASA with SNMP
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 9.5(2.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz42390 | Title: | ASA Stateful failover for DRP does not work intermittently | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: On the ASA routes learned by dynamic routing protocols are synchronized from the active to the standby unit. During failover traffic through the ASA should still be forwarded, although 1-2 seconds drop is expected, because ASA disables and re-enables routing on its interfaces and flushes local subnet and local host routes.
We found that routes learned by dynamic routing protocols can sometimes be lost during failover and traffic is interrupted, until dynamic routing protocol repopulates ASA routing table.
Conditions: This issue was found in version 9.5(2). Other versions can be affected as well.
Workaround: Use IETF NSF, although this defect is not directly related to NSF. NSF should minimize traffic loss.
Further Problem Description:
| |
Last Modified: | 28-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy54567 | Title: | Evaluation of pix-asa for OpenSSL March 2016 | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom:
Cisco Adaptive Security Appliance (ASA) includes a version of OpenSSL that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2016-0800 CVE-2016-0705 CVE-2016-0798 CVE-2016-0797 CVE-2016-0799 CVE-2016-0702 CVE-2016-0703 CVE-2016-0704
And disclosed in https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
This bug has been opened to address the potential impact on this product.
Conditions:
Exposure is not configuration dependent.
Cisco has reviewed and concluded that this product is affected by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2016-0797 - BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption CVE-2016-0799 - Fix memory issues in BIO_*printf functions CVE-2016-0702 - Side channel attack on modular exponentiation CVE-2016-0705 - Double-free in DSA code
This product is not affected by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2016-0800 - Cross-protocol attack on TLS using SSLv2 (DROWN) CVE-2016-0703 - Divide-and-conquer session key recovery in SSLv2 CVE-2016-0704 - Bleichenbacher oracle in SSLv2 CVE-2016-0798 - Memory leak in SRP database lookups
Workaround: Not available.
Further Problem Description:
Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base CVSS score as of the time of evaluation is: 4.3
https://tools.cisco.com/security/center/cvssCalculator.x?version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:ND/RL:ND/RC:ND
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html | |
Last Modified: | 28-APR-2016 | |
Known Affected Releases: * | 6.0, 8.0, 9.1(2), 9.2(1), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.6(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz56314 | Title: | ASA5500-X Chassis Serial Number Not Visible from CLI | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom:
Adaptive Security Appliance (ASA) 5500-X models do not display the chassis serial number using the expected Command Line Interface (CLI) outputs; an internal board serial number is displayed instead. This may create difficulties in opening support requests with Cisco Technical Assistance Center (TAC) that requires the chassis serial number to provide support.
Workaround:
1. Read the chassis serial number from the sticker on the device.
or
2. Reload the ASA5500-X into ROMMON mode and retrieve the chassis serial number from the show idprom output.
It is important to keep in mind that the ASA activation keys should continue to be issued against the internal serial number displayed in the output of show version command. | |
Last Modified: | 28-APR-2016 | |
Known Affected Releases: | 8.6(1) | |
Known Fixed Releases: | 100.8(0.137), 100.8(11.21), 100.8(27.7), 100.8(33.5), 100.8(34.1), 100.8(36.1), 100.9(0.1), 100.9(2.1), 8.6(1.2), 9.0(0.99) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz44486 | Title: | ASA: Traceback on the ASA unit with Thread Name Track | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: ASA Unit Traceback with Thread Name track
Conditions: ASA device configured with SLA Monitor configuraton
Workaround: None related to this tracback
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy73652 | Title: | Traceback in thread name idfw when modifying object-group having FQDN | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback in thread name idfw when modifying object-group having FQDN
Conditions: Modifying an object-group having FQDN.
Workaround: Restrict using FQDN objects, if possible
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6.10) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.135), 100.15(0.112), 100.8(40.116), 9.1(7.5), 9.2(4.9), 9.4(2.107), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux58483 | Title: | Deadlock in gtp_lu_process_pdpmcb_info | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Deadlock soft trace will be seen on the console and the reliability will be impacted
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 9.5(1.171), 9.5(2.7), 9.6(0.99), 96.1(1.26), 96.1(5.4), 96.1(6.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCum70304 | Title: | FIPS self test power on fails - fipsPostDrbgKat | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ERROR: FIPS Self-Test failure, fipsPostDrbgKat [1:0:-1:-1:0]
*** *** --- SHUTDOWN NOW --- *** *** Message to all terminals:
*** *** ERROR: FIPS Self-Test failure, fipsPostDrbgKat [1:0:-1:-1:0]
Process shutdown finished Rebooting....
Conditions: upgrade to 9.1.2
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(2), 9.1(5.21) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.135), 100.15(0.112), 100.8(40.116), 9.1(7.6), 9.2(4.9), 9.4(2.107), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz09394 | Title: | infinite loop in JS rewriter state machine when return followed by var | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: after clicking on a bookmark, the page seems to load(there's a spinning icon) and then after a while the spinning icon stops spinning but the page stays blank.
Conditions: Page has a js file that can result in an infinte loop for the webvpn rewriter
Workaround: Use APCF
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(4) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.138), 100.15(0.115), 9.5(2.7), 9.6(1.1), 96.2(0.3), 96.2(1.183), 96.2(11.11), 97.1(0.12), 97.1(1.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy01438 | Title: | ASA crash with SIP inspection and SFR enabled in 9.5.2 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Crash seen in 9.5.2 with SIP enabled
Conditions: SIP and SFR enabled on the ASA after 9.5.2
Workaround: NA
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.15(0.112), 9.5(2.7), 9.6(1.1), 96.1(1.86), 96.2(1.158), 96.2(11.2), 97.1(0.6), 97.1(1.8), 97.1(2.5), 97.1(3.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy21206 | Title: | Crash when drop is enabled. | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crash while replicating flow
Conditions: Configure NAT in ASA which is part of clustering. While an xlate is created, then xlate is updated to the other cluster units, which triggers this crash.
Workaround: Avoid NAT configuration in clustering/HA environment
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 96.1(1.68) | |
Known Fixed Releases: * | 100.15(0.114), 9.5(2.7), 9.6(0.99), 9.6(1), 96.1(1.74), 96.1(1.88), 96.2(1.124), 96.2(1.175), 96.2(11.6), 97.1(0.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy49902 | Title: | inspect ip-option is not allowing "NOP" even when allowed | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA is dropping the traffic with a drop reason as "IP option "Noop" in the syslog. We configured the child policy of type inspect ip-options and allowed both option "NOP" and "EOOL" based on the captures. Applying this child policy to the inspect ip-options" has made no change and ASA is still dropping traffic with same error message. In fact when we look at the service-policy, it is showing no counter increment. Suspected CSCux59122, however, we did perform this workaround. We also tried removing and applying the service-policy several times. Problem remains same.
Conditions: The IP option inspection
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(2.5), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.132), 100.15(0.112), 100.8(40.115), 9.1(7.5), 9.2(4.9), 9.4(2.103), 9.4(3), 9.5(2.160) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz10371 | Title: | ASA Traceback and reload by strncpy_sx.c | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA may crash and reload unexpectedly. The output of 'show crash' may indicate that the thread that caused the crash is labelled as 'idfw_proc' and the faulting action is unknown.
This is different than bug CSCuy03024 in which the faulting action is Page Fault.
Conditions: - First observed in ASA running code 9.5.2 and then also in 9.5.2.5 - The crash was triggered during the synchronization from active to passive unit in fail over pair. The passive unit when receiving the configuration crashed.
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2), 9.5(2.5) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.137), 100.15(0.114), 100.8(40.117), 9.2(4.9), 9.4(2.111), 9.4(3), 9.5(2.7), 9.6(1.1), 96.1(1.88) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy07753 | Title: | Smart tunnel does not work since Firefox 32bit version 43 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Smart tunnel functionality does not work with Firefox 43 or newer. There is no prompt if the user wishes to forward the browser traffic via the smart tunnel. Instead, browser tries to forward the traffic locally.
Conditions: Firefox 43 or newer.
Workaround: Use different browser or downgrade Firefox browser.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4 | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.134), 100.15(0.112), 100.8(40.116), 9.1(7.5), 9.2(4.9), 9.4(2.106), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz41152 | Title: | Address the OpenSSL December 2015 vulnerabilities for certification | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco Adaptive Security Appliance (ASA) includes a version of OpenSSL that is affected by the vulnerability identified by one or more of the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-3194 , CVE-2015-3195 and CVE-2015-3196
And disclosed in http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
This bug has been opened to address the potential impact on this product.
Conditions: Exposure is not configuration dependent.
Cisco has reviewed and concluded that this product is affected by one or more of these vulnerabilities.
Cisco Adaptive Security Appliance (ASA) is affected by:
- CVE-2015-3194 Certificate verify crash with missing PSS parameter o ASA dosen't use OpenSSL for cert verification but it does verify other RSA signatures during the exchange. o Versions 9.2 and later are affected - CVE-2015-3195 X509_ATTRIBUTE memory leak o Versions 8.4 and later are affected - CVE-2015-3196 Race condition handling PSK identify hint o Versions 9.2 and later are affected
Cisco Adaptive Security Appliance (ASA) is not affected by:
- CVE-2015-3193 BN_mod_exp may produce incorrect results on x86_64 - CVE-2015-1794 Anon DH ServerKeyExchange with 0 p parameter
Workaround: Not available.
Further Problem Description: Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/3.7: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-3194, CVE-2015-3195, CVE-2015-3196 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(1.10) | |
Known Fixed Releases: * | 9.4(1.11), 9.4(1.207) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy11281 | Title: | ASA: Assert traceback in version 9.4.2 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAs in failover pair running version 9.4.2 crashes with the following message. assertion "mh->mh_mem_pool > MEMPOOL_UNDEFINED && mh->mh_mem_pool < MEMPOOL_MAX_TYPE" failed: file "slib_malloc.c", line 6024
Conditions: ASA in failover and SIP inspection enabled.
Workaround: NONE.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 100.13(0.135), 100.15(0.112), 9.4(2.107), 9.4(3), 9.5(2.7), 9.6(1.1), 96.1(1.86), 96.2(1.160), 96.2(11.2), 97.1(0.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv47191 | Title: | 9.5.1 - Crash in bcm_esw_init thread | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA crashed in the bcm_esw_init thread and reloaded during boot.
Conditions: This crash was seen while booting a 5585-60.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(0.108), 96.1(1.31) | |
Known Fixed Releases: * | 100.13(0.129), 100.15(0.112), 9.4(2.101), 9.4(3), 9.5(2.7), 9.6(0.99), 96.1(1.73), 96.2(1.123) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy95543 | Title: | High CPU usage due to Threat-Detection | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: High CPU usage on ASA
Conditions: 1. Threat-detection statistics host is enabled. If 'threat-detection statistics' is configured, then 'threat-detection statistics host' is automatically configured.
2. ASA is on one of the following releases. 9.5 Branch: 9.5(2)6 or above 9.6 Branch: 9.6(1) or above
Note: In version 9.6(1), the threat-detection related commands will not be visible in the output of "show run" or "show run all". To check if threat-detection is enabled , please run the command "show run threat-detection".
Workaround: configure 'no threat-detection statistics host'
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2.6), 9.6(1) | |
Known Fixed Releases: * | 100.15(0.113), 9.5(2.7), 9.6(1.1), 96.1(1.87), 96.2(1.167), 96.2(11.4), 97.1(0.8), 97.1(1.10), 97.1(2.8), 97.1(3.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz21068 | Title: | CSCOPut_hash can initiate unexepected requests | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: - Customer is able to access his portal.
- Accessing certain tabs within his portal causes failures. The new tab will load and then disappear.
- This only happens on Firefox and Chrome. Internet explorer works fine.
- Entire site works when not accessed through clientless portal bookmark
Conditions: - Using rewriter on clientless portal with Chrome and Firefox
Workaround: - Use Internet Explorer
- Bypass rewriter
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(3.4) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.138), 100.15(0.116), 9.2(4.10), 9.4(2.112), 9.4(3), 9.5(2.7), 9.6(1.1), 96.2(0.4), 96.2(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux30780 | Title: | GTPv1 traceback in gtpv1_process_msg | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback will happen on slave unit.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(1.170) | |
Known Fixed Releases: * | 100.15(0.108), 100.16(0.19), 100.16(1.97), 100.16(14.1), 9.5(1.172), 9.5(2.7), 9.6(0.99), 96.1(1.49) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur49234 | Title: | ASA Mgmt Session stuck on running "sh block exhaustion snapshot/history" | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: 1) Mgmt Session to the ASA - telnet or ssh or console stuck
2) Unable to ssh/telnet due to session limit count
Conditions: 1) 2048 blocks depleted AND 2) "show blocks exhaustion history" or "show blocks exhaustion snapshot" is executed
Workaround: 1) Failover to the other unit if they are in failover
OR
2) reload the unit
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.70), 100.16(14.1), 9.4(2.99), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux70998 | Title: | Reload in Thread Name: IKE Daemon | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA reloads in Thread Name: IKE Daemon
Conditions: ASA running 9.x version of code with certificate authentication.
Workaround: None
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6.116) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.123), 100.15(0.108), 100.16(0.18), 100.16(1.97), 100.16(14.1), 100.8(40.113), 9.1(6.117), 9.1(7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy21287 | Title: | STBY ASA does't pass traffic via ASA-IC-6GE-SFP-B ifc after reload | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Standby ASA does not pass the traffic via interface of the module ASA-IC-6GE-SFP-B after reload
Conditions: ASA configured with failover - the problem does not occur on standalone unit Interface is configured with speed setting The command " sh controller GigabitEthernet 1/X display output ... General Control Registers: Device Control (CTRL) : 0x00dc0a01 Device Status (STATUS) : 0x00080781
Workaround: changing speed to "no negotiate" got it working for sometime, however, the interfaces started flapping.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(4), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.158), 100.13(0.132), 100.15(0.112), 100.8(40.115), 9.1(7.5), 9.2(4.9), 9.4(2.103), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy65416 | Title: | assert "ctm->async_ref == 0" failed: file "ssl_common.c", line 193-part2 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may traceback during an SSL VPN stress test
Conditions: SSL VPN stress test
Workaround: none
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(2.102) | |
Known Fixed Releases: * | 100.12(0.158), 100.13(0.134), 100.15(0.112), 9.4(2.105), 9.4(2.106), 9.4(3), 9.5(2.7), 9.6(0.129), 9.6(1.1), 96.1(1.85) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv42720 | Title: | Egress ACL with ICMP Types Misbehaving. | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Configuring an ACL on the outbound port of a device may cause some traffic to be dropped even though the ACL policy permits the dropped packet(s).
Conditions: The following policy applied to the outbound port will drop packets with Types 2-129.
ASA5506X# show run access-list access-list unh-out extended permit icmp6 any6 any6 unreachable 0 access-list unh-out extended permit icmp6 any6 any6 unreachable 1 access-list unh-out extended permit icmp6 any6 any6 unreachable 2 access-list unh-out extended permit icmp6 any6 any6 unreachable 3 access-list unh-out extended permit icmp6 any6 any6 unreachable 4 access-list unh-out extended permit icmp6 any6 any6 unreachable 5 access-list unh-out extended permit icmp6 any6 any6 unreachable 6 access-list unh-out extended permit icmp6 any6 any6 packet-too-big 0 access-list unh-out extended permit icmp6 any6 any6 time-exceeded 0 access-list unh-out extended permit icmp6 any6 any6 time-exceeded 1 access-list unh-out extended permit icmp6 any6 any6 parameter-problem 0 access-list unh-out extended permit icmp6 any6 any6 parameter-problem 1 access-list unh-out extended permit icmp6 any6 any6 parameter-problem 2 access-list unh-out extended permit icmp6 any6 any6 echo 0
%ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 2, code 0) by access-group "unh-out" [0x0, 0x0] %ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 3, code 0) by access-group "unh-out" [0x0, 0x0] %ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 3, code 1) by access-group "unh-out" [0x0, 0x0] %ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 0) by access-group "unh-out" [0x0, 0x0] %ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 1) by access-group "unh-out" [0x0, 0x0] %ASA-4-106023: Deny icmp src pub:3000::2 dst priv:3001::2 (type 4, code 2) by access-group "unh-out" [0x0, 0x0]
ASA5506X# show access-list unh-out access-list unh-out; 14 elements; name hash: 0x91e2c362 access-list unh-out line 1 extended permit icmp6 any6 any6 unreachable 0 (hitcnt=0) 0x4e0ab796 access-list unh-out line 2 extended permit icmp6 any6 any6 unreachable 1 (hitcnt=20) 0xa549de20 access-list unh-out line 3 extended permit icmp6 any6 any6 unreachable 2 (hitcnt=0) 0x3e3005b5 access-list unh-out line 4 extended permit icmp6 any6 any6 unreachable 3 (hitcnt=0) 0x60363c63 access-list unh-out line 5 extended permit icmp6 any6 any6 unreachable 4 (hitcnt=0) 0xeb98c4e3 access-list unh-out line 6 extended permit icmp6 any6 any6 unreachable 5 (hitcnt=0) 0x4b9b65f1 access-list unh-out line 7 extended permit icmp6 any6 any6 unreachable 6 (hitcnt=0) 0x53e45a3f access-list unh-out line 8 extended permit icmp6 any6 any6 packet-too-big 0 (hitcnt=0) 0x9b62e1db access-list unh-out line 9 extended permit icmp6 any6 any6 time-exceeded 0 (hitcnt=0) 0x5362e1e1 access-list unh-out line 10 extended permit icmp6 any6 any6 time-exceeded 1 (hitcnt=0) 0xf7a7cc36 access-list unh-out line 11 extended permit icmp6 any6 any6 parameter-problem 0 (hitcnt=0) 0x453e9232 access-list unh-out line 12 extended permit icmp6 any6 any6 parameter-problem 1 (hitcnt=0) 0x780a5e2e access-list unh-out line 13 extended permit icmp6 any6 any6 parameter-problem 2 (hitcnt=0) 0x4a0104ef access-list unh-out line 14 extended permit icmp6 any6 any6 echo 0 (hitcnt=0) 0xf50e5b9d ASA5506X# ASA5506X# show runn access-group access-group unh-out out interface priv
Workaround: None
Further Problem Description: N/A
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.16(0.9), 100.16(1.36), 100.16(14.1), 100.16(15.1), 100.16(15.5), 9.4(1.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz30425 | Title: | Network command disappears from BGP after reload with name | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Network command disappears from BGP after reload with name
Conditions: Issue is only seen when a name has been configured (name 2.2.2.0 Production-20-0)
Workaround: remove name from the configuration (name 2.2.2.0 Production-20-0)
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.6(1) | |
Known Fixed Releases: * | 100.13(0.138), 100.15(0.116), 9.5(2.7), 96.2(0.8), 96.2(11.12), 97.1(0.13), 97.1(1.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy85243 | Title: | ASA traceback when receive Radius attribute with improper variable type | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: If the Radius attribute IE-Proxy-Server-Policy is passed back from a Radius server to the ASA for an AnyConnect VPN client, but it has an attribute type of "string" instead of "integer" then it will cause the ASA to crash.
