Security Advisories & Responses - ASA 5500-X Series Next-Generation Firewalls
| | Title: | OpenSSL Alternative Chains Certificate Forgery Vulnerability (July 2015) Affecting Cisco Products | Description: | On July 9, 2015, the OpenSSL Project released a security advisory detailing a vulnerability affecting applications that verify certificates, including SSL/Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) clients and SSL/TLS/DTLS servers using client authentication. Multiple Cisco products incorporate a version of the OpenSSL package affected by this vulnerability that could allow an unauthenticated, remote attacker to cause certain checks on untrusted certificates to be bypassed, enabling the attacker to forge "trusted" certificates that could be used to conduct man-in-the-middle attacks. This advisory will be updated as additional information becomes available. Cisco will release free software updates that address this vulnerability. Workarounds that mitigate this vulnerability may be available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150710-openssl | Date: | 16-SEP-2015 | |
|
| | | | Title: | Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products | Description: | Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities that could allow an unauthenticated, remote attacker to cause a denial of service condition or perform a man-in-the-middle attack. On January 8, 2015, the OpenSSL Project released a security advisory detailing eight distinct vulnerabilities. The vulnerabilities are referenced in this document as follows: - CVE-2014-3571: OpenSSL DTLS Message Processing Denial of Service Vulnerability
- CVE-2015-0206: OpenSSL dtls1_buffer_record Function DTLS Message Processing Denial of Service Vulnerability
- CVE-2014-3569: OpenSSL no-ssl3 Option NULL Pointer Dereference Vulnerability
- CVE-2014-3572: OpenSSL Elliptic Curve Cryptographic Downgrade Vulnerability
- CVE-2015-0204: OpenSSL RSA Temporary Key Cryptographic Downgrade Vulnerability
- CVE-2015-0205: OpenSSL Diffie-Hellman Certificate Validation Authentication Bypass Vulnerability
- CVE-2014-8275: OpenSSL Certificate Fingerprint Validation Vulnerability
- CVE-2014-3570: OpenSSL BN_sql Function Incorrect Mathematical Results Issue
Cisco will release software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities may be available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl | Date: | 22-SEP-2015 | |
|
| |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | ASA for Application Centric Infrastructure (ACI) Device Package | Release Version: | 1.2.3.4
| |
| |
Alert Type: | New File | File Name: | asa-device-pkg-1.2.3.4.zip | File Description: | Cisco ASA Device Package 1.2(3.4) for Cisco APIC 1.2.2(I) | File Release Date: | 01-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580-x and ASA5585-x. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5580 and ASA5585. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.2.5 Interim
| |
| |
Alert Type: | New File | File Name: | asa825-58-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 8.4.7 Interim
| |
| |
Alert Type: | New File | File Name: | asa847-29-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and 5550. Please read the Release Note prior to downloading this release. | File Release Date: | 17-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2
| |
| |
Alert Type: | New File | File Name: | asa942-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 24-SEP-2015 | | | | |
Software Updates for ASA 5500-X Series Next-Generation Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.6 Interim
| |
| |
Alert Type: | New File | File Name: | asa916-10-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5580-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-SEP-2015 | | | | |
Known Bugs - ASA 5500-X Series Next-Generation Firewalls
| | |
Alert Type: | Updated * | Bug Id: | CSCuf31658 | Title: | Linux Kernel nfs_readdata_release() and nfs_writedata_release() Functi | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2011-4325
This bug was opened to address the potential impact on this product.
Conditions: Device with default configuration.
Workaround: Not currently available.
Further Problem Description: Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:W/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2011-4325 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0(1), 9.1(1), 9.2(1), 9.3(1), 99.1(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.8(40.100), 9.2(4.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu84085 | Title: | DHCP-DHCP Proxy thread traceback shortly after failover and reload | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: Crash as soon as the standby unit becomes primary
Conditions: DHCP configured on ASA running 9.1(6)5 or 9.1(6)6.
Workaround: Downgrade to 9.1(6)4
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.14(0.16), 100.14(0.30), 100.14(0.42) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.81), 100.14(0.49), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54), 100.15(3.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv69235 | Title: | HTTP chunked data causing watchdog | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: A watchdog traceback may occur on the ASA as it is processing HTTP traffic from WebVPN client connections.
Conditions: Cisco ASA running release 9.3.2 and later with WebVPN configured.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: * | 9.3(2), 9.5(1) | |
Known Fixed Releases: * | 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.32) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67965 | Title: | CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: ASA running 9.4.1 stops accepting IKEv2 connections.
Conditions: ASA5545 running 9.4.1 with certificate authentication for Windows Mobile phones. The ASA may print a pki debug message "CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached".
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.28), 100.14(10.23), 100.14(5.17), 100.14(7.33), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut10078 | Title: | Standby ASA does not apply OSPF route after config replication | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Standby unit was not following the OSPF routes that were replicated from the Active unit and installed in its routing table. For example, when trying to ping 10.202.7.135 from the Standby unit the ASA claimed it had no route to the host:
Conditions: OSPF configured on active/standby ASA 5555 pair running 9.1.5.21
Workaround: A 'write standby' from the Active unit to force a bulk sync fixes the problem, though the routing table doesn't seem to change. I was able to reproduce the problem several times
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.21) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq57307 | Title: | ASA 8.4 Memory leak due to duplicate entries in ASP table | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may experience a memory leak each time a VPN tunnel is built and torn down.
Conditions: The ASA must be configured with a QoS policy that matches on per-flow destination addresses for a particular tunnel-group. For example:
class-map vpn-class match flow ip destination-address <<<<<<<<<<<<< match tunnel-group 10.38.110.250 ! policy-map outside-policy class vpn-class police output 30000000
Workaround: Temporarily disable the QoS policy
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.11(0.58), 100.12(0.116), 100.12(0.121), 100.13(0.52), 100.13(0.63), 100.13(21.13), 100.13(21.9), 100.13(28.2), 100.13(29.28) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz98516 | Title: | Observed Traceback in SNMP while querying GET BULK for 'xlate count' | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA firewall may crash when being polled by SNMP in rare circumstances.
Conditions: This has been seen primarily in the 8.4.x ASA code train. The first fix is in ASA interim code 8.4.4.2. To trigger the bug, the ASA must be queried via SMP for GETBULK of the xlate OID:
1.3.6.1.4.1.9.10.77.1.2.1
Workaround: Stop polling the ASA firewall via SNMP until an upgrade to the fixed code can be performed or modify the OID's being polled by your SNMP monitor station to not include the affected OIDs. | |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.7(22.1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(28.2), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut92194 | Title: | ASA traceback in Thread Name: CP Processing | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA running version 9.3.2 is crashing intermittently on Thread Name: CP Processing.
Conditions: ASA is configured for Websense url filtering.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.19), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu78835 | Title: | Webvpn rewrite issues for Confluence - by atlassian on latest v6.4.5 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: On the latest atlassian version of 6.4.5 for Confluence, we have following issues when using it over clientless SSL:
1. For a new "create content" page, only the title of the page can be added, the body of the page is not editable. 2. When trying to add a comment, the body of the comment is missing, so cannot add anything.
Conditions: Using Atlassian version 6.4.5 for Confluence
Workaround: Use the older versions of Atlassian
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.8(40.67), 9.2(2), 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.57), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw38734 | Title: | ASA: Traceback in Thread Name Unicorn Admin Handler | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: ASA device traceback with the Thread Name:-
Conditions: ASA device configured with the Threat Detection enabled
Workaround: None at this time
Further Problem Description: None.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus62884 | Title: | ASA 9.1.5 does not always drop connections after receiving RST+ACK flag | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA does not always drop connections after receiving RST+ACK flag
Conditions: Verify that the problem occurs when the server receives duplicate packets from the client to the server and replies to both SYN
Example
Server packets
client -> server SYN (seq=3922308568) ------> 1st SYN client -> server SYN (seq=3922308568) --------> 2nd SYN client <- server SYN+ACK (seq=3220609139 ACK=3922308569) ------> reply for 1st SYN client <- server RST+ACK (seq=0 ACK=3922308569) ----------> reply for the 2nd SYN
Firewall packets
client -> server SYN (seq=3922308568) client <- server SYN+ACK (seq=3220609139 ACK=3922308569) ------> reply for 1st SYN client <- server RST+ack (seq=0 ACK=3922308569) ----------> reply for the 2nd SYN, which the Firewall doesn't have it
In the working and not working scenario the Firewall always sends one SYN packet.