That attribute should be an integer as per the information at:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/aaa-radius.html#32985
Conditions: ASA authenticating VPN users via Radius ISE/ACS Radius server with attribute IE-Proxy-Server-Policy tagged as a "string" type.
Crash when debug crypto ikev1 or syslog message 713241
Workaround: 1) Delete the attribute from your Access Policies on your Radius server so it is no longer returned. 2) Not only does the attribute need to contain the value of an integer, but it should be tagged as an Integer type in the Radius attribute dictionary (In ISE = Policy > Policy Elements > Dictionaries).
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 8.4(7), 9.1(7) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.135), 100.15(0.112), 100.8(40.116), 9.1(7.5), 9.2(4.9), 9.4(2.107), 9.4(3), 9.5(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut10103 | Title: | ASA 5545x Upgrade to 9.2(2)4 causes Traceback in Thread Name SSL | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Upgrade from 9.0(2) directly to 9.2(2)4 causes 5545x to traceback in thread name SSL
Conditions: Using out of the box (Default Configuration) upgrade 5545x from 9.0(2) to 9.2(2)4
Workaround: none
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 9.2(4.9), 9.4(2.99), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy34265 | Title: | ASA Access-list missing and losing elements after configuration change | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: After pushing a configuration change tmatch compile continues to run and the number of elements in the ACL will fall and not all elements will be loaded.
Conditions: ASA running 9.1.7 with new ACL configuration applied.
Workaround: none
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(7) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.134), 100.15(0.112), 100.8(40.115), 9.1(7.5), 9.2(4.9), 9.4(2.105), 9.4(2.220), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux66866 | Title: | Traffic drop due to constant amount of arp on ASASM | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Constant amount of ARP generating on ASA-SM and this causes partial traffic drop in user(normal) traffic, not related to ARP; outside->inside traffic (There is no packet drop if static ARP is configured on all interfaces for outside and inside.)
Conditions: Customer is using ASA-SM with 200 contexts All inside interfaces are assigned to separate vlan Constant amount of ARP is generated(200-300 as per 15s rate)
Workaround: Using static ARP on all interface of ASA-SM for outside/inside.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6.8) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.134), 100.15(0.112), 100.8(40.115), 9.1(7.5), 9.4(2.106), 9.4(3), 9.5(2.7), 9.6(1.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy57644 | Title: | ASAv sub-interface failing to send traffic with customised mac-address | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: We use the command below to customise the sub-interface mac address. After applying the customised mac-address for each sub-interface, ASAv is no long able to send traffic via those sub-interfaces which has customised mac-address applied.
+++ interface GigabitEthernet0/1 description ASAv_Trunk_Port no nameif no security-level no ip address ! interface GigabitEthernet0/1.102 mac-address 1021.1021.1021 vlan 102 nameif GNET security-level 100 ip address 192.168.50.2 255.255.255.0 standby 192.168.50.3 ! interface GigabitEthernet0/1.103 mac-address 1030.1030.1030 vlan 103 nameif Gov_Legacy security-level 50 ip address 192.168.51.2 255.255.255.0 standby 192.168.51.3 ! interface GigabitEthernet0/1.104 mac-address 1040.1040.1040 <<<<<< this MAC is listed as the port-group port runtime MAC. vlan 104 nameif 3rd_party security-level 50 ip address 192.168.52.2 255.255.255.0 standby 192.168.52.3 +++
Conditions: apply customised MAC address under ASAv sub-interfaces
Workaround: remove customised mac-address, which is not really a workaround.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2), 99.1(3.141) | |
Known Fixed Releases: * | 100.15(0.112), 9.5(2.220), 9.5(2.7), 9.6(1.1), 96.2(1.152), 96.2(11.1), 97.1(0.4), 97.1(1.4), 97.1(2.2), 97.1(3.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux29842 | Title: | Primary and Secondary ASA in HA is traceback in Thread Name:DataPath | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: 40% of the sessions were dropped during failover due to crash.
Conditions: Failover enabled.
Workaround:
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(3), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.135), 100.15(0.112), 100.8(40.116), 9.2(4.9), 9.4(2.107), 9.4(3), 9.5(2.7), 9.6(1.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux35538 | Title: | Traceback in ctm_ssl_generate_key with DHE ciphers SSL VPN scaled test | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may traceback in ctm_ssl_generate_key with VPN scaled test and DHE ciphers.
Conditions: ASA VPN AnyConnect and Clientless SSL VPN scaled test.
Workaround: None
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6.107), 9.1(6.111) | |
Known Fixed Releases: * | 100.11(0.69), 100.12(0.158), 100.13(0.134), 100.15(0.112), 100.8(40.114), 9.1(6.113), 9.1(7), 9.1(7.5), 9.2(4.9), 9.4(2.106) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCun17627 | Title: | OSPFv2 neighborship flaps from Exstart to Down | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA clustered firewalls OSPFv2 Neighborship flaps between ASA and Router.
Node is stuck in Extstart with neighbor router
Conditions: Mode : L2 clustering + 2 node -or- L3 Clustering + 4 Node Perform a "cluster remove unit on Master node or failover to slave unit. ASA peering with other OSPF device.
Workaround: Use static routing -or- Use the command 'osfp mtu-ignore'
Further Problem Description:
| |
Last Modified: | 12-APR-2016 | |
Known Affected Releases: | 100.8(56.19), 9.2(2.4) | |
Known Fixed Releases: * | 100.8(56.30), 9.2(4.9) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz20387 | Title: | ASA : Traceback in Thread name: Session manager | |
Status: | Terminated | |
Severity: | 2 Severe | Description: | Symptom: Traceback in Thread Name : Session Manager
Conditions: ASA is configured with webvpn.
Workaround: None as of now.
Further Problem Description:
| |
Last Modified: | 15-APR-2016 | |
Known Affected Releases: | 9.4(2.6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw44038 | Title: | Watchdog traceback in ldap_client_thread with large number of ldap grps | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA running 9.1.6.8 in failover pair crashing with Thread Name: ldap_client_thread.
Conditions: If a user is linked to more than 250 ldap groups and ldap mapping is performed on the memberOf attribute, the ASA reloads with a watchdog error when the user connects if the user connects a VPN connection.
Workaround: Do not use the same username that is linked to more than 250 ldap groups.
Disable ldap mapping for the memberOf attribute in deployments using a large number of ldap groups. DAP may offer an alternative solution, depending on the use case.
Further Problem Description:
| |
Last Modified: | 15-APR-2016 | |
Known Affected Releases: * | 9.1(6.8), 9.4(2.11) | |
Known Fixed Releases: | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.70), 100.16(14.1), 100.8(40.109), 9.1(7.5), 9.2(4.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCue03220 | Title: * | Anyconnect MTU configured on ASA is not taking effect at client | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Anyconnect mtu config at the ASA will not take effect at the Anyconnect clients running 2.5.6005 (issue not seen in anyconnect 3.x). this could cause some users (who require lower anyconnect mtu setting) not to be able to connect.
Conditions: ASA 9.1.1
Workaround: 1.downgrade to 8.6 or 8.4 or lower 2. upgrade anyconnect client to 3.0.x or 3.1.x
Further Problem Description: If in case clients have been upgraded to AC 3.1 or later and we have only 2.5.x package present on ASA, then we will still face mtu issue where the configured value will never be assigned to the client. In order to resolve this we need to upload 3.1 AC package on ASA as well.
| |
Last Modified: | 20-APR-2016 | |
Known Affected Releases: | 9.1(1) | |
Known Fixed Releases: | 100.8(27.33), 100.8(50.21), 100.9(0.22), 100.9(4.1), 100.9(7.1), 100.9(8.1), 100.9(9.1), 9.0(2.100), 9.0(2.4), 9.0(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv79785 | Title: | Traceback at inspect http filter when URL filtering and SFR are enabled | |
Status: | Terminated | |
Severity: | 2 Severe | Description: * | Symptom: ASA reload in Thread Name: CP Processing
Conditions: All ASA platforms with 9.3 or greater code. Both Websense URL filtering and a service-policy sending traffic to SourceFire need to be enabled.
Workaround: Disable Websense URL filtering.
Further Problem Description: | |
Last Modified: | 21-APR-2016 | |
Known Affected Releases: | 100.13(0.81), 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz14875 | Title: | ASA RIP crashes when using address-family subconfiguration | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashes every time when configuring the address-family under the RIP process:
router rip address-family ipv4 !
Conditions: ASA running 9.6(1) code.
Workaround: Not use address-family type of configuration
Further Problem Description:
| |
Last Modified: | 22-APR-2016 | |
Known Affected Releases: | 9.6(1) | |
Known Fixed Releases: * | 96.2(0.2), 96.2(1.181), 96.2(11.10), 97.1(0.12), 97.1(1.21), 97.1(3.6), 97.1(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc98398 | Title: | ASA writes past end of file system then can't boot | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: After upgrading the ASA OS the device does not boot successfully, and will continually loop the unsuccessful boot sequence.
The following will be seen on the console of the ASA (The ASA and image file will vary):
----------------------------------------------------------------------------------- Evaluating BIOS Options ... Launch BIOS Extension to setup ROMMON
Cisco Systems ROMMON Version (1.0(12)13) #0: Thu Aug 28 15:55:27 PDT 2008
Platform ASA5505
Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately.
Launching BootLoader... Boot configuration file contains 1 entry.
Loading disk0:/asa844-9-k8.bin... Booting... Platform ASA5505
Loading... IO memory blocks requested from bigphys 32bit: 9672
## APPLIANCE REBOOTS AUTOMATICALLY HERE ## -----------------------------------------------------------------------------------
Conditions: Cisco ASA where the disk (Compact Flash) is already close to full or is fragmented from frequent use and a new version of the OS is saved on the disk (without removing any files) and the new file is made the boot file in the configuration.
Workaround: Delete the bad file from flash, as well as any other images that are no longer in use to free up more space on the flash. Then, re-download the new file to flash
- or -
1) Copy all the files off of the ASA's disk 2) Perform an erase disk command from ROMMON 3) Format the disk: 4) Copy the files back onto the disk, starting with the OS image you wish the ASA to boot.
The second procedure (involving the re-format) is the preferred workaround, as it places the ASA image towards the beginning of the filesystem, making the chances of encountering this problem much less.
Further Problem Description:
| |
Last Modified: | 23-APR-2016 | |
Known Affected Releases: | 100.7(6), 8.4(2.8), 8.4(4.1), 8.4(5), 8.4(6), 9.1(7.4) | |
Known Fixed Releases: | 100.7(13.111), 100.7(6.108), 100.8(27.63), 100.8(50.25), 100.9(0.27), 100.9(4.1), 100.9(7.1), 100.9(8.1), 100.9(9.1), 8.4(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw00971 | Title: | ASA truncates url-redirect at 160 chars for ra vpn clients (ISE 1.3+) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: --- URL redirect is not working for clients connected via ra vpn clients
The url redirect feature is used to support some ISE posture assessment flows
Conditions: --- ISE using the posture assessment feature ------ ISE 1.3 is more likely to require long url-redirect attributes --- ASA 9.2.1 and above (ISE posture assessment not supported on ASA versions <9.2.1) --- RA vpn client
Workaround: --- Use Anyconnect SSL VPN client
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(1), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.146), 100.13(0.98), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.79), 100.15(16.3), 100.15(17.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw41548 | Title: | DNS Traceback in channel_put() | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA reloads and generates a corefile
Conditions: Multiple simultaneous DNS queries with retries
Workaround: disable DNS
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.109), 100.14(0.77), 100.15(0.43), 100.15(17.18), 100.15(3.66), 100.15(8.16), 100.16(0.2), 100.16(1.5) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz34427 | Title: | standby device in failover : page fault crash in DATAPATH, | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptom: ASA crashed under thread name DATAPATH-0-2039
Conditions: ASA running in failover standby unit may crash under thread name : DATAPATH-0-2039
Workaround: none at this time
Further Problem Description: NA
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2.2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux46192 | Title: | ASA coredumped after enable,disable webvpn on interface | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may traceback/coredump after enabling/disabling webvpn interface with VPN session load.
Conditions: SSL VPN (WebVPN)
Workaround: none
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.111) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.104), 100.16(0.15), 100.16(1.72), 100.16(12.1), 100.16(14.1), 100.8(40.110), 9.1(6.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy11905 | Title: | ASA 5585 traceback when the User name is mentioned in the Access list | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When the user Identity is configured in the access list the ASA crashes
Below is the configuration made
object-group network CSM_INLINE_dst_rule_365072238634 description Generated by CS-Manager from dst of UnifiedFirewallRule# 13 (Local) network-object object CAERPDBP-N2 network-object object CAERPDBP-N1 access-list outside_access_in line 24 remark Permit - BI Team to ERP servers for management JK 1-24-15 access-list outside_access_in line 25 extended permit tcp user asm\jeff.kreinest any4 object-group
Conditions: Whenever the User Identity is configured the ASA crashes.
When total number of users created exceeds the maximum number of the system.
Workaround: NA
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 99.1(1.91) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.129), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.2(4.9), 9.3(3.171), 9.3(3.8), 9.4(2.101) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv92371 | Title: | ASA traceback: SSH Thread: many users logged in and dACLs being modified | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may reload when multiple users are logged into the ASA running show commands and the ACLs are being added/deleted
Conditions: This was observed under the following condition 1) there were multiple users logged into the ASA 2) One user was trying to run show running-config or show access-list 3) downloadable ACLs were being added and removed based on user logins in auth proxy
Workaround: If show access-list issued on one session don't issue "clear config access-list " from another session, let the "sh access-list" display all elements from that session
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(2), 9.1(6), 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.111), 100.14(0.78), 100.15(0.50), 100.15(17.21), 100.15(3.72), 100.15(8.17), 100.16(0.3), 100.16(1.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw51576 | Title: | SSH connections are not timed out on Standby ASA (stuck in rtcli) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ssh connections are stuck and not able to open a new ssh connection to the Stanby ASA
Conditions: ASA running software version 9.1.5.21
Workaround: Temporary workaround: reload the ASA
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(5.21) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.129), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.2(4.9), 9.3(3.171), 9.3(3.8), 9.4(2.101) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu73395 | Title: | Auth-prompt configured in one context appears in another context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Auth-prompt configured in one context appears in another context.
Conditions: ++ Device in multiple context. ++ More than one context. ++ More than on context with cut through proxy configured. ++ Only one context with custom auth-prompt.
Workaround: If auth-prompt is configured in all the contexts then there is no issue seen.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(4.24), 9.1(4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(1.51), 100.15(15.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur07369 | Title: | SXP Version Mismatch Between ASA & N7K with clustering | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: SXP connection cannot be established when ASA cluster is interacting with a SXP peer running SXP version 1 protocol.
Conditions: (1) ASA is running cluster with 2 or more units and (2) SXP peer is running SXP version 1 protocol and (3) SXP peer hash the SXPv1 request from the SXP peer to reach the slave unit of the ASA instead of the master unit.
Workaround: - Upgrade SXP peer to run SXP version 2 or above, or - Change the IP address used for establishing SXP connection so that the hash algorithm may direct the SXPv1 request from the SXP peer to the master unit of the ASA cluster instead of the slave unit.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.143), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.3), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw33860 | Title: | RA-VPN transactions are shown as 0 in PRSM Dashboard | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: PRSM Dashboard does not populate data for VPN transactions in both 'User devices' section and 'Traffic by location' with ASA 932 and above. Events generated for vpn traffic also shows 'remote device' field set to 'No' This issue is not seen with ASA verison 912 and 915(21)
Conditions: Using ASA 932 and above, VPN transactions will not in seen in the dashboard of PRSM ASA 9.3.2 ASA-Cx: 9.3.4.1 (11)
Workaround: Issue will not be seen in ASA version 912 and 915(21)
Further Problem Description: -
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.77), 100.15(20.14), 100.15(8.24), 100.16(0.8), 100.16(1.27), 100.16(14.1), 9.3(3.171) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus08239 | Title: | ASDM upload causes traceback, OCTEON_CRYPTO: SG buffers exceeds limit | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashes on thread name DATAPATH-0-1570
Conditions: Cisco ASA running release in 9.4.1, 9.4.1.1 and 9.5.1. Uploading ASA image file.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.12(0.106), 9.4(1), 9.4(1.3), 9.5(1) | |
Known Fixed Releases: * | 100.12(0.138), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.54), 100.15(15.15), 100.15(16.1), 100.15(2.85) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv88785 | Title: | RA validation failed when CA/subCA contains name constraints | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension ASA fails with the error:
CRYPTO_PKI: Found a subject match - inserting the following cert record into certList CERT-C: I pkixpath.c(2728) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received CRYPTO_PKI: Unable to read CA/RA certificates.Error processing auth response. Unable to send PKI request CRYPTO_PKI: transaction PKCSReq completed CRYPTO_PKI: status: Crypto CA thread sleeps!
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1), 9.4(1.100), 9.4(1.201) | |
Known Fixed Releases: * | 100.13(0.100), 100.14(0.74), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv51649 | Title: | SSL : Unable to Join nodes in Cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA slave is unable to join cluster and fails with the error "cluster_ccp_make_rpc_call failed to clnt_call. msg is CCP_MSG_REGISTER". Debugs with "debug ssl 255" show the error message -
error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460
Conditions: Attempting to join the cluster on ASA slave using "enable" command fails with an rpc error message
Workaround: Remove the RC4 cipher using either of the following commands -
ssl cipher default custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA" ssl cipher tlsv1 custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA" ssl cipher dtlsv1 custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA"
OR use the older version of the same command -
ssl encryption dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1
Then, attempt to join the cluster again
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.15(3.19) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.33), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux09181 | Title: | http-form authentication fails after 9.3.2 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Authentcatiing to a http-form aaa-server stops working after an upgrade to 9.3.2 or later.
Conditions: Using an aaa-server configured for http-form authentication to authenticate a user.
Workaround: Downgrade to 9.2.4.x build if possible
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 9.3(3.171), 9.3(3.8), 9.4(2.5), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv20449 | Title: | Traceback in Thread Name: ssh when using capture or continuous ping | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA Traceback in Thread Name: ssh
Conditions: The crash happens when a rare condition is hit when two things are happening simultaneously. They are:
1. An interruptible command is in progress in a SSH session. Examples are ping, traceroute, real-time captures etc. 2. ASA and SSH Client are in process of rekeying the SSH connection. This rekey would normally take place approximately after every 60 minute period in an SSH session.
Workaround: Avoid running interruptible commands in a SSH session which has been active for over 50 minutes.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6), 9.1(6.1), 9.1(6.4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.127), 100.15(0.112), 100.8(40.113), 9.1(7.5), 9.2(4.6), 9.3(3.171), 9.3(3.8), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv87760 | Title: | Unicorn proxy thread traceback with RAMFS processing | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback in Unicorn Proxy Thread while using WebVPN.
Conditions: Cisco ASA running release 9.3.3.223 with WebVPN enabled.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(4), 9.3(3), 9.3(3.223), 9.4(1.112), 9.4(1.5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.14(5.34), 100.15(0.32), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux00686 | Title: | Evaluate CVE-2015-6360 for libsrtp Denial of Service (DoS) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco released version 1.5.3 of the Secure Real-Time Transport Protocol (SRTP) library (libSRTP), which addresses a denial of service (DoS) vulnerability. Multiple Cisco products incorporate a vulnerable version of the libSRTP library.
The vulnerability is in the encryption processing subsystem of libSRTP and could allow an unauthenticated, remote attacker to trigger a DoS condition. The vulnerability is due to improper input validation of certain fields of SRTP packets. An attacker could exploit this vulnerability by sending a crafted SRTP packet designed to trigger the issue to an affected device.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-libsrtp
Conditions: The Cisco ASA has to be configured with the Phone Proxy feature to be vulnerable. The configuration key word to look for is ''phone-proxy''. This vulnerability can result in a system level restart of the device.
The Cisco ASA Phone Proxy feature has been deprecated as of release version 9.4.1 released in March 2015.
Workaround: None.
Further Problem Description: Please refer to the following Cisco ASA document on the phone proxy feature for additional configuration specifics:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/unified_comm_phoneproxy.pdf
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.8/6.4: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-6360 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.1(0.104) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.14), 100.16(1.70), 100.16(14.1), 100.7(6.149), 100.8(40.109), 8.4(7.31) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux43345 | Title: | Allow a larger (4GB) coredump filesystem to be configured on ASA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The coredump file system maximum may be insufficient to accommodate a coredump that gets generated (currently 1500 MB max on 5585-XX platforms). Need to allow configuration up to 4GB (4000 MB) for ASA platforms that can support it.
Conditions: An ASA with a long duration uptime that has had a lot of activity/load may grow the size of the core file ,that would get generated in the event of a traceback, beyond current coredump file systems limits (1500 MB).
Workaround: None.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.111) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.74), 100.16(12.2), 100.16(14.1), 100.8(40.110), 9.1(6.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv70932 | Title: | FO: ASAv traceback while syncing during upgrade from 9.4.1 to 9.5.1 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: FO: ASAv crashed while syncing during upgrade from 9.4.1 to 9.5.1
Conditions: Upgrade from 9.4.1 to 9.5.1 with huge customer configuration.
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux05081 | Title: | RSA 4096 key generation causes failover | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: After applying command crypto key generate rsa modulus 4096 causes ASA failover ASA will not generate key 4096
Conditions: Restrictive polltime (non defailut is configured) as per example failover polltime unit msec 200 holdtime msec 800 failover polltime interface msec 750 holdtime 5
ASA runs software 9.4 or 9.5
Workaround: Generate key modulus 2048 or downgrade to 9.3 train
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4, 9.5 | |
Known Fixed Releases: * | 100.13(0.121), 100.14(0.84), 100.15(0.92), 100.15(20.20), 100.16(0.10), 100.16(1.40), 100.16(14.1), 100.16(15.5), 9.4(2.5), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv87150 | Title: | ASA traceback in Thread Name: fover_parse (ak47/ramfs) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA 5525 running version 9.5(1) crashing in Thread Name: fover_parse (ramfs)
Conditions: ASA is in failover pair.
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.5), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.14(5.34), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus16416 | Title: | Share licenses are not activated on failover pair after power cycle | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The Share/Combine licenses are not activated on failover pair after power cycle the failover pair. Both active and standby units turns off power and boots up the standby unit only, the Shared/Combined licenses on standby unit will be lost.
Conditions: Failover environments.
Workaround: Execute once the 'reload command' on failover pair.
Further Problem Description: None
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0, 9.1(5.19) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.89), 100.15(20.17), 100.16(0.9), 100.16(14.1), 100.16(15.1), 100.16(15.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux33808 | Title: | ASA ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16] | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may reboot when FIPS is enabled with different errors displayed on console: "ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16]", ERROR: FIPS Self-Test failure, fips_continuous_rng_test [-1:12:0:2:19]
Conditions: ASA may reboot when FIPS is enabled with different errors displayed on console: "ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16]", ERROR: FIPS Self-Test failure, fips_continuous_rng_test [-1:12:0:2:19]
Workaround: Reload ASA or must disable fips mode, 'no fips enable".
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.13(0.126), 100.15(0.111), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.58), 96.2(1.109) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu82229 | Title: | ikev2 with DH 19 and above fails to pass traffic after phase2 rekey | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: after rekey fails to pass traffic
Conditions: after rekey using DH 19 or above
Workaround: use lower DH (1,2,5,14)
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4, 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.113), 100.14(0.79), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9), 9.4(2.1), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut40770 | Title: | Interface TLV to SFR is corrupt when frame is longer than 2048 bytes | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Some configured ASA interfaces missing or not displayed from Firesight Management Center
Conditions: Interface TLV ethernet frame greater than 2048 bytes. Usually occurs with multiple interfaces and sub-interfaces configured with lengthy names for each interface.
Workaround: Enable jumbo-frame reservation on ASA.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(1.221), 9.4(2) | |
Known Fixed Releases: * | 100.11(0.64), 100.11(0.67), 100.12(0.153), 100.12(0.156), 100.13(0.119), 100.13(0.127), 100.14(0.82), 100.15(0.112), 100.15(0.80), 100.15(20.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw16607 | Title: | ASA EIGRP does not send poison reverse for neighbors to remove route | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When redistributing a static route from the ASA and then learning a better route for the same route., redistributing ASA is not sending poison reverse towards neighbors. Causing neighbors to have stale topology entries on the EIGRP topology table, this sometimes causes routing to not take the correct path,
Conditions: Example: R1 ----{BGP }--- R2---{EIGRP}----ASA-----R3
R1 is advertising a defualt route via BGP to R2.
R2 is redistributing the default route from BGP into EIGRP
ASA has a floating AD 180 default route that is redistributing into EIGRP towards R2.
When BGP goes out the ASA's route is advertised to the network, but when BGP route is learned again, ASA removes the floating static from routing table thus not advertising anymore the static towards R2. The problem is that R2 still holds the topology entry for the floating static because ASA is never sending the poison reverse message marking the route with infinite metric so that R2 removes it from the topology table.
This sometimes causes the BGP route to take over until the redistribution from the ASA is removed and reapplied.
This can also be seen if the floating static route is deleted from the ASA, R1 still keeps the topology entry for that route even though it does not exist on the ASA anymore.
This happens in 9.1.6 8.4.7 and 8.2.5
Workaround: Remove redistribution from ASA and add it again.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.0, 9.1(1.3) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.152), 100.13(0.117), 100.14(0.80), 100.15(0.64), 100.15(17.28), 100.15(19.3), 100.15(20.8), 100.15(8.21), 100.16(0.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw66397 | Title: | DHCP Server Process stuck if dhcpd auto_config already enabled from CLI | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: DHCPD process stuck. The output of show dhcpd statistics shows no increase in the Received packets even though the captures show that the packets are being received on that interface.
Conditions: DCHPD auto_config already enabled on an interface and then DHCP server is enabled on that interface
Workaround: First remove the command "dhcpd auto_config" from the interface Second remove and reapply or sometimes just reapply the "dhcpd enable" command for the same interface.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6), 9.4(2), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.152), 100.13(0.117), 100.14(0.81), 100.15(0.67), 100.15(17.30), 100.15(20.10), 100.15(8.22), 100.16(0.5), 100.16(1.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv32615 | Title: | ASA: LDAP over SSL Authentication failure | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: LDAP over SSL authentication fails with the below LDAP debugs. Session Start New request Session, context 0x00007fffddc694c0, reqType = Authentication Fiber started Creating LDAP context with uri=ldaps://10.1.1.219:636 Connect to LDAP server: ldaps://10.1.1.219:636, status = Failed Unable to read rootDSE. Can't contact LDAP server. Fiber exit Tx=0 bytes Rx=0 bytes, status=-2 Session End
Can see the below errors increasing under "show asp drop" ssl-record-decrypt-error np-socket-close
The "show count" output will show an increase in count SSL error. ASA5500-21# sho count | in SSL SSLERR DECRYPT_FAIL_OR_BAD_RECORD_MAC 1 Summary
Conditions: LDAP over SSL used for client authentication on ASA running version 9.3(2)1 and above and TLSv1.2 is used.
Workaround: Downgrade to 9.3(2)
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2.1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.146), 100.13(0.102), 100.14(0.75), 100.14(16.8), 100.14(5.32), 100.15(0.28), 100.15(1.92), 100.15(16.5), 100.15(17.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw44744 | Title: | Traceback in WebVPN rewriter | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback while processing WebVPN connections in the rewriter
Conditions: ASA 5585 running special release 9.3.3.225.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.12(0.151), 100.13(0.114), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4), 100.16(1.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw36853 | Title: | ASA: ICMP error loop on cluster CCL with Interface PAT | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Elevated CPU may be observed on 2 or more units of an ASA cluster. Packet captures on the cluster control link will show ICMP error packets looping continuously between the units displaying high CPU conditions.
Conditions: 1. ASA in Layer-2 cluster mode. 2. PAT configured. 3. ICMP error packet is received on a unit where that unit is the directory for embedded payload flow. 4. Embedded payload of the ICMP error packet matches an existing xlate entry but doesn't match any connections. The owner of the PAT address of the xlate is a different unit than the one where the packet is received.
Workaround: With Interface PAT, workaround is to deny ICMP on the ASA's interface using the 'icmp' command. With a PAT pool, workaround is to deny ICMP error packets on the interface ACL.
Or just add xlate per-session configuration.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.3), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.114), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux16427 | Title: | PBR incorrect route selection for deny clause | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: PBR deny clause is not getting installed, since we get a warning.
WARNING: Route-map Fed_PBR with sequence number 10 does not have any set actions defined. Not installing PBR datapath rules for this route-map entry
Conditions: Hardware : ASA5545 Software : 9.4.2
Route map deny clause, not installed due to warning.
ciscoasa# show run route-map ! route-map Fed_PBR deny 10 match ip address Fed_PBR >>>>> Match condition for the access-list entries which do not need to be PBR'd
! route-map Fed_PBR permit 20 set ip next-hop 192.168.10.2
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 100.13(0.121), 100.14(0.85), 100.15(0.99), 100.16(0.12), 100.16(1.53), 100.16(14.1), 100.16(15.7), 9.4(2.5), 9.4(2.99), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv79552 | Title: | Standby traceback during config replication with customization export | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Standby ASA crashes while exporting webvpn customization and replicating configuration from active device simulatenously
Conditions: This only occurs in the following sequence of events: 1. On the standby ASA, execute "export webvpn customization dfltCustomization stdout" from the CLI (for any customization) but do not let the command finish, i.e. leave it waiting at the --more-- prompt. 2. Execute "write standby" on active device 3. While configuration is getting replicated, on standby cli,hit any key to continue the "export" command - this will cause the standby ASA to crash
Workaround: Do not execute any command on standby CLI until the configuration is fully replicated
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(7.15), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.14(16.8), 100.14(5.32), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw14334 | Title: | Trace back with Thread Name: IP Address Assign | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback Thread Name: IP Address Assign and assertion "mh->mh_mem_pool > MEMPOOL_UNDEFINED && mh->mh_mem_pool < MEMPOOL_MAX_TYPE" failed: file "slib_malloc.c"
Conditions: IPv6 addresses assigned via username attributes or via external AAA server.
Workaround: Use IPv6 address pools instead of username attributes or external AAA server.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.2), 9.4(2) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.69), 100.15(17.31), 100.15(20.11), 100.15(8.22), 100.16(0.6), 100.16(1.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux20913 | Title: | Clustering NAT: ASA crash during NAT configuration | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashes when a NAT64 rule is dynamically modified to NAT66 by converting v4 mapped object to a v4 mapped object.
Conditions: Dynamic NAT modifications across IP versions (NAT64 <-> NAT66, NAT64 <-> NAT44, etc)
Workaround: Remove NAT64 configuration and add NAT66 afresh.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.8(40.106) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.85), 100.15(0.97), 100.16(0.12), 100.16(1.53), 100.16(14.1), 100.16(15.7), 100.8(40.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv43902 | Title: | ASA: Watchdog Traceback with Thread Name:- SXP CORE | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device traceback in thread name:- SXP CORE
Conditions: ASA device configured with the trust sec configuration.
Workaround: No workaround as of now
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: * | 100.12(0.138), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.53), 100.15(15.14), 100.15(16.1), 100.15(2.83) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy13937 | Title: | ASA Watchdog traceback in CP Processing thread during TLS processing | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may crash and generate a traceback during TLS processing when TLS proxy is invoked in ASA versions 9.4(2)5 and 9.5(2) and later.
Conditions: 1. ASA must be acting as a TLS proxy between two endpoints 2. Observed on ASA versions 9.4(2)5 and 9.5(2) and later releases in those trains
Workaround: Downgrade to an earlier version or disable the TLS proxy feature
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2.5), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.129), 100.13(0.130), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.2(4.9), 9.3(3.171), 9.3(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux61257 | Title: | ASA: Traceback in Thread IP Address Assign | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback in Thread IP Address Assign after upgrade on the ASA unit
Conditions: IPAA syslogging enabled
Workaround: Disable IPAA syslogging (737001 - 737036) on the ASA unit
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(4.210) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.123), 100.15(0.109), 100.16(0.19), 100.8(40.113), 9.0(4.211), 9.1(6.117), 9.1(7), 9.2(4.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv27197 | Title: | ASA SSLVPN RDP Plugin session freezes under heavy load with activex | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: RDP session freezes when a video is played over the session.
Conditions: 9.4.1 Plugins tested: RDP1 2014 RDP2 2009 win7
process intensive applications in the RDP session like a High definition video either played locally on the RDP machine or via youtube
Problem can be reproduced rather more consistently with Activex
We have also observed TCP window size filling up and TCP ZeroWindow in the packet capture that was taken between the RDP server and ASA
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.99), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.81), 100.15(16.3), 100.15(17.1), 100.15(3.49), 100.15(6.31) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux87457 | Title: | ASA traceback in Thread Name: https_proxy | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA failover pair crashing in Thread Name: https_proxy
Conditions: Crashes were observed after upgrading ASA failover pair to 9.4.2 from 9.1.3. Cut through proxy authentication of HTTP connections is enabled.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.111), 100.8(40.113), 9.1(7.5), 9.2(4.6), 9.3(3.171), 9.3(3.8), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux56111 | Title: | "no ipv6-vpn-addr-assign" CLI not working | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When AnyConnect clients connect, they always request both IPv4 and IPv6 addresses even if IPv6 is not configured. A session will fail if the IPAA subsystem doesn't return a response to the request, even though there's no need for the request in the first place if IPv6 is not configured.