Workaround: TCPbypass
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.115), 100.13(0.46), 100.13(21.7), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCti05769 | Title: | Migration of max_conn/em_limit to MPF is completely wrong in 8.3 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Migration to Modular Policy Framework may yield an incorrect configuration. This may result in loss of TCP Intercept protection against SYN floods coming from the outside as MPF limits are configured in incorrect direction. Protection against server overloading may also be lost because the migrated configuration incorrectly limits the number of outbound established connections from the server to the outside.
Conditions:
Workaround: Configuration, created by migration process, must be removed and limits must be set manually via MPF and in proper direction.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.3(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu45812 | Title: | asa Traceback with Thread Name idfw_proc | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: asa Traceback with Thread Name idfw_proc
Conditions:
Workaround: no workaround available currently
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut49034 | Title: | ASA: High CPU on standby due to RDP conn to AC client from CL SSL portal | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: CPU on standby ASA spikes to 100%
Conditions: Host (connecting through clientless VPN with RDP plugin)rdp to a host connected through anyconnect VPN. Stateful failover configured on an active-standby failover pair.
Workaround: None
Further Problem Description: High CPU on standby ASA unit due to a specific connection on the ASA from a host connecting to clientless VPN when stateful failover is enabled. Host (connecting through clientless VPN )rdp to a host connected through anyconnect VPN.
When this particular connection goes through the ASA, we find that the active ASA builds a single connection. standby ASA builds numerous connections with same source and destination ports. Connection on the primary/active: act/pri/alan3usv01# sh conn all add 66.241.60.197 | i 3389 TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:00, bytes 4131029, flags UO Connections on secondary:(close to 2500) stby/sec/alan3usv01# sh conn all add 66.241.60.197 | i 3389 TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:05, bytes 4131029, flags UO TCP outside 10.145.44.253:3389 NP Identity Ifc 66.241.60.197:62481, idle 0:00:06, bytes 4131029, flags UO
We see a lot of connection teardown on the standby for this connection. Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554151 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:02 bytes 252687 TCP Reset-O Mar 18 2015 22:12:34: %ASA-6-302014: Teardown TCP connection 27554254 for outside:10.145.44.253/3389(LOCAL\statiajj) to identity:66.241.60.197/10994 duration 0:05:01 bytes 252687 TCP Reset-O
We also see a lot of reset packets in asp drops in the standby ASA. 1: 19:00:25.358578 0000.0000.0000 0000.0000.0000 0x0800 Length: 54 66.241.60.197.62481 > 10.145.44.253.3389: R [tcp sum ok] 0:0(0) ack 0 win 0 (ttl 255, id 52738) Drop-reason: (mp-svc-no-channel) SVC Module does not have a channel for reinjection The interesting thing is the source MAC and the destination MAC is 0 in this ASP drop.
We see overruns on the failover interface of the standby unit. stby/sec/alan3usv01# show int gig0/3 Interface GigabitEthernet0/3 "failover1", is up, line protocol is up Hardware is i82546GB rev03, BW 1000 Mbps, DLY 10 usec Auto-Duplex(Full-duplex), Auto-Speed(1000 Mbps) Input flow control is unsupported, output flow control is off Description: LAN/STATE Failover Interface MAC address 5475.d091.518f, MTU 1500 IP address 10.99.101.114, subnet mask 255.255.255.248 432217782 packets input, 556229026142 bytes, 0 no buffer Received 556 broadcasts, 0 runts, 0 giants 204523310 input errors, 0 CRC, 0 frame, 204523310 overrun, 0 ignored, 0 abort And we see a lot of packets being transferred from active to standby ASA.