Conditions: Failure can occur even when "no ipv6-vpn-addr-assign " are set.
Workaround: none
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.109), 100.16(0.19), 100.8(40.111), 9.0(4.210), 9.1(6.113), 9.1(7), 9.2(4.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux21955 | Title: | ASA: FAILOVER not working with password encryption. | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Failover not coming up after encryption key is changed.
Conditions: Configure failover,verify its operational and then save it, then configure password encryption. Reload the boxes, notice that the failover will come up properly. Change the encryption key and notice that the failover key will become encrypted on both appliances, failover will still be operational. Save the config, reload the ASAs and notice that failover will not come up after a reload.
Workaround: None
Further Problem Description: The problem is due to the encryption keys being written at one location and being read from other location.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.128), 100.15(0.112), 9.3(3.171), 9.3(3.8), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.63) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux20178 | Title: | OSPF neighbor goes down after "reload in xx" commnad in 9.2 and later | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When "reload in xx" command is executed on ASA5500-X 9.2(4) or later, ASA5500-X comes to ignore hello packets from OSPF neighbor. As a result, OSPF neighbor goes down.
Conditions: OSPF configured on ASA running 9.2(4) / 9.3(3) / 9.4(2) /9.5(1).
Workaround: Use 9.1 or reboot an asa.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(4), 9.3(3), 9.4(2), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.85), 100.15(0.100), 100.16(0.12), 100.16(1.70), 100.16(14.1), 9.2(4.6), 9.3(3.171) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux42936 | Title: | ASA 9.5.1 traceback in Threadname Datapath due to SIP Inspection | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashes in the Datapath Thread Crash Info shows Lock (sip_sess_lock) is held for a long time
Conditions: ASA running version 9.5.1 SIP Inspect enabled
Workaround: Disable SIP Inspect
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.13(0.123), 100.15(0.107), 100.16(0.18), 100.16(1.97), 100.16(14.1), 9.4(2.5), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.56) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv96011 | Title: | OSPF over IKEv2 L2L tunnel is broken on ASA with 9.2.1 onwards | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: OSPF over IKEv2 L2L tunnel is broken on ASA in 9.2(1) onwards. Routes are installed into OSPF database successfully, but they are absent in the main routing table.
Conditions: -IKEv2 L2L configured to propagate routes over OSPF on ASA running 9.2.1 or above.
Workaround: -Downgrade the ASA to 9.1(5), if an option. -Use IKEv1 tunnel
Further Problem Description: None
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(1), 9.3(3), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu61573 | Title: | 9.5.2 Gold Setup - Traceback in DATAPATH-6-2596 snp_fp_get_frag_chain | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback on slave unit in cluster after running large amounts of fragmented traffic through the device.
Conditions: Cisco ASA running release 9.1.6 in a 4-node cluster configure for L2 mode.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.13(0.31), 100.15(1.11), 9.0(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw28735 | Title: | Cisco ASA Software Version Information Disclosure Vulnerability | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: A vulnerability in the SSL VPN code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to obtain information about the Cisco ASA Software version. This information could be used for reconnaisance attacks.
The vulnerability is due to a verbose output returned when a specific URL is submitted to the affected system. An attacker could exploit this vulnerability by browsing a specific URL. SSL VPN feature needs to be enabled for a system to be vulnerable.
Conditions: SSL VPN needs to be configued on the system.
Workaround: None
Further Information:
Credit: Cisco would like to thank Sergey Ozernikov from Lateral Security (IT) Services Ltd. for reporting this vulnerability.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2014-3398 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(3), 9.1(6), 9.3(2.2) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.109), 100.14(0.77), 100.15(0.112), 100.8(40.102), 9.1(6.100), 9.1(7), 9.2(4.3), 9.3(3.171) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux27903 | Title: | BOSC Runtime Buffer overflow error detected while executing OSPFV3 Tests | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco ASA crashes with BOSC Runtime Buffer overflow error
Conditions: OSPFv3 configured and crafted packets are sent to the ospf interface
Workaround: None
Further Problem Description: System Affected
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.16(0.7) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.127), 100.15(0.112), 100.8(40.113), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.62), 96.2(1.111) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtg74172 | Title: | Can get around dynamic-filter by using caps in domain name | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco ASA BTF feature should not be case sensitive. User can get around BTF feature with using CAP letters in domain names.
Conditions: Configuring whilte and black lists for BTF
Workaround:
Not known
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2(2.12) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.14(16.8), 100.14(5.32), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux43978 | Title: | DHCP Relay fails for cluster ASAs with long interface names | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: DHCP relay is enabled in a cluster environment. Some interfaces that are configured as relay work properly and some do not work as a relay.
Conditions: When the interface name on the ASA exceeds 24 characters, the issue is seen on that interface.
Workaround: The user can configure an interface with less than 24 characters.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.13(0.121), 100.15(0.104), 100.16(0.14), 100.16(1.70), 100.16(14.1), 9.4(2.5), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv45756 | Title: | ASA may tracebeck when displaying packet capture with trace option | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback.
Conditions: ASA running 9.4(1) displaying captures with trace detail option.
Workaround: Avoid using trace detail option in captures.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.140), 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy03024 | Title: | ASA traceback and reload citing Thread Name: idfw_proc | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom:An ASA may crash and reload unexpectedly.
Conditions:This crash occurs in following two scenarios: 1. When there is an FQDN object in configuration and users tries executes either "show running-config" or modifies acccess-list config while FQDN object is getting resolved. 2. When user tries to access or modify access-list config, while it is being modified from another session either from telnet/ssh/csm/asdm.
Both the above will lead to this crash as both the operations will result in dlist corruption. Workaround:For first, the crash requires usage of FQDN ACL entries, changing from FQDN to standard IP may help avoid this crash in case for FQDN. For second, avoid accessing and/or modifying access-list from multiple places at same time.
More Info:Very similar issue was fixed under Cisco Bug CSCuq76847. This bugs covers this similar issue but in code versions after the fix for CSCuq76847
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.130), 100.15(0.112), 100.8(40.114), 9.1(7.3), 9.2(4.7), 9.3(3.171), 9.3(3.8), 9.4(2.101) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux93751 | Title: | Cisco ASA Linux Kernel Vulnerability - CVE-2016-0728 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2016-0728
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 7.2:
http://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=AV:L/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2016-0728 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 1.1(2), 1.1(3), 1.1(4), 2.0(1), 6.0, 9.3(2), 9.3(3), 9.4(1), 9.5(2), 9.6(2) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.127), 100.15(0.112), 9.3(3.171), 9.3(3.8), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.63) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw24664 | Title: | ASA:Traceback in Thread Name:- netfs_thread_init | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in netfs_thread_init
Conditions: ASA device configured with SSL webvpnconfiguration
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.113), 100.13(32.1), 100.14(0.79), 100.14(5.34), 100.15(0.53), 100.15(17.23), 100.15(3.76), 100.15(8.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux70784 | Title: | ASA Crash while viewing large ACL | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA may crash and reload when viewing an ACL that has a lot of remarks in the configuration. In testing, this appears to happen when running a command such as 'show access-list'
Conditions: This has been seen with a configuration with over 65k remarks present in the configuration.
Workaround: Do not use many remarks or clean up the existing remark to avoid significant numbers of remarks.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.52) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw15615 | Title: | Backup unknown with dynamic pat pool | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: PAT Pool IP's Backup shows up as unknown
Conditions: Two node cluster is brought up with dynamic pat pool configs and transactional commit for NAT is enabled
Workaround: Disable transactional commit for NAT
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.15(1.86), 9.4(1.100) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.152), 100.13(0.117), 100.14(0.81), 100.15(0.67), 100.15(17.30), 100.15(20.10), 100.15(8.22), 100.16(0.5), 100.16(1.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur46371 | Title: | TLSv1.2 Client Cert Auth Connection Establishment Failure | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Connection establishment failure only for TLS 1.2 using ECDSA in client mode, so ASA connecting out to an SSL server with certificate authentication configured.
Conditions: ASA connecting out to an SSL server with certificate authentication configured.
Workaround: Do not configure certificate authentication on the SSL web server.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.13(15.11), 9.3(2) | |
Known Fixed Releases: * | 100.13(0.112), 100.14(0.78), 100.15(0.53), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9), 9.4(2.5), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus10787 | Title: | Transactional ACL commit will bypass security policy during compilation | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traffic can bypass the security policy when transactional-commit access list is configured. This can happen only when a new ASA is added to a cluster and the access-list configuration is newly applied. The bypass can happen only during the compilation time. Additionally interface security policy will still be respected so no traffic will be passed from an interface with lower security level to an interface with higher security level.
Conditions: Cisco ASA Software is affected by this issue if the transactional-commit access list feature is enabled. This can be determined by using the show running-config asp rule-engine transactional-commit access-group command and verifying that it returns output. The following example shows a Cisco ASA configured with transactional-commit feature:
ciscoasa# show running-config asp rule-engine transactional-commit access-grou$ asp rule-engine transactional-commit access-group
Note: Transactional-commit feature is not configured by default.
Workaround: There is no workaround other then disabling the feature
Further Problem Description: A vulnerability in the transactional-commit access list feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass interfaces access control policies and send traffic through the affected system.
The vulnerability is due to improper implementation of the feature. . An attacker could exploit this vulnerability by sending traffic through the affected system while the system boot for the first time or while an affected system join a cluster. Additionally interface security policy will still be respected so no traffic will be passed from an interface with lower security level to an interface with higher security level. An exploit could allow the attacker to send traffic through the system bypassing the interfaces access control policies.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.111), 9.1(6.104), 9.1(6.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy71775 | Title: | Coverity 114010: USE_AFTER_FREE in rt_walksubtree_ap | |
Status: | Open | |
Severity: | 3 Moderate | Description: * | Symptom: Fails Static Analysis - Created by Coverity Static Analysis
Conditions: N/A
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 04-APR-2016 | |
Known Affected Releases: | 96.2(1.147), 97.1(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz14891 | Title: | secondary authentication missing with keywords "RDP" in group-url | |
Status: | Other | |
Severity: | 3 Moderate | Description: * | Symptom: SA group problems (group URL) w/ secondary auth credential
Conditions: when "RDP" is part of the group-url the secondary authentication field will not show up. This is seen in all versions of code between 8.4.2(6) and 9.5.1
Workaround: Upgrade to 9.5.1 or 9.5.2
Further Problem Description:
| |
Last Modified: | 12-APR-2016 | |
Known Affected Releases: | 8.4(6.250), 8.5(1.243), 9.4(3) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy62198 | Title: | If FQDN is more than 64 chars then we redirect to ip instead of FQDN | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When clicking the Start Anyconnect link, you get a certificate warning.
Conditions: This happens when connecting to an ASA with a FQDN longer than 64 characters. The reason for the certificate warning is that the ASA responds with a redirect to ip instead of to FQDN causing the certificate name to not match.
Workaround: Shorten the ASA FQDN to less then 64 characters
Further Problem Description:
| |
Last Modified: | 19-APR-2016 | |
Known Affected Releases: | 9.4(1.203) | |
Known Fixed Releases: * | 100.11(0.71), 100.12(0.158), 100.13(0.137), 100.15(0.114), 100.8(40.117), 9.4(2.109), 96.1(1.88), 96.2(1.171), 96.2(11.4), 97.1(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu93339 | Title: | Cisco ASA Poodle TLS Variant | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: * | Symptom: Cisco ASA models 5506-X 5508-X and 5516-X include a version of SDK which is vulnerable to a variant of POODLE TLS where the first byte of the padding is not checked.
Additional information about this issue can be found at: https://vivaldi.net/en-US/userblogs/entry/there-are-more-poodles-in-the-forest
Conditions: The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only. Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...
Workaround: There are no workaround for this issue other then disabling the affected feature.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C&version=2.0 CVE-2015-4595 has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 19-APR-2016 | |
Known Affected Releases: | 9.3(3.2), 9.4(1.3) | |
Known Fixed Releases: | 100.12(0.130), 100.13(0.81), 100.13(29.28), 100.14(0.48), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy81417 | Title: | Coverity 114307: RESOURCE_LEAK in sl_ipc_send_res_disable_msg | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fails Static Analysis - Created by Coverity Static Analysis
Conditions: N/A
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 21-APR-2016 | |
Known Affected Releases: | 97.1(1.5) | |
Known Fixed Releases: * | 96.2(1.178), 96.2(11.9), 97.1(0.11), 97.1(1.18), 97.1(3.5), 97.1(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy72257 | Title: | Coverity 114177: CHECKED_RETURN in oct_dbg_write_csr | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fails Static Analysis - Created by Coverity Static Analysis
Conditions: N/A
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 22-APR-2016 | |
Known Affected Releases: | 96.2(1.147), 97.1(1.6) | |
Known Fixed Releases: * | 96.2(0.5), 96.2(11.11), 97.1(0.12), 97.1(1.23), 97.1(3.6), 97.1(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui55978 | Title: | ASA 8.2.5 snmpEngineTime displays incorrect values | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA snmpEngineTime rolls over too early, it should not roll over for 68 years.
Conditions: ASA 5505, 5510, 5520, 5540, 5550 that has an uptime over 49.7 days.
Workaround: none
Further Problem Description: none
| |
Last Modified: | 22-APR-2016 | |
Known Affected Releases: * | 8.2(2), 8.2(5), 9.1(1.1), 9.1(2) | |
Known Fixed Releases: | 100.10(0.13), 100.10(1.21), 100.10(2.1), 100.10(9.1), 100.7(6.122), 100.8(27.89), 100.8(38.31), 100.8(40.21), 100.8(41.2), 100.8(45.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur74745 | Title: * | SSH PKF authentication failure still allows password authentication | |
Status: * | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom: SSH PKF authentication failure still allows password authentication
Conditions: SSH configured with PKF configuration
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(2.8) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux85725 | Title: | ASA WebVPN: Java RDP Plugin does not launch | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom:Once logged in to the ASA's clientless WebVPN portal, clicking on an RDP bookmark [or URL] opens the Java RDP Plugin Page, with a note saying: Launching properJavaRDP session... Connecting to:
However, the connection never succeeds.
Conditions:ASA running release 9.1.6.7 or later
Note: tested with JRE ver 1.8 u65
Workaround:No workaround for Java
Using ActiveX based RDP [IE only] works.
More Info:For customers who deploy * Clientless plug-ins (e.g. RDP, Telnet/SSH, VNC, Citrix) * Utilize Clientless VPN to access web pages that host Java applets their users may experience similar behaviors with different error messages.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2), 96.1(1.45) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.128), 100.15(0.112), 100.8(40.114), 9.1(7.4), 9.2(4.6), 9.3(3.171), 9.3(3.8), 9.4(2.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui20213 | Title: | 5585 interface counters show 0 for working interfaces and console errors | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The output of 'show interface' could show counters that have not incremented and are all stuck at 0, even though the interface is actively passing traffic (the input and output packet rates are non-zero).
Example:
Interface GigabitEthernet0/0 "outside", is up, line protocol is up Hardware is bcm56801 rev 01, BW 1000 Mbps, DLY 10 usec Full-Duplex(Full-duplex), 1000 Mbps(1000 Mbps) Input flow control is unsupported, output flow control is off MAC address xxxx.xxxx.xxxx, MTU 1500 IP address 10.0.0.2, subnet mask 255.255.255.224 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort 0 pause/resume input 0 L2 decode drops 0 switch ingress policy drops 0 packets output, 0 bytes, 0 underruns 0 pause/resume output 0 output errors, 0 collisions, 0 interface resets 0 late collisions, 0 deferred 0 rate limit drops 0 switch egress policy drops 0 input reset drops, 0 output reset drops Traffic Statistics for "outside": 7535042 packets input, 8722096534 bytes 8312179 packets output, 5806296169C3SR-Preview for 5806296169 bytes 6413 packets dropped 1 minute input rate 12208 pkts/sec, 14102277 bytes/sec 1 minute output rate 13488 pkts/sec, 9085510 bytes/sec 1 minute drop rate, 6 pkts/sec 5 minute input rate 12883 pkts/sec, 15164633 bytes/sec 5 minute output rate 13085 pkts/sec, 8124951 bytes/sec 5 minute drop rate, 8 pkts/sec Control Point Interface States: Interface number is 6 Interface config status is active Interface state is active
Additionally, the following messages might be seen on the console of the ASA: 8841: Message #1162 : bcm_esw_clear_stats: bcm_stat_sync failed for unit 0, error -12 8842: Message #1163 : bcm_esw_clear_stats: bcm_stat_sync failed for unit 0, error -12 8843: Message #1164 : bcm_esw_clear_stats: bcm_stat_sync failed for unit 0, error -12 8844: Message #1165 : bcm_esw_clear_stats: bcm_stat_sync failed for unit 0, error -12 8845: Message #1166 : bcm_esw_clear_stats: bcm_stat_sync failed for unit 0, error -12
Conditions: Only the ASA 5585 platforms are affected by this problem.
The 'bcmCNTR.0' process will not be present in the output of 'show process'.
Example: Note the bcmCNTR.0 is not listed in the output below:
ciscoasa/pri/stby# show proc | inc bcm Mwe 0x0000000001d94c98 0x00007ffaa8510748 0x00007ffad2bf43d0 0 0x00007ffaa8508960 32224/32768 bcmXGS3AsyncTX Mwe 0x0000000001d94c98 0x00007ffaa93e6b08 0x00007ffad2bec100 0 0x00007ffaa93ded00 32256/32768 bcmTX Msi 0x00000000021e6b25 0x00007ffaa9523e98 0x0000000005bad7d0 523950 0x00007ffaa951c000 30136/32768 bcmPOLL Mwe 0x0000000001d94cde 0x00007ffad8badaf8 0x00007ffad2beb650 8688473 0x00007ffad8ba5d20 28568/32768 bcmLINK.0 Mwe 0x0000000001d94c98 0x00007ffaa7a62aa8 0x00007ffaa7a5ac10 0 0x00007ffaa7a5ac80 32288/32768 bcmDPC Mwe 0x0000000001d94cde 0x00007ffaa94b43e8 0x00007ffad2beb6c0 4251733 0x00007ffaa94ac600 29416/32768 bcmCNTR.0 Mwe 0x0000000001d5cdaa 0x00007ffaa7a5a7f8 0x00007ffaa7a27fb8 0 0x00007ffaa7a52980 32368/32768 bcm_esw_surprise_reset.0 Msi 0x0000000001d65998 0x00007ffad8bb5bf8 0x0000000005bad7d0 211236 0x00007ffad8badd70 30008/32768 bcm_esw_poll Mwe 0x0000000001d63468 0x00007ffad8bbdc08 0x0000000005b11590 4 0x00007ffad8bb5dc0 29496/32768 bcm_esw_ioctl_task_handler ciscoasa/pri/stby#
Workaround: Rebooting the ASA should restore the interface statistic information.
Further Problem De | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.8(53.2), 100.9(7.27), 8.4(7), 9.1(4) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.80), 100.15(20.15), 100.15(8.27), 100.16(0.8), 100.16(1.30), 100.16(14.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw65183 | Title: | PBR set ip next-hop lost on boot if name configured for IP argument | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "set ip next-hop" statement in ASA route-map disappears after reload
Conditions: Occurs when a name to IP mapping exists for the address used as an argument in that "set ip next-hop" configuration.
ie: If the "set ip next-hop" command referenced 192.168.1.1 and there was a config line of:
name 192.168.1.1 WIN-PC
Workaround: Delete the name to IP mapping for the IP address used in that command
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.69), 100.15(17.31), 100.15(20.11), 100.15(8.22), 100.16(0.6), 100.16(1.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux09040 | Title: | ASA not denying initial SYN to non gateway of host | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA completes 3-way handshake for Telnet/SSH control traffic (to-the-box) when initial SYN should be denied.
Conditions: Tested on ASA running 9.2.3.4 and 9.3.1 images. SSH/Telnet enabled Client sends control traffic to non gateway interface
Workaround: create specific denies for control plane traffic via ACL disable SSH/Telnet upgrade to 9.4.1
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(3.4), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 9.4(2.99), 9.4(3), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw88405 | Title: | BGP not working when admin context is in transparent mode | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: BGP not working when admin context is in transparent mode
Working: ! ciscoasa# show context Context Name Class Interfaces Mode URL *admin default Management0/0 Transparent disk0:/admin.cfg USER1 default GigabitEthernet0/0 Transparent disk0:/USER1.txt USER2 default GigabitEthernet0/1 Routed disk0:/USER2.txt ! ciscoasa(config-router)# show run router router bgp 1 bgp log-neighbor-changes ! Non-working: ! ciscoasa# show context Context Name Class Interfaces Mode URL *admin default Management0/0 Transparent disk0:/admin.cfg USER1 default GigabitEthernet0/0 Transparent disk0:/USER1.txt USER2 default GigabitEthernet0/1 Routed disk0:/USER2.txt ! ciscoasa(config)# router bg? ERROR: % Unrecognized command
Conditions: When Admin is in transparent mode
Workaround: Make admin in routed mode
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3 | |
Known Fixed Releases: * | 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.78), 100.15(20.14), 100.15(8.24), 100.16(0.8), 100.16(1.27), 100.16(14.1), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut18736 | Title: | ASA crashes after clear configure all command | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA crashes after "clear configure all" command is configured
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2.202) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.111), 100.14(0.78), 100.15(0.48), 100.15(17.20), 100.15(3.71), 100.15(8.17), 100.16(0.3), 100.16(1.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw03367 | Title: | ASA not installing external LSA with recursive forwarding address | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: OSPF routes sent to ASA can fail to install to the routing table if the forwarding address is covered by the route that is received, even if there is a more specific route that already exists in the routing table. IOS allows this condition to install the route, but ASA does not.
Debugs show:
OSPF: Start processing Type 5 External LSA 192.168.1.0, mask 255.255.224.0, adv 192.168.200.245, age 1045, seq 0x80001158, metric 1, metric-type 1, fw-addr 192.168.1.1 OSPF: external LSA with recursive forwarding address, ignoring
Conditions: ASA receives an LSA with a forwarding address that falls within the scope of the route, for instance a route for the subnet 192.168.1.0/23 with an OSPF fw-addr of 192.168.1.1. This condition should fail UNLESS the ASA already has a more specific route that covers the fw-addr, but even if that condition is met, the route fails to add.
Workaround: None at this time.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.146), 100.13(0.100), 100.14(0.74), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw32493 | Title: | ASA BGP peering flaps with password and ikev2 tunnel. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: BGP adjacency flaps between active/idle state when password is configured for the neighbors. BGP Open message is sent over a L2L tunnel with ikev2-only encryption.
BGP: nbr global Active open failed - open timer running
Conditions: ASA 5515 pair in lab environment. Code: 9.4(1)5
Interesting traffic ACL is configured for the neighbor's IP only. No other traffic going through the firewall.
Workaround: Remove the neighbor x.x.x.x password command Use ikev1 for tunnel authentication
Further Problem Description: BGP peering fails to establish when neighbor is password authenticated and the TCP/179 communication is sent through an IPsec tunnel using ikev2 only.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: * | 100.11(0.64), 100.11(0.65), 100.12(0.152), 100.12(0.154), 100.13(0.116), 100.13(0.120), 100.14(0.80), 100.14(0.83), 100.15(0.63), 100.15(0.87) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw81402 | Title: | ASA packet-tracer and trace capture incorrect result in case of ECMP | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Both ASA packet-tracer and trace capture can print incorrect output-interface in the "Result" section in case of ECMP with traffic zones.
Conditions: All ASA versions that support traffic zones are affected.
Workaround: None, but this is a cosmetic issue.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw40468 | Title: | DHCP proxy overrites chosen DHCP server in multiple DHCP server scenario | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Anyconncet clients stop connecting to the ASA because they are no longer able to get an address from the DHCP server.
Conditions: - multiple DHCP servers configured on the ASA - either DHCP server is behaving incorrectly where it sees the REQUEST (with the other server's IP) and still replies with an OFFER, or the OFFER was sent by the non-selected DHCP server before it sees the REQUEST
Workaround: configure only one DHCP server
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.44), 100.15(17.18), 100.15(3.68), 100.15(8.17), 100.16(0.2), 100.16(1.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw51333 | Title: | ASA 9.4 - missing server authenticate-client command for tls proxy | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Starting in ASA 9.4, the tls proxy command 'server authenticate-client' is not being accepted in the CLI.
Conditions: - Running ASA version 9.4.x or 9.5.1.x - Configuring TLS-proxy and planning to disable client authentication
Workaround: ASA 9.3.x and earlier versions
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4, 9.5(1) | |
Known Fixed Releases: * | 100.13(0.114), 100.14(0.79), 9.4(2.99), 9.4(3), 99.1(3.184), 99.2(2.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux64134 | Title: | Incorrect NTP authentication behavior | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The Cisco Adaptive Security Appliance (ASA) is configured for Network Time Protocol (NTP) authentication. It is possible that the ASA will sync to an unauthenticated NTP server if the NTP key has not been previously configured for that NTP server.
With no NTP authentication configured there is on authentication required even if the NTP key is configured on the NTP server.
Conditions: The ASA is configured with ''ntp authentication''.
Workaround: Configure NTP Authentication along with the ''ntp server ... key ...'' command so each configured NTP server has a key configured.
Further Problem Description: Please refer to the Cisco ASA Command Reference Manual for more information on NTP Authentication:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/n.html#pgfId-1814887
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(4) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.124), 100.15(0.108), 100.16(0.19), 100.16(1.97), 100.16(14.1), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.49) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux22468 | Title: | VPN connection may fail when using an ECDSA certificate | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom:The ASA may fail on a signature operation using an ECDSA private key while establishing a VPN connection.
Conditions:The ECDSA key pair is generated outside of the ASA and imported using the "crypto ca import pkcs12" command. The resulting trustpoint is referenced to provide a PKI identity in a VPN configuration.
Workaround:The problem can be avoided by generating a new key pair on the ASA and re-acquiring the ECDSA certificate using SCEP or manual enrollment.
More Info:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1 | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.97), 100.16(14.1), 100.8(40.108), 9.1(6.109), 9.1(7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux63532 | Title: | webvpn cache-disabled msg is too disruptive and may cause config issues | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: An new INFO message is displayed in 9.1.7 when entering webvpn config mode from console, ASDM, SSH: "INFO: Webvpn Cache is disabled by default on this release. Please refer to the documentation to enable WebVPN Cache using CLI or ASDM."
It may interfere with some webvpn confiurations and is confusing/disruptive.
Conditions: Configuring webvpn
Workaround: none
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.107), 9.1(6.113) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.107), 100.16(0.17), 100.16(1.83), 100.16(14.1), 100.8(40.112), 9.1(6.115), 9.1(7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32176 | Title: | IPv6 Complete Packet Fragment Reassembly Check Bypass | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: It is possible for a crafted IPv6 packet to bypass the fragment reassembly check of the Cisco Adaptive Security Appliance (ASA).
Conditions: Cisco ASA configured for IPv6.
Workaround: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/4.3: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0 CVE ID CVE-2012-5736 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.11(0.63), 100.12(0.143), 100.12(0.146), 100.13(0.100), 100.13(0.95), 100.14(0.71), 100.14(0.73), 100.15(0.24), 100.15(0.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus65997 | Title: | Failover State Link Must Support Directly Connected Redundant Interface | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When using stateful failover on Adaptive Security Appliances (ASA), a reloaded failover peer may select an inactive member of the redundant interface on the failover state link. As the result, the failover state link fails.
Conditions: Failover ASA units use a pair of directly connected physical ports in a redundant interface configuration for the failover state link.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(4), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.107), 100.14(0.76), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut74139 | Title: | Standard Based IKEv2: Incorrect command to configure DPD | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Ikev2 remote access DPD is configured under the group policy instead of the tunnel group.
Conditions: Configuring DPD's for remote access IKEv2 connections.
Workaround: Configure 'anyconnect dpd-interval gateway' under the group policy webvpn config. Eg:
group-policy test attributes webvpn anyconnect dpd-interval gateway 300
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.78), 100.15(20.14), 100.15(8.25), 100.16(0.8), 100.16(1.28), 100.16(14.1), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux26443 | Title: | DAP URL-List Command Says It Supports 491 Characters; Only Supports 245 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Currently, the ASA states that dynamic-access-policy-record url-lists can be 491 characters; however, the URL-list actually can actually only be 245 characters in length. If you add a list greater than 245 characters long, it gets instantly removed from the configuration.
Conditions: First reported on ASA 9.1(5).
Workaround: Change the name of your URL-List Entries to make the entire list less than 245 characters in length.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.15(0.101), 100.16(0.13), 100.16(1.70), 100.16(14.1), 100.8(40.108), 9.1(6.109), 9.1(7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu61981 | Title: | http servershows as enable in running config while not | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When configuration command "http server enable" fails due to port usage conflict with AAA with error message ERROR: Port 443 is being used on interface public by an aaa authentication listener", the configuration is incorrectly updated to include "http server enable".
Conditions: When configuration "http server enable [port-number] is attempted but the designated port is already in use (e.g., by AAA).
Workaround: remove the conflict configuration before "http server enable"
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.108), 100.14(0.77), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv49100 | Title: | ASA: Unable to ping fover IPv6 address in multiple mode | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Ping command fails when trying to ping the IPv6 address assigned to the failover lan interface.
Conditions: ASA is in multiple mode with IPv6 addresses assigned to the failover lan interface.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3), 100.16(1.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv52750 | Title: | Cannot change "management-only" for port-channel interfaces on 5500-X | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Once a port-channel interface is created, its management-only setting cannot be changed (enabled or disabled, whatever the initial management-only setting was when the interface was created). The following error is shown if an attempt to change the setting is made:
"It is not allowed to make changes to this option for management interface on this platform" This happens only with port-channel interfaces, and this behavior is not tied to the management-only state of the member interfaces.
Conditions: 5500-X models, excluding 5585-X
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.94), 100.14(0.69), 100.15(0.23), 100.15(1.53), 100.15(15.14), 100.15(16.1), 100.15(2.83), 100.15(3.30), 100.15(6.19), 100.15(6.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux07478 | Title: | Session Manager debugs missing identifiers and logoff oldest wrap issue | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: vpn-session debugs inconsistent and are missing session/tunnel IDs. This makes it difficult to isolate a single connection.
Conditions: debug vpn-session multiple sessions being established
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1 | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.92), 100.15(20.20), 100.16(0.10), 100.16(1.40), 100.16(14.1), 100.16(15.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux29453 | Title: | IPv6: ASA denies IPv6-ICMP request to the ASA when failover | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: After execute the no failover active command on active unit, during IPv6 Ping(ICMP-Request) to the ASA, the ping to the new active ASA will keep drop without recover.
Conditions: - Only IPv6 ping to the ASA has this issue , IPv4 does not occur this issue. - same-security-traffic permit intra-interface command is enabled. - after failover.
Workaround: Stop the ping, and ping again .
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6), 9.3(2), 9.5(1.5) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.111), 9.4(2.99), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux41622 | Title: | "set connection timeout idle" is not applied. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Custom TCP connection idle timeout does not work until service-policy is removed and re-applied.
Conditions: Custom TCP idle connection timeout should be configured.
Workaround: We need to remove and re-apply the service-policy for the traffic to match the associated class-map.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.10) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.111), 9.1(7.5), 9.2(4.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv05255 | Title: | ASA built and teardown log messages show "any" information | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA connection built and teardown log messages display parameter "any" such as below:
Jun 19 01:55:00 172.19.32.124 %ASA-6-302015: Built outbound UDP connection 4535 for outside:4.2.2.2/53 (4.2.2.2/53) to identity:172.19.32.124/59941 (172.19.32.124/59941)(any) Jun 19 01:57:02 172.19.32.124 %ASA-6-302016: Teardown UDP connection 4535 for outside:4.2.2.2/53 to identity:172.19.32.124/59941(any) duration 0:02:01 bytes 186 May 29 15:18:11 172.19.32.124 %ASA-6-302020: Built outbound ICMP connection for faddr 10.82.32.127/0 gaddr 10.82.32.124/31615 laddr 10.82.32.124/31615(any) May 29 15:18:11 172.19.32.124 %ASA-6-302021: Teardown ICMP connection for faddr 10.82.32.127/0 gaddr 10.82.32.124/31615 laddr 10.82.32.124/31615(any)
Conditions: ASA running code 9.3.3
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: * | 100.12(0.158), 100.13(0.132), 9.4(2.103), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux99214 | Title: | ASA5516 SSD reports incorrect OID in Entity MIB | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Wrong OID returned for ASA5516 SSD in Entity MIB
Conditions:
Workaround: The bug has been resolved with the necessary fixes. A new OID has been assigned to the ASA5516 platform type. The fixes have been tested and committed to the codebase.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.133), 100.15(0.112), 9.4(2.104), 9.4(3), 96.2(1.146), 96.2(11.1), 97.1(0.4), 97.1(1.4), 97.1(2.2), 97.1(3.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32157 | Title: | Remove Code for Type 0 Routing Headers | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.
Conditions: Device configured with default configuration.
Workaround: Not applicable or available.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.54), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq27754 | Title: | WebVPN client browser doesn't show all content from flash site | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When www.loreal.com is accessed through Clientless SSL VPN portal page, flash content on the www.loreal.com is not displayed.
Conditions: Seen on both Mac OS X v10.9 with FireFox v28, v30 and Safari v7.x and on WIndows 7 with FireFox v28 and Internet Explorer v11
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(1.102) | |
Known Fixed Releases: * | 100.13(0.112), 100.14(0.78), 100.15(0.51), 100.15(17.21), 100.15(3.73), 100.15(8.17), 100.16(0.3), 100.16(1.7), 9.4(2.99), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux90740 | Title: | "backup" command does not include anyconnect client profile files | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "backup" command via CLI does not contain AnyConnect client profile files.
Conditions: backup ASA configuration via CLI
Workaround: Backup ASA configuration via ASDM
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.127), 100.15(0.112), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.63), 96.2(1.116) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67779 | Title: | Investigate impact of jumbo-frame reservation on low-end ASA platforms | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Low-end ASA models, like ASA5512-X or ASA5515-X may fail to boot if Jumbo frames are enabled (jumbo-frame reservation) and additional interface card, like ASA-IC-6GE-CU-A card is present in the chassis.
Conditions: This issue was seen in 9.2(3) and 9.3(1) software.
Workaround: Try to load 9.3(2) software, run "no jumbo-frame reservation" and reload.
Further Problem Description: Even though 9.3(2) software boots up, the ASA cannot service ASDM connections if Jumbo frames are enabled. This happens due to low volume of free DMA memory. Use "show memory detail" command to check.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(3), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86), 100.15(3.31), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv11963 | Title: | TP Auth fails when sub CA using RSA keys is signed by root using ECDSA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA fails to validate the Anyconnect client certificate issued by the intermediate CA under below conditions.