In the failover debugs we only find the following messages in the debugs of fover rx. lu_rx: HA TRANS: receive message for client vpnfo, length 48 lu_rx: HA TRANS: receive message for client vpnfo, length 72 lu_rx: HA TRANS: receive message for client vpnfo, length 72
The CPU profiler points that the high CPU on the standby ASA is due to LU updates when we decode the CPU profile output from the standby ASA.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(2), 9.1(5.21) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.142), 100.12(0.148), 100.13(0.106), 100.13(0.95), 100.14(0.71), 100.14(0.76), 100.14(16.8), 100.14(5.32), 100.14(5.33) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut27332 | Title: | ASA traceback in aaa_shim_thread / command author done for dACL install | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: 1. ASA traceback in aaa_shim_thread
2. ASA performs command authorization for downloadable ACL install. The VPN user is authenticated and authorized, but the dynamic ACL installation fails.
Conditions: 1. - ASA running 9.3.2, - High load with AnyConnect 3.0 or newer, - Heavy DAP or dynamic ACL usage with large aggregate ACLs, - Failover configuration,
2.
- VPN users have dynamic ACLs assigned, - command authorization is enabled - "aaa authorization command TACACS-Server"
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.13(29.28), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.16), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut12513 | Title: | ASA allows citrix ICA connection without authentication | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco ASA Clientless SSL VPN integration with Citrix includes the download of a .ica file from the Citrix server and serving this to the client. The .ica file includes a session token to connect to the Citrix server.
This file is stored on the client pc and deleted by the Citrix client once the session with Citrix is terminated.
If this file is copied on a different machine, it is possible to reuse this file to connect to the Citrix server via the Clientless SSL VPN feature without requiring authentication as far as the session of the user that initially authenticated to the Clientless SSL VPN Portal is still active.
Conditions: The file needs to be copied from the initial pc and the authenticated user session should still be active.
Workaround: none
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.13(29.28), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur20322 | Title: | ASA 9.2.1 - DATAPATH Traceback in L2 cluster environment | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA in an L2 cluster environment causes a DATAPATH traceback. The unit comes back up but will not join the cluster and results in an RPC_SYSTEMERROR failure. Manual joining into the cluster causes an immediate crash after entering "enable".
Conditions: ASA operating in 9.2.1 code and in multi-context. ASA in a cluster L2 environment.
Workaround: No workaround at this time.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.11), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv27197 | Title: | ASA SSLVPN RDP Plugin session freezes under heavy load with activex | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: RDP session freezes when a video is played over the session.
Conditions: 9.4.1 Plugins tested: RDP1 2014 RDP2 2009 win7
process intensive applications in the RDP session like a High definition video either played locally on the RDP machine or via youtube
Problem can be reproduced rather more consistently with Activex
We have also observed TCP window size filling up and TCP ZeroWindow in the packet capture that was taken between the RDP server and ASA
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.99), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.81), 100.15(16.3), 100.15(17.1), 100.15(3.49), 100.15(6.31) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv05386 | Title: | Clientless webvpn on ASA does not display asmx files | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Clientless user selects bookmark from webportal. The page does not display correctly, there is a portion of the page that is garbled or is missing text
Conditions: -Clientless user authenticates to the webportal, then selects bookmark that points to internal HTTP site. -The user see's garbled or incomplete text returned from the ASA.
Workaround: Smart Tunnel resolves the issue. Using the stand alone AC client resolves the issue.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.90), 100.14(0.68), 100.14(16.8), 100.14(5.32), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu87823 | Title: | ASAv traceback in DATAPATH when used for WebVPN | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAv traceback in DATAPATH when used for WebVPN
Conditions: ASAv running release 9.4.1 and configured for WebVPN
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.143), 100.13(0.95), 100.13(29.28), 100.14(0.71), 100.14(16.5), 100.14(5.30), 100.15(0.24), 100.15(1.68), 100.15(16.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv42413 | Title: | Dynamic Route Not Installed After Failover | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Dynamically learned routes that are not directly connected to the ASA are not installed in the routing table after failover to the standby ASA.
Conditions: - ASAs configured in failover pair - ASA configured for dynamic routing using OSPF - Network statements configured under the OSPF process for networks that are not directly connected
Workaround: Removing the network statements under the OSPF process for non-directly connected networks prevents this issue.