Conditions: 1. ASA running 9.3.3.1, should be configured for certificate authentication.
2. Root CA cert must have ECDSA Signature algorithm and ECDSA public key
3.Intermediate CA cert must have ECDSA signature algorithm with RSA public key.
4.ASA ID cert must have RSA signature algorithm with RSA public key.
5.Client cert must have RSA signature algorithm with RSA public key.
Workaround: NONE
Further Problem Description: When we connect to ASA from Anyconnect client machine, we see the client is sending its ID cert and ASA fails to verify the cert chain with below debug.
CRYPTO_PKI: Verify chain of certs, Getting public key from signersCert. CRYPTO_PKI:Failed to set key info for get public key obj, status: 542, keylen: 294 CRYPTO_PKI: Verify chain of certs failed to get pubkey from signer.
Root, intermediate and ID certs are installed in separate Trustpoints in ASA. We have also tried installing intermediate and ID cert in single Trustpoint which results in same failure.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(3.1), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.2), 100.15(3.50), 100.15(6.33), 100.15(8.13), 9.4(1.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux12959 | Title: | "failover standby config-lock" is not loaded in ASA correctly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The configration "failover standby config-lock" is not loaded in ASA correctly.
When the ASA is booting on failover configuration, the ASA show the following message.
Reading from flash... !!Failover is not enabled or failover is not configured this command will not be executed
Conditions: Setting of "failover standby config-lock"
Workaround: Re-execute the command "failover standby config-lock" if ASA doesn't reflect "failover standby config-lock" after reboot.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.121), 100.14(0.85), 100.15(0.97), 100.16(0.12), 100.16(1.50), 100.16(14.1), 100.16(15.7), 9.4(2.99), 9.4(3), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw15152 | Title: | Fix broken gcov build in dublin/main | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fix broken gcov build in dublin/main
Conditions: Fix broken gcov build in dublin/main
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.12(0.145) | |
Known Fixed Releases: * | 100.12(0.147), 100.13(0.102), 100.14(0.75), 100.15(0.28), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv72826 | Title: | object-group-search access-control enabled, nested object group issue | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: asa denied traffic after moving an group object to another group object
Conditions: object-group-search access-control enabled
Workaround: reapply access-list to the interface
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6), 9.2(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.56), 100.15(8.15), 100.16(0.2), 100.16(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv80580 | Title: | ASA allows AC session with existing AAA assigned address after failover | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: After failover, ASA allows to create AnyConnect session that uses the same Framed-IP-Address which is created and replicated before the failover, not detecting that the IP address has already been assigned by AAA. While the session with the same assigned address is created, ASA will not pass the vpn data traffic for that session.
Conditions: ASA with HA setup and radius is used as address assignment.
Workaround: Assuming framed-ip-address value is associated with a specific username, enable AutoReconnect so that new session is not required after failover.It is also considered a workaround to configure simultaneous login to 1 or configure vpn-idle-timeout to shorter value to push off the existing session. If these are all unacceptable, it is also possible not to use radius for address assignment.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6), 9.1(6.6) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.107), 100.14(0.76), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv86227 | Title: | ASA sending incorrect ACL hash for ASDM TopN ACL statistics on a cluster | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Error message under firewall dashboard "n/a config out of sync" for ASDM supporting ASA cluster.
Conditions: Running ASA cluster on ASDM with threat detection statistics turned on.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux39988 | Title: | Different output of BVI address in transparent mode on failover pair | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Different output of BVI ip address when execute show interface and show interface ip brief at standby unit.
Conditions: ASA Failover + transparent mode
Workaround: NA
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.10), 9.5(1.5) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.15(0.113), 100.8(40.110), 9.4(2.99), 9.4(3), 96.1(1.87), 96.2(1.168) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv60724 | Title: | Cisco ASA Unicast Reverse Path Forwarding (uRPF) Bypass Vulnerability | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A vulnerability in the Unicast Reverse Path Forwarding (uRPF) feature in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to bypass the uRPF validation checks.
The vulnerability is due to incorrect uRPF validation where IP packets from an outside interface whose IP address is both in the ASA routing table and associated with an internal interface are not dropped. An attacker could exploit this vulnerability by sending spoofed IP packets to the ASA in a subnet range which should be dropped. An exploit could allow the attacker to bypass uRPF validation on the ASA and the packet will be incorrectly forwarded on the internal network.
Conditions: The ASA has the command ''ip verify reverse-path interface '' configured on an outside interface which has a default route.
Workaround: None.
Further Problem Description: This problem was introduced by ASA software version 9.3(3).
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2015-4321 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(1.50), 9.3(2.100), 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.32), 100.15(6.19), 100.15(6.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz16398 | Title: | Incorrect modification of NAT divert table. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: NAT divert table gets modified or rather the rule gets pushed to the bottom of the nat divert table list when we add the "no-proxy-arp/route-lookup" keyword to an already existing nat statement.
Conditions: Just append an existing nat rule entry with the no-proxy-arp/route-lookup keywords to the nat statement without deleting the entry.
Workaround: Delete the nat statement and re-add the entry with the keyword included by specifying the line number.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(4.5) | |
Known Fixed Releases: * | 100.13(0.138), 100.15(0.116), 96.2(0.7), 96.2(11.12), 97.1(0.12), 97.1(1.25), 97.1(1.26), 97.1(3.6), 97.1(5.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv88898 | Title: | WEBVPN Rewriter: Stops mangling after hex code of Period on Bookmark URL | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When the hex code of the characters on a URL is used on the bookmark for Clientless webvpn, the URL mangling stops after the Hex equivalent of "period" is seen. For example : For http://www.cisco.com we use "http://www.cisco.com" The mangled URL looks like this https://ASA IP/+CSCO+0h756767633A2F2F6A6A6A++/.cisco.com
The mangling stops at . which is the Hex equivalent for "period"
Conditions: HEX code is used on the Bookmark URL
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.106), 100.14(0.76), 100.15(0.39), 100.15(17.14), 100.15(3.63), 100.15(8.16), 100.16(0.2), 100.16(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux81075 | Title: | PBR "set interface" failing to use default and less preferred route | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Policy Based Routing using "set interface" option is not able to use default route or a specific route with higher distance
Conditions: - ASA configured with Policy Based Routing - "set interface" option used to selectively route the traffic
Workaround: Use "set ip next-hop", if possible
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.13(0.127), 100.15(0.112), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.60), 96.2(1.111) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut35367 | Title: | SVG Parser not mangling xlink:href attribute | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When loading an url with svg tag via webvpn, page is rendering correctly but the xlink:href attribute is not mangled.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.13(16.1), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.3), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtj56778 | Title: | Incorrect ARP MAC Address conversion | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA converts the following cli arp inside 1.2.3.4 abc.de.f to arp inside 1.2.3.4 ab0c.de00.0f00 it should convert to arp 1.2.3.4 0abc.00de.000f like IOS and IPv6 Neighbor cache
Conditions:
Workaround: Enter proper mac address
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.3(1) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.94), 100.15(20.22), 100.16(0.10), 100.16(1.50), 100.16(14.1), 100.16(15.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux50234 | Title: | asa fails to format disk1 USB drive | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: asa rejects disk1 as an argument to the format command
Conditions: this is a problem with newer asa versions
Workaround: drop back to 9.1.7, do the formatting and then upgrade back to the faulty version
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.204) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 9.4(2.99), 9.4(3), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy88971 | Title: | ASA does not suppress EIGRP candidate default route information | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA does not clear the flag "Route is Candidate Default" in EIGRP updates when redistribute default route from static routes or other dynamic routing protocols. EIGRP update packets display : Route is Candidate Default: True External Data Originating RouterID: x.x.x.x(x.x.x.x) Originating A.S.: x Administrative Tag: x External Metric: x Reserved: x External Protocol ID: Static Route (3) External Flags .... ...0 = Route is External: False .... ..1. = Route is Candidate Default: True
Conditions: The command "no default-information out" is configured in EIGRP
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0, 9.1, 9.2, 9.3, 9.4, 9.5 | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.137), 100.15(0.114), 9.4(2.109), 9.4(3), 96.1(1.88), 96.2(1.174), 96.2(11.6), 97.1(0.10), 97.1(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw82198 | Title: | Default inspection engines enabled on Standby but not on Active ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Standby ASA can have some default inspection engines running on custom contexts while the same are not enabled on the Active unit.
Conditions: > Pair of ASA units running in Failover pair (Act/Stb or Act/Act)
Steps to reproduce:
> Load context configuration file ONLY into Primary ASA flash memory > Initialize the context on Primary configuring the context statements and point the config-url with the file loaded on the Primary flash > Run the "write mem all" or "write memory" on the context created > Check the file with the context config on the Secondary ASA flash using the command "more disk0:/ | b policy-map" > Default inspection engines should be displayed.
Workaround: Running the "write standby" command on Active unit of affected context fixes the problem.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.8), 9.4(1.6) | |
Known Fixed Releases: * | 100.13(0.120), 100.14(0.83), 100.15(0.86), 100.15(20.17), 100.15(8.29), 100.16(0.9), 100.16(1.34), 100.16(14.1), 9.4(2.99), 9.4(3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux35272 | Title: | ASA TCP normalizer checksum verification cannot be disabled | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When ASA processes traffic that is L7 inspected or has to be redirected to a module (e.g. IPS, CX, SFR etc) there is need to normalize it first.
One of the things that is checked during the normalization process is TCP checksum verification. If a packet has a wrong TCP header checksum the normalizer will drop it. This will be shown in the ASA ASP drops as 'bad-tcp-cksum'.
Theoretically the ASA can be configured to ignore bad TCP checksums. Here is an example: tcp-map IGNORE_TCP_CHECKSUM no checksum-verification ! policy-map SFR_PMAP class SFR_CMAP sfr fail-open set connection advanced-options IGNORE_TCP_CHECKSUM service-policy SFR_PMAP interface NET1
This defect is filed since even if the ASA is configured to ignore TCP checksum verification it is still doing it and the packet with the bad checksum is getting dropped with drop-reason: (bad-tcp-cksum).
Conditions: L7 inspection or redirection to module is enabled so that TCP normalizer is on.
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(1.5) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.105), 100.16(0.15), 100.16(1.76), 100.16(14.1), 100.8(40.111), 9.1(7.5), 9.2(4.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv85752 | Title: | Group-lock value can be set with space in a tunnel-group name | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Group-lock setting does not get deleted from group-policy attributes and causes AnyConnect connections to fail for a given tunnel-group.
Conditions: Standard AnyConnect configuration plus group-lock in the group-policy.
Workaround: Reapply the group-lock without space after a tunnel-group name.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2, 9.1, 9.1(4), 9.3, 9.3(2), 9.4, 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw03407 | Title: | DHCPD Search domain shorter than 10 characters is corrupted | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When the ASA is acting as a DHCPD server, it may corrupt the DHCP OFFER and DHCP ACK packets if the domain name configured in the DHCPD section is shorter than 10 characters long.
Conditions: This is seen when the DHCPD cofiguration has an interface specific DNS search suffix that is less than 10 characters long:
dhcpd address 192.168.1.40-192.168.1.40 guest dhcpd dns 10.0.0.100 interface guest dhcpd domain abc.ca interface guest <<<<<<<<<<<<<<<< dhcpd enable guest
This will result in the DNS search domain being sent out as a combination of the configured domain and 'cisco.com'. This can be checked using packet captures of the DHCP traffic.
In the above example, the ASA will pad the configured domain with the letters from cisco.com to reach 'abc.caom'.
Workaround: Do not configure this field or use a longer domain if feasible.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.99), 100.14(0.73), 100.15(0.26), 100.15(1.81), 100.15(16.3), 100.15(17.1), 100.15(3.49), 100.15(6.31), 100.15(8.13), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus08552 | Title: | show traffic protocol stats show large counter values-enhanced pkt stats | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: show traffic protocol statistics show huge counter values after enhanced packet stats are enabled .
Conditions: After enhanced packet statistics are enabled with the command "sysopt traffic detailed-statistics", some of the counter values arevery large as displayed wiht "show traffic" command.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.12(0.101), 9.3(1.108) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.127), 100.15(0.112), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.59), 96.2(1.110) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88412 | Title: | When > 510 characters entered in CLI, context switches to admin/system | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When user exceeded 510 characters from the CLI and is not within the admin/system context, user is unintentionally switched into the "admin/system" context. This issues was observed when running the command on ASASM after first logging into the 6500 switch and performing a "session" connection to the module.
Conditions: ASASM with v9.1.6.1
Workaround: none
Further Problem Description: none
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.73), 100.15(17.33), 100.15(20.12), 100.15(8.23), 100.16(0.7), 100.16(1.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy71812 | Title: | Coverity 114217: NULL_RETURNS in snp_fp_action_cap_construct_key | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fails Static Analysis - Created by Coverity Static Analysis
Conditions: N/A
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 96.2(1.147), 97.1(1.5) | |
Known Fixed Releases: * | 96.2(0.7), 96.2(11.12), 97.1(0.12), 97.1(1.26), 97.1(5.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv93407 | Title: | ASA Lina: fix memory leak in debug menu option 20 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When using 'debug menu memory 20 X' troubleshooting command, with X != 1, sometimes not all the allocated memory is released.
Conditions: 'debug menu memory 20 X' where X != 1
Workaround: Use 'debug menu memory 4' to release all remaining allocated memory.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.12(0) | |
Known Fixed Releases: * | 100.12(0.145), 100.13(0.97), 100.14(16.6), 100.14(5.31), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux90767 | Title: | Resolve CSCtz82865 - Equivalent of "show xlate count" command | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Resolve CSCtz82865 - Equivalent of "show xlate count" command
Conditions: Cisco ASA running release 9.1.4 and higher with SNMP enabled. On certain version it's not running.
Workaround: none
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.127), 100.15(0.112), 9.4(2.99), 9.4(3), 9.5(2.6), 9.6(0.99), 96.1(1.59), 96.2(1.110) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv76342 | Title: | ISA3000 crashed while generating crypto rsa keys | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ISA3000 can produce back-trace after executing "crypto key generate rsa usage-keys label usage_key modulus 4096" command.
Conditions: After the unit is installed with not much initial configuration issue the command 'crypto key generate rsa label Key1_4096 modulus 4096' Try the same command manually 7-8 times. The ISA can crash and produce back trace around 8th iteration. However the issue cannot be reproduced consistently.
Workaround: ISA should reload after the back trace
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.13(29.28), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.104), 100.13(29.101), 100.13(29.36), 100.14(0.75), 100.15(0.29), 100.15(0.42), 100.15(1.94), 100.15(16.7), 100.15(17.18), 100.15(17.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq21426 | Title: | Inspect-DNS: PTR Query failed when DNS-Doctoring enabled | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: revDNS response going through ASA is received for different IP address than original query.
Conditions: ASA has nat configured with 'dns' keyword and there is revDNS query for mapped IP address used in this translation.
Workaround: 1. remove 'dns' keyword from NAT statement, 2. query for real IP address
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.0(4.18) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.87), 100.15(20.17), 100.15(8.29), 100.16(0.9), 100.16(1.34), 100.16(14.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCub30181 | Title: | ASA doesn't set ACE inactive when time-range expires | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In some scenarios, after a time-range expires, an ASA does not mark the ACE as inactive. This causes traffic to be incorrectly permitted or denied after the time range is no longer valid.
Conditions: This affects 8.4.1 - 8.4.4 version of ASA
Workaround: Make any change to the ACL policy that will force it to re-apply the configuration. For example, move the start time of the time-range forward by 1 minute. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:W/RC:C&version=2.0 CVE ID CVE-2012-3925 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.7(13.93), 8.4(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.115), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.4), 100.15(8.18), 100.16(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv62204 | Title: | "show ipv6 neighbor" command not available in system space | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "show ipv6 neighbor" command is not available in the system execution space
Conditions: ASA in multiple mode.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.13(0.97), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30), 100.15(8.13), 9.4(1.107), 9.4(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw62030 | Title: | ASA DNS doctoring not working with "any" keyword | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When ASA is configured with DNS doctoring, the DNS response from the DNS server is forwarded onto the client and not rewritten by the ASA.
Conditions: ASA running 9.1.5 using the "any" keyword in the NAT statement
Workaround: Use specific egress interfaces and not "any"
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.14(0.83), 100.15(0.88), 100.15(20.17), 100.16(0.9), 100.16(1.35), 100.16(14.1), 100.8(40.105) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq27723 | Title: | WebVPN Citrix client browser couldn't save Java Client as preferred | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: - As a remote access user - On the Citrix client accessed through the browser - When the client preference option in settings is changed from default native client to Java client and saved - It's not showing up the new change when the settings is visited again.
Conditions: Access XenApp server using web-browser through Clientless SSL VPN This happens on Mac OS X v10.9 with FireFox 30 and Safari v7.x This also happens on Windows 7 with FireFox v28 and Internet Explorer 9
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(1.102) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.23), 100.15(1.54), 100.15(15.15), 100.15(16.1), 100.15(2.85), 100.15(3.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy84044 | Title: | Rewriter error with webworker JS | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA webvpn is unable to render a page with webworker javascript element
Conditions: The internal page uses webworker javascript
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.11(0.70), 100.12(0.158), 100.13(0.136), 100.15(0.113), 100.8(40.117), 9.4(2.109), 9.4(3), 96.1(1.87), 96.2(1.170), 96.2(11.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv32789 | Title: | ASA using IKEv2 rejects more than 10 NAT_DETECTION_SOURCE_IP payloads | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Acting as the IKEv2 responder, ASA receives initial IKEv2 packet that contains more than 10 payloads for NAT_DETECTION_SOURCE_IP from initiator. ASA rejects the connection, enumarates 10 payloads and prints "INVALID_SYNTAX" afterwards.
Conditions: -ASA acts as IKEv2 responder. -ASA receives more than 10 payloads for "NAT_DETECTION_SOURCE_IP" from the initator.
Workaround: Use IKEv1
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.2(2.8) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.141), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.62), 100.15(16.1), 100.15(17.1), 100.15(3.36), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux27028 | Title: | L2TP/IPSec fails with Multilink PPP enabled on Win client | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: L2TP/IPSec fails with Multilink PPP enabled on Win client
Conditions: ASA running version 9.4 and Multilink PPP setting is enabled on Windows Client.
Workaround: Disable Multilink PPP on end client -
1. Open the Network Connections folder and view available connections. 2. Right-click the L2TP connection, and then click Properties. 3. On the Options tab, click PPP Settings. 4. Uncheck the Negotiate multi-link for single-link connections check box.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.52) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsh75522 | Title: | Increase Content-length counter from 4 to 8 byte size | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Deep inspect http (i.e. http app-fw or inspect http http-policy-map) reports the http connections as protocol-violation if the request part of "Content- Length: " value n > 268435455. ASA supports content-length value up to 0x0FFFFFFF (i.e. 268435455) only.
Conditions: HTTP Requests, Content-Length : headers value should be greater than 268435455
Workaround: No workaround.
Further Problem Description: One way to get rid of the issues is to disabled the connection drop or reset for protocol-violation. But this causes inspection won't be done on the http data.
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 7.0, 8.0(0.195) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.131), 100.15(0.112), 100.8(40.114), 9.4(2.102), 9.4(3), 96.1(1.80), 96.2(1.134), 96.2(11.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy81416 | Title: | Coverity 114306: NULL_RETURNS in sctpRefreshTimerHandler | |
Status: | Other | |
Severity: | 3 Moderate | Description: * | Symptom: Fails Static Analysis - Created by Coverity Static Analysis
Conditions: N/A
Workaround: N/A
Further Problem Description: This bug is fixed in the current build.
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 97.1(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw71195 | Title: | Initial Smart Licensing message fails due to 'SCH not ready' | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: * | Symptom: During boot up an ASAv will fail to send a Smart Licensing entitlement authorization renewal message:
%ASA-3-444303: %SMART_LIC-3-COMM_FAILED:Communications failure with Cisco licensing cloud: Communication message send response error
Conditions: The ASAv is configured with a Failover mate but there is no mate present.
Workaround: If the ASAv remains in an Unlicensed state due to this condition, the user can force the re-authorization of the ASAv platform license by issuing the license smart renew auth command.
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: | 100.15(8.41), 96.2(1.120) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz20742 | Title: | AWS: ASAv not reachable if deployed with 2 interfaces | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: An ASAv deployed in from Marketplace can't be reached via SSH after deployment.
Conditions: It is recommended to deploy ASAv from Marketplace with only the initial Management interface. Then, after ASAv has booted, add the additional data interfaces and reload the ASAv. However, if a 2nd interface is added during deployment dialog, the ASAv may be unreachable after initial deployment.
Workaround: Deploy ASAv from Marketplace with the default Management interface. Then add additional data interfaces after ASAv has booted and reload ASAv.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2.200) | |
Known Fixed Releases: * | 96.2(0.11), 97.1(1.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux55923 | Title: | WebVPN: Unable to play certain online videos | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Unable to play videos through webvpn. When clicking the video to play it is simply unresponsive.
Conditions: Webvpn on ASA
Workaround: none
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.124), 100.15(0.109), 100.16(0.19), 100.16(1.97), 100.16(14.1), 100.8(40.113), 9.1(7.5), 9.4(2.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw30999 | Title: | ASA5508 5516 Unable to communicate with 100/full configured after reboot. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: An ASA5508 5516 interface is configured as 100-full(speed 100, duplex full). After ASA5508 5516 rebooted, it was not able to communicate with another device.
Conditions: Configure 100/full in interface settings on ASA5508 5516. After you reboot, this problem occurs.
Workaround: Configure auto in interface settings. Shut, No Shut on the interface will also recover without having to reboot.
Further Problem Description: none
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(1.5), 9.4(2.6) | |
Known Fixed Releases: * | 100.12(0.155), 100.13(0.121), 100.15(0.103), 100.16(0.13), 100.16(1.73), 100.16(14.1), 9.4(2.99), 9.4(3), 9.5(2.7), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy10665 | Title: | HA: Number of interfaces mismatch after SFR module reload on both units | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Reload SFR service module on both units. It's observed that a lot of interface number mismatch messages as following will show up on Secondary unit.
Number of interfaces on Active and Standby are not consistent. If the problem persists, you should disable and re-enable failover on the Standby.
Conditions: Reproduced in the lab that we reload SFR on Active unit first, after 30 secs, reload SFR on the Secondary unit. With Active/Active failover setup with multiple contexts and huge ACL rules, the error message will show up.
Workaround: write standby on Active unit or disable monitoring interface health or enable monitoring service-module
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.15(0.112), 9.5(2.7), 96.1(1.86), 96.2(1.158), 96.2(11.2), 97.1(0.6), 97.1(1.8), 97.1(2.4), 97.1(3.2), 97.1(4.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux83705 | Title: | DNS Reply Modification for Dual-Stack does not work as expected | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: For DNS requests passing through an ASA which is supposed to perform DNS fixup/doctoring/reply modification (as configured in fig 27-27 of the following doc: http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html#wp1090556), in a dual-stack routing environment, the ASA modifies one of the records twice (per design) and the other only once (defective behavior). The Layer 3 protocol of the DNS request is the same as the record that will be successfully modified.
For example, if the client makes a DNS request over IPv4, the ASA will correctly modify the A record twice, but it will return an AAAA record which has only been modified once. If the client makes a DNS request over IPv6, then the ASA will modify the AAAA record twice, but it will only modify the A record once.
Conditions: -The DNS Server, Host, and Server are on separate networks (as in fig 27-27 of the following doc: http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html#wp1090556) -Dual-Stack routing is in place (IPv4 and IPv6)
Workaround: No configuration workarounds are possible on the ASA.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.130), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.4(2.101), 9.4(3), 9.5(2.7), 9.6(1.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy99280 | Title: | ENH: ASAv should have a different pre-loaded cert | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASAv may fail to register to the Smart Software Licensing portal. The ASAv will present the following output:
ASAv# show license registration Registration Status: Retry In Progress. Registration Start Time: Mar 22 13:25:46 2016 UTC Registration Status: Retry In Progress. Registration Start Time: Mar 22 13:25:46 2016 UTC Last Retry Start Time: Mar 22 13:26:32 2016 UTC. Next Scheduled Retry Time: Mar 22 13:45:31 2016 UTC. Number of Retries: 1. Last License Server response time: Mar 22 13:26:32 2016 UTC. Last License Server response message: Communication message send response error
(The Last Server Response Message may also simply state "Communication Failure").
The ASA will be able to access internet resources, but ASA-3-717009 messages will be seen, indicating "No suitable trustpoints found to validate certificate serial number..."
Conditions: In the output of show crypto ca certificate, the default certificate has the following information:
ASAv# show crypto ca certificate CA Certificate [...] Subject Name: cn=VeriSign Class 3 Secure Server CA - G3 ou=Terms of use at https://www.verisign.com/rpa (c)10 ou=VeriSign Trust Network o=VeriSign\, Inc. c=US [...] Associated Trustpoints: _SmartCallHome_ServerCA
The first line under "Subject Name" (indicating the intermediate CA) reads "cn=Symantec Class 3 Secure Server CA - G4" in the correct cert, i.e., it's signed by Symantec rather than Verisign and is G4 rather than G3.
Workaround: Pre-9.5.2:
Run the following command in enable mode:
crypto ca trustpool import url http://www.cisco.com/security/pki/trs/ios_core.p7b
Starting in 9.5.2:
The trustpool will auto-update at 10pm local device time. If this is an initial installation, and DNS lookups and internet connectivity have not been up at that time yet, then the auto-import has not succeeded and will need to be completed manually.
### IMPORTANT NOTE #### After 9.6.1.1 is released - 1. Before upgrading the ASA, please run the following commands on ASA prompt. This removes the old cached certificate from the config. ciscoasa(config)# clear configure crypto ca trustpoint ciscoasa(config)# write memory
2. After the upgrade, the following message will appear during bootup: .Creating trustpoint "_SmartCallHome_ServerCA" and installing certificate...
3. As the old cached certificate is cleared by step 1, the new certificate will be installed in the trustpoint. This can be verified by issuing the following command and observing output. Note: the 'subject name' should match the 'issuer name'. 5545-1# show crypto ca certificates
Output: CA Certificate Status: Available Certificate Serial Number: 18dad19e267de8bb4a2158cdcc6b3b4a Certificate Usage: General Purpose Public Key Type: RSA (2048 bits) Signature Algorithm: SHA1 with RSA Encryption Issuer Name: cn=VeriSign Class 3 Public Primary Certification Authority - G5 ou=(c) 2006 VeriSign\, Inc. - For authorized use only ou=VeriSign Trust Network o=VeriSign\, Inc. c=US Subject Name: cn=VeriSign Class 3 Public Primary Certification Authority - G5 ou=(c) 2006 VeriSign\, Inc. - For authorized use only ou=VeriSign Trust Network o=VeriSign\, Inc. c=US Validity Date: start date: 00:00:00 UTC Nov 8 2006 end date: 23:59:59 UTC Jul 16 2036 Associate
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.3(3), 9.4(2), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.138), 100.15(0.116), 9.4(2.112), 9.4(3), 9.5(2.7), 9.6(1.1), 96.2(0.4), 96.2(11.11), 97.1(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz18707 | Title: | Intranet page does not load via WebVPN with JavaScript errors | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fail to load the intranet page properly via WebVPN.
Conditions: Page with Java script enabled accessed via WebVPN
Workaround: NA
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(7.6) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.138), 100.15(0.116), 9.4(2.112), 9.4(3), 9.5(2.7), 9.6(1.1), 96.2(0.5), 96.2(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv09640 | Title: | ASA: "Auto-Enable" feature not working with SSH configured with PKF | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "Auto-enable" feature does not work with ASA device configured with the SSH PKF feature
Conditions: ASA SSH configured with the PKF feature
Workaround: Don't use the "auto-enable" command with SSH PKF feature
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.134), 100.13(0.90), 100.14(0.68), 100.15(0.112), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4), 100.15(2.75), 100.15(3.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy80058 | Title: | FO replication failed: cmd=no disable, when disabling webvpn-cache | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: On Active unit executed "webvpn-cache-no-disable". Config changed properly to disable webvpn cache. On the Standby unit, however, config to disable-webvpn-cache was not changed and got an HA syslog: "<151>:Mar 16 23:40:54 EST: %ASA-ha-7-709001: FO replication failed: cmd=no disable returned=-3" Configs become out of s
Conditions: Webvpn cache config
Workaround: On active unit , execute"write standby" to syncup the configs.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.4(2.105) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.137), 100.15(0.116), 100.8(40.117), 9.4(2.111), 9.4(3), 9.5(2.7), 96.2(0.8), 96.2(11.12), 97.1(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy74362 | Title: | WebVPN FTP client failing with "Error contacting host" message | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When accessing FTP server via WebVPN portal, the "Error contacting host" message is produced. The issue can be intermittent.
Conditions:
Workaround: Specify username and password directly in the URL, for example:
ftp://username:password@FTP_address
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.3(2), 9.4, 9.5 | |
Known Fixed Releases: * | 100.12(0.158), 100.13(0.135), 100.15(0.112), 9.4(2.107), 9.4(3), 9.5(2.7), 9.6(1.1), 96.1(1.86), 96.2(1.160), 96.2(11.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz06125 | Title: | Active and Standby ASA use same MAC addr with only active MAC configured | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Active and Standby ASAs use the same MAC address on their interfaces.
Conditions: Only active mac address is configured under that interface. For example:
interface GigabitEthernet0/0 mac-address 0000.1000.1111
Workaround: Configure both active and standby MAC addresses when assigning a manual MAC address. For example:
interface GigabitEthernet0/0 mac-address 0000.1000.1111 standby 0000.1000.2222
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.6(1) | |
Known Fixed Releases: * | 100.11(0.71), 100.13(0.138), 100.15(0.115), 100.8(40.117), 9.5(2.7), 9.6(1.1), 96.2(0.1), 96.2(1.180), 96.2(11.9), 97.1(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy89425 | Title: | AAA: RSA/SDI unable to set new PIN | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: After upgrade of the ASA the users are unable to (re-)set PIN for their soft tokens.
Cisco VPN client: 1. Connect 2. Provide username+token code 3. "Enter your new alphanumeric PIN.." message, PIN entered, OK 4. "Enter your new alphanumeric PIN.." message again, no place to enter PIN, just OK button. 5. User is disconnected.
iPhone: 1. Connect 2. Provide username+token code 3. "Enter your new alphanumeric PIN.." message, PIN entered, OK. 4. Nothing else happens, user is disconnected.
On the RSA server in the logs the following error can be seen:
"Authentication method failed, passcode format error"
Conditions: ASA 9.1.7 RSA authentication using SDI protocol. Client needs to set a new token PIN.
Workaround: Create new PIN using RSA self service portal.
Further Problem Description:
| |
Last Modified: | 29-APR-2016 | |
Known Affected Releases: | 9.1(7) | |
Known Fixed Releases: * | 9.5(2.7), 96.2(0.11), 97.1(1.31) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz46174 | Title: | ASA 9.1.7 : lose "match header destination-option" after upgrade | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: - In 'show runn' output, you will see that "match header destination-option" is not seen in config. In its place, you will see ""match header count gt".
Conditions: + Originally seen in ASA5520 running one of the available 9.1.7 interim images - 9.1.7.4 or 9.1.7.6. Assuming the same issue should be seen on ASA5505, 5510, 5540, and ASA5550 models also, since they use the same available images as used on ASA5520. + Configure ipv6 policy inspect with "match header destination-option"
i.e.
policy-map type inspect ipv6 V6-Inspect parameters match header routing-type range 2 255 drop log match header ah drop log match header destination-option
Workaround: - None, once ASA5520 on 9.1.7 image
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 9.1(7.4), 9.1(7.6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz23576 | Title: | ASA in Multicontext : Allocated memory showing high (invalid) values | |
Status: | Open | |
Severity: * | 3 Moderate | Description: | Symptom: Allocated Memory in use showing very high ( invalid values ). Please check the output below :
------------------ show memory ------------------ Free memory: 6622859551 bytes (74%) Used memory: 28697627072 bytes (26%) ------------- ------------------ Total memory: 8988893471 bytes (100%) ------------------ show memory detail ------------------ Free memory heap: 902034752 bytes (10%) Free memory system: 6622859551 bytes (74%) Used memory: Allocated memory in use: 28183824832 bytes (314%) Reserved memory (DMA): 513802240 bytes ( 6%) Memory overhead: 0 bytes ( 0%) ----------------------------- ------------------ Total memory: 8988893471 bytes (100%) Least free memory: 0 bytes ( 0%) Most used memory: 28697630432 bytes (319%)
Conditions: ASA running software version 9.5.2.6 configured in Multi context mode.
Workaround: na
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 9.5(2.6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy53516 | Title: | ASA corrupts data in TLS-Proxy with TLS version 1.2 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Phone registration/call through TLS-Proxy on ASA doesn't work
Conditions: 1. ASA is configured to do TLS-Proxy http://www.cisco.com/c/en/us/td/docs/security/asa/special/unified-communications/guide/unified-comm/unified-comm-tlsproxy.html
2. ASA establishes TLS connection with call manager on TLS version 1.2
Workaround: Force Call Manager to use TLS version 1.
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 9.3(2), 9.5(2.2) | |
Known Fixed Releases: * | 96.2(0.11), 97.1(0.14), 97.1(1.31) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtx68834 | Title: | Multiple Conns between VNMC and Virtual ASA | |
Status: | Terminated | |
Severity: | 4 Minor | Description: * | Symptom: Multiple Conns between VNMC and Virtual ASA
Conditions: VNMC is used to manage Virtual ASA
Workaround: none
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 100.7(17.11) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv93976 | Title: | NTP: Standby ASA sends NTP with source 0.0.0.0 if standby ip not set | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: A standby ASA in a failover pair may send NTP packets with a source IP of 0.0.0.0 if the interface those packets would normally leave from does not have a standby ip configured.
Conditions: This is seen in failover deployments where the NTP server facing interfaces does not have a standby IP in its configuration.
Workaround: Configure the standby ip address for that interface.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.67), 100.12(0.156), 100.13(0.125), 100.15(0.110), 100.16(0.20), 100.8(40.113), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCty17794 | Title: | Virtual ASA: interface redundant and redundant-interface cli not blocked | |
Status: | Terminated | |
Severity: | 4 Minor | Description: * | Symptom: interface redundant and redundant-interface cli not blocked
Conditions: trying to configure redundant interface on ducati
Workaround: none
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 100.7(13.56) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui04629 | Title: | Failed to read security parameters error during fn_syslog automation | |
Status: | Terminated | |
Severity: | 4 Minor | Description: * | Symptom: Errors are generated from the ASA when executing the 'clear config all' command.
Conditions: The errors occur when running automation scripts for several hours.
Workaround: Reload the ASA.
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 8.7(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz24083 | Title: | DOC: ASA, sysopt connection permit-vpn ACL bypass clarification | |
Status: | Open | |
Severity: | 4 Minor | Description: | Symptom: "sysopt connection permit-vpn" will bypass ACLs (in and out) on interface where crypto map for that interesting traffic is enabled, along with egress ACLs of all other interfaces but not ingress ACLs (i.e access-group out <...>) on the other interfaces.
Conditions: ASA with site-to-site tunnel setup and "sysopt connection permit-vpn" enabled
Workaround: In order to restrict traffic coming from the remote end of the tunnel, 1. restrict it on the remote end itself 3. Or use vpn-filters 2. Or disable "sysopt connection permit-vpn" and configure access-lists on the external interface to permit VPN traffic.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.6(0.100) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy25445 | Title: | Master shows slave interfaces as "up" when slave rejoining | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: If a slave unit in a cluster reboots, while it is rejoining, the master will show its interfaces as "up" instead of "init" for a short period of time.
The issue does not have functionality impacts.
Conditions: Cisco ASA running release 9.0 and later.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(6.184) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.130), 100.15(0.112), 100.8(40.114), 9.1(7.5), 9.4(2.101), 9.4(3), 96.1(1.77), 96.1(1.79) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua66518 | Title: | Help arp SYNTAX section misses "permit-nonconnected" entry | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Help arp misses permit-nonconnected entry in SYNTAX section.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(4), 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.13(0.121), 100.14(0.83), 100.14(0.84), 100.15(0.87), 100.15(0.90), 100.15(20.17), 100.15(20.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur99190 | Title: | show file info CLI not working for lfbff images | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: 'show file information' CLI does not display correct file size and version field for the lfbff.SSA type images.
Conditions: Output is displayed incorrectly for lfbff type images. ASA 5506 & 5508 platforms and Rest-API images use a file type of lfbff.
The output will look similar to this:
disk0:/asa100-12-0-96-lfbff-k8.SSA: type is image (ASA) [] file size is 147456 bytes
Other file types (cdisk.smp, zip files ) display the proper output.
Workaround: The fix has been submitted to display the file size of the lfbff.SSA files correctly. So that part of the issue has been resolved. The version field will not be displayed as a part of this CLI. An alternate CLI command to get the file version is: show version
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 1.0(1), 100.12(0) | |
Known Fixed Releases: * | 100.12(0.156), 100.13(0.124), 100.15(0.108), 100.16(0.19), 100.16(1.97), 100.16(14.1), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.49) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur80711 | Title: | dhcprelay enabled interface pops memory message when address is assigned | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: dhcprelay enable interface when enabled pops memory message "No memory for DHCP interface ''
Conditions: ASA in multicontext mode.
Workaround: None, but this is a benign message
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(2) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.128), 100.15(0.112), 100.8(40.114), 9.4(2.99), 9.4(3), 9.6(0.99), 96.1(1.66), 96.2(1.118) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua71298 | Title: | Help arp in context shows arp permit-nonconnected | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Help arp in admin and user contexts shows arp permit-nonconnected entry, which is only available in system context.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.114), 100.14(0.79), 100.15(0.56), 100.15(17.24), 100.15(3.77), 100.15(8.18), 100.16(0.4), 100.16(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy48004 | Title: | ASDM detects a config change when dACL is pushed for Anyconnect user | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: ASDM detects a configuration change on the ASA when an Anyconnect user connects to it pushing a dynamic ACL to the box.
ASDM requires a refresh to load current config from the ASA
Eg: ASDM logs show
User 'aaa-acl', running 'N/A' from IP 10.1.1.2, executed 'access-list DAP-ip-user-00D02A08 extended permit icmp any4 any4'
Conditions: ASA 9.4.2 ASDM 7.5.1 dACL entries does not appear in the config
Workaround:
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: * | 96.2(0.10), 97.1(0.14), 97.1(1.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07393 | Title: | "sysopt traffic detailed-statistics" is removed after ASA reload | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: ASA command "sysopt traffic detailed-statistics" turns off automatically after reload
Conditions: 1. ASA is configured with 'sysopt traffic detailed-statistics' 2. The ASA is reloaded
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv96380 | Title: | Failover uptime sync failure | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: ASAs running in Failover, Failover up time doesn't sync up to match on both the ASAs.
Conditions: ASAs in failover with huge number of contexts in a multicontext setup.(108 context in my setup)
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(4), 9.1(4.5), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.107), 100.14(0.77), 100.15(0.36), 100.15(17.12), 100.15(3.61), 100.15(8.15), 100.16(0.2), 100.16(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut06553 | Title: | ASA - PBR Debug Output Shows HEX representation of DSCP Value w/o '0x' | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: The ASA policy-based routing debug output shows the HEX representation value and not the decimal value. This causes confusion since it looks like a decimal value due to the fact that the '0x' header is omitted. This is a cosmetic bug to modify the output so that the '0x' is printed in the output so that it's obvious that it is a HEX representation of the DSCP value.
Conditions: Using 'debug policy-route' to verify functionality of PBR on an ASA and viewing DSCP values
Workaround: N/A - this is a cosmetic issue.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37), 100.15(6.22), 100.15(8.13), 9.4(1.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua66557 | Title: | arp permit-nonconnected not indented in help arp multiplei mode | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: Help arp in multiple mode has incorrect indentation for "arp permit-nonconnected" entry.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy11892 | Title: | ASA ICMP inspect fails to inspect multiple packets within one milisecond | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: ASA ICMP inspection does not work if multiple packets are sent within one milisecond.
Conditions: ASA with ICMP inspection
Workaround: None
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 9.1(6.8) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz22604 | Title: | SAML:Getting Forbidden message in UI | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: Connect to SAML Idp profile and it redirects to idp page .dont close the browser.
Now Again reconnect to the profile and do cancel before it redirects to Idp page 2nd time.
Getting Forbidden message in UI while I cancel VPN Establishment during idp redirection.(Username/pwd page)
Conditions: Connect to SAML Idp profile and it redirects to idp page .dont close the browser.
Now Again reconnect to the profile and do cancel before it redirects to Idp page 2nd time.
Getting Forbidden message in UI while I cancel VPN Establishment during idp redirection.(Username/pwd page)
Workaround: Close the existing browser
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: * | 9.7(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy36536 | Title: | Transparent Firewall: Need ability to switch 802.2 LLC with DSAP 0xe8 | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Packets with 802.2 LLC header with most LSAP are not able to traverse firewall through transparent mode.
Conditions: Transparent Firewall Mode. Generic 802.2 LLC packet
Workaround: None
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | EVERCLEAR | |
Known Fixed Releases: * | 96.2(0.1), 96.2(1.145), 96.2(11.1), 97.1(0.7), 97.1(1.9), 97.1(2.6), 97.1(3.4), 97.1(5.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu54582 | Title: | ASA-SFR, ASA should attempt to join Cluster after SFR service module up | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom: With an ASA 5585 cluster configured, and with the service card health checks enabled, when the ASA and SFR are both rebooted, sometimes the slave ASA is booted out of the cluster, since it attempts to join the cluster when the SFR is not finished booting, and therefore fails the health check.
On the master, the following messages are seen: Cluster unit EDGE2 transitioned from DISABLED to SLAVE Asking slave unit EDGE2 to quit due to Security Service Card health check failure, and its Security Service Card state is CLUSTER_SSM_DOWN FROM EDGE2: Unit is kicked out from cluster because of SSM card health check failure.
Conditions: With ASA 5585 clustering enabled, and both ASA and SFR are booting up at the same time, if the SFR takes longer to boot than the ASA.
Workaround: Manually add the ASA into the cluster once the SFR is finished booting. Check when SFR is ready by running 'show module' and ensuring that both the control and data plane for SFR are up.
# conf t # cluster group # enable
Further Problem Description:
| |
Last Modified: | 30-APR-2016 | |
Known Affected Releases: | 100.14(0.22) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus85257 | Title: | ASA Connector - Provide Higher Layer Health Checks for CWS Tower | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: The ASA may not failover to the backup CWS tower when the CWS tower is in a degraded state but remains responsive to ASA TCP health checks. This may cause traffic interruption in the network environment when the ASA continues to redirect web traffic to the degraded tower. This is an enhancement request to provide more granular health checking between the ASA and the CWS tower.
Conditions: This can occur if the CWS tower is degraded (not down) but is still able to complete the 3-way TCP handshake with the CWS tower.
Workaround: Manually point the ASA to the backup CWS tower
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.68), 100.12(0.157), 100.13(0.128), 100.15(0.112), 9.2(3.160), 9.2(3.161), 9.2(4.6), 9.4(2.99), 9.4(3), 9.6(0.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuz19763 | Title: | FTD inline set need delay to avoid port flap with link state propagation | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: With Inline set configured in FTD, if the neighboring device takes a while to bring the link up after the FTD has brought it up, the FTD can bring the link down before that and that can lead to a forever loop of link coming up and going down. this is an enhancement request being filed to introduce a configure delay timer before deciding a link is down especially with link state propagation enabled.
Conditions: None.
Workaround: NA
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | DULCE_VIDA | |
Known Fixed Releases: * | 7.3(0)TSH(0.99), 96.2(11.12), 97.1(0.12), 97.1(1.25), 97.1(3.6), 97.1(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz82865 | Title: | SNMP MIB: Equivalent of "show xlate count" command | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Need SNMP MIB support to allow polling to get the equivalent to the "show xlate count" command.
Conditions: Cisco ASA running release 8.4.4 with SNMP enabled.
Workaround: None.
Additional Information: Will add cnatAddrBindNumberOfEntries and cnatAddrBindSessionCount OID's to support xlate_count and max_xlate_count. | |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 100.7(6.77), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.12(0.156), 100.13(0.127), 100.13(0.58), 100.13(28.2), 100.13(29.28), 100.14(0.13), 100.14(0.5), 100.14(1.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtw80509 | Title: | add "show resource usage summary count all 1" to show tech | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Add "show resource usage summary count all 1" to the show tech.
Conditions: This is a request to add "show resource usage summary count all 0" to the show tech output so more information regarding xlates, conns, inspects, syslogs, etc can be evaluated as part of the show tech snapshot. This information would also be helpful in diagnosing performance issues and would be useful to have as part of the show tech portion of the show crashinfo.
Workaround: None
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.2 | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq38206 | Title: | ENH: ASA show tech should include 'dir all-filesystems' | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Enhancement to add 'dir all-filesystems' to show tech output
Conditions: n/a
Workaround: n/a
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu22517 | Title: | ASA - SNMPv3 Traps not Generated for PC Link State in Multi-Context Mode | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: On an ASA running in multi-context mode with port-channels allocated to individual contexts, SNMP traps will not be generated when member interfaces of the port-channel go down although the following syslogs are seen in the context itself:
%ASA-6-426002: PORT-CHANNEL:Interface GigabitEthernet0/2 unbundled from EtherChannel interface Port-channel1 %ASA-6-426001: PORT-CHANNEL:Interface GigabitEthernet0/2 bundled into EtherChannel interface Port-channel1
Conditions: 1. Must be using an ASA in multi-context mode 2. Must have port-channels allocated to contexts with at least two member interfaces 3. Must be attempting to monitor the status of the member interfaces via SNMPv3 within the context
Workaround: it is possible to generate traps via the syslogs by using the 'snmp-server enable traps syslog' in conjunction with the 'logging history informational' command, however this causes a very large amount of traps to be generated. There is an ongoing investigation to determine if there are other, more suitable workarounds.
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 8.4(2), 9.1(5), 9.2(2.4) | |
Known Fixed Releases: * | 100.12(0.146), 100.13(0.98), 100.14(0.73), 100.15(0.116), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.3), 100.15(3.50), 100.15(6.33) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz39475 | Title: | ENH: ASA: memory size of FirePOWER software module is slightly decreased | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: After ASA software upgrades to 9.5(2) or later, by the change of ASA memory system, assigned memory size for FirePOWER software module will be slightly decreased. For example, URL filtering feature of particular model(e.g. ASA5515) will be affected by this assigned memory size change.
This is enhancement request of adding capability what customer can change to assign more memory size to software module.
Conditions: This issue is seen when upgrading ASA software version from 9.4 to 9.5(2) or later. ASA5500-X with FirePOWER software module will be affected.
Workaround: One of the followings. 1. Use 9.4 train latest ASA software version which supports FirePOWER version 5.4 or 6.0 2. Replace to more high memory model
Further Problem Description:
| |
Last Modified: | 27-APR-2016 | |
Known Affected Releases: | 9.5(2), 9.6(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz34836 | Title: | ASA does not show the reason for certificate installation failure | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: ASA does not show the reason for certificate installation failure. Only a generic fingerprint message about the failure is displayed.
Conditions: Failing to install a certificate (both in ASDM and CLI).
Workaround:
Further Problem Description: --
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(7), 9.4(3), 9.6(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz24909 | Title: | ENH: Add optional restart timer for NSF in regards to OSPF | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Manually configure the restart timer via NSF for OSPF, but unable to do so if using "nsf cisco"
Conditions: Using "nsf cisco" for OSPF
Workaround: use "nsf ietf"
Further Problem Description:
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz34821 | Title: | Lacking documentation of ASA requirements for certificates | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: There is no comprehensive document that deals with the ASA X.509 behavior / requirements. The focus should be here on the practical view of the ASA X.509, what are the expected fields and data types in them. Supported algorithms for signatures etc. should also be listed.
Information should be give for various implementations of certificates: - LAN-2- VPNs - AnyConnect SSL and IPSec - Certificates for Management Access ( ASDM, SSH, .. )
Conditions: ASA usage.
Workaround: None.
Further Problem Description: --
| |
Last Modified: | 26-APR-2016 | |
Known Affected Releases: | 9.1(7), 9.6(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux03842 | Title: | Implement SAML support Phase 2 | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: * Clientless WebVPN can not use SAML Identity Provider for authentication if it is in a private network.
Conditions:
Workaround: none
Further Problem Description:
| |
Last Modified: | 25-APR-2016 | |
Known Affected Releases: | 100.16(11) | |
Known Fixed Releases: * | 100.16(1.36), 100.16(14.1), 100.16(15.1), 100.16(15.5), 100.16(6.1), 96.2(0.1), 97.1(5.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua37902 | Title: | Some syslogs lost when using TCP based syslogging | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: If TCP syslogging is configured on the ASA, not all messages are sent to the syslog server if there is sufficient load as well as some connectivity issues between the ASA and the Syslog Server.
Conditions: The issue is seen only when using TCP based syslogging and a high rate of syslogs.
Workaround: Use UDP syslogging instead of TCP syslogging.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 21-APR-2016 | |
Known Affected Releases: | 8.4, 8.4(3), 8.4(3.130), 9.1(5) | |
Known Fixed Releases: * | 100.16(1.75), 100.16(1.81), 100.16(14.1), 9.1(2.220), 9.1(6.170), 96.1(6.1), 96.1(6.7), 96.2(0.1), 96.2(1.178), 96.2(11.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur30827 | Title: | Placeholder to commit CLNS compiled files | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Placeholder to commit CLNS compiled files
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 19-APR-2016 | |
Known Affected Releases: | 9.0 | |
Known Fixed Releases: * | 100.15(11.1), 100.16(1.8), 100.16(12.1), 9.6(0.99), 96.1(1.29), 96.1(1.57), 96.2(0.1), 96.2(1.107) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz16861 | Title: | ASA: Trustpoint fqdn command limited to 64 characters should be 255 | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Enhancement to increase the fqdn field to 255 characters.
ASA1(config)# crypto ca trustpoint TP1 ASA1(config-ca-trustpoint)# fqdn ?
crypto-ca-trustpoint mode commands/options: LINE < 65 char fully-qualified domain name none do not include fully-qualified domain name ASA1(config-ca-trustpoint)# fqdn
Conditions: None
Workaround: Create a certificate outside of the box and import via a pcks12.
Further Problem Description:
| |
Last Modified: | 14-APR-2016 | |
Known Affected Releases: | 9.1(7.160) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuz16102 | Title: | ASA:Incorrect memory and high memory overhead output in show mem detail | |
Status: | Other | |
Severity: | 6 Enhancement | Description: | Symptom: High Free Memory in global shared pool High memory overhead in "show memory detail" Incorrect "Free memory" usage in show memory
Conditions: High Free memory in Global Shared Pool due to fragmentation
Workaround: use "show memory detail" to find bytes allocated and Free memory available under each pool.
Further Problem Description:
| |
Last Modified: | 13-APR-2016 | |
Known Affected Releases: | 9.5(2.6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy84013 | Title: | FIPS SSH parameters not replicated to standby ASA | |
Status: | Other | |
Severity: * | 6 Enhancement | Description: | Symptom: In FIPS mode, some SSH parameters (ssh cipher encryption fips and ssh cipher integrity fips) are not automatically replicated to standby ASA. Even performing "write standby" on the active ASA the config is not synchroniuzed.
5585-40/sec/act# show run ssh ... ssh cipher encryption fips <------ not replicatd to standby ASA ssh cipher integrity fips <----- not replicated to standby ASA ssh key-exchange group dh-group14-sha1 5585-40/sec/act#
Conditions: ASA fips mode: "fips enable"
Workaround: Manually add the commands to the configuration , when the standby ASA becomes active to restore SSH admin access when in FIPS mode.
Further Problem Description:
| |
Last Modified: | 13-APR-2016 | |
Known Affected Releases: | 9.5(2.6) | |
Known Fixed Releases: | | |
|
| |
|
没有评论:
发表评论