The issue is also resolved by manually clearing the OSPF process on the ASA (using the command: clear ospf process) after failover.
Further Problem Description: This issue was also observed using EIGRP as the dynamic routing protocol.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3), 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.90), 100.14(0.67), 100.14(16.8), 100.14(5.32), 100.15(0.21), 100.15(1.40), 100.15(10.4), 100.15(15.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut95793 | Title: | ASA: Anyconnect IPv6 Traceroute does not work as expected | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceroute does not work as expected while connected with anyconnect vpn client to ASA running software version 9.0(4)30. Traceroute completes but does not show intermediate hops, rather we see aestrick "*" for intermediate hops.
Conditions: Anyconnect 3.1.05170 ASA 9.0.4(30), 9.1(4)
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0(4.30) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.137), 100.13(0.93), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(15.11), 100.15(16.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv45756 | Title: | ASA may tracebeck when displaying packet capture with trace option | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback.
Conditions: ASA running 9.4(1) displaying captures with trace detail option.
Workaround: Avoid using trace detail option in captures.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.140), 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu39636 | Title: | Cert Auth fails with 'max simultaneous-login restriction' error | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: VPN Clients connections with Certificate Authentication fail with the following error:
[IKEv1]Group = , IP = X.X.X.X, Session terminated due to 'X' max simultaneous-login restriction.
Conditions: VPN Cients with Certificate Authentication
ASA running 9.1.6 or later
Workaround: Use PSK and X-Auth for authentication Downgrade to a non-affected version
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur99653 | Title: | Codenomicon HTTP-server suite may cause crash | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Codenomicon HTTP-server suite may cause crash
Conditions: Codenomicon server testing
Workaround: none
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.12(0.108), 100.13(1.10), 9.3(1.113) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.57), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus63993 | Title: | ASA - Traceback in thread name: CERT API | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback with thread name CERT API when trying to connect to ASA with AnyConnect Client.
Conditions: NA
Workaround: NA
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(2.4), 9.2(3) | |
Known Fixed Releases: * | 100.11(0.56), 100.12(0.115), 100.13(0.44), 100.13(20.12), 100.13(21.7), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu31751 | Title: | ASA OSPF database not reflect changes | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: shut down interface from R3 did not reflect routing table on R#1 as ASA ospf database did not reflect changes. but routing table on ASA reflect properly. seeing same issue only in 9.2 or 9.3 but not in 9.1
R#1 <-ospf area 2--> ASA <--ospf area 0---> R#3
sh route ospf O 10.20.20.0 255.255.255.0 [110/11] via 192.168.1.97, 00:32:33, backbone
ASA# sh ospf database 10.30.30.0 Summary Net Link States (Area 1)
Link ID ADV Router Age Seq# Checksum 10.30.30.0 1.1.1.1 1939 0x80000001 0xa245
Summary Net Link States (Area 2)
Link ID ADV Router Age Seq# Checksum 10.30.30.0 1.1.1.1 1939 0x80000001 0xa245
R1#sh ip route 10.30.30.0 Routing entry for 10.30.30.0/24 Known via "ospf 10", distance 110, metric 12, type inter area Last update from 192.168.1.50 on GigabitEthernet0/0/0, 00:29:13 ago Routing Descriptor Blocks: * 192.168.1.50, from 1.1.1.1, 00:29:13 ago, via GigabitEthernet0/0/0 Route metric is 12, traffic share count is 1
Conditions: Only seeing 9.2.x or 9.3.x (tested on 9.2(3), 9.2(3)4 and 9.3(3)) but it works fine on 9.1 (tested 9.1(5)21 and 9.1(6)1
Workaround: clear ospf x process
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 108.2(0.7) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw41374 | Title: | ASA: Distribute ACL not matching prefix correctly for filtering routes | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: Route Filtering not working and distribute ACL not matching prefix correctly
Conditions: Distribute list using standard ACL configured for filtering routes
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 26-SEP-2015 | |
Known Affected Releases: | 9.1(6.8) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus27650 | Title: * | Cut Through proxy not working correctly with TLS1.2 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cut Through Proxy and TLS Proxy may fail to function when using TLS1.2.
Conditions:
Workaround: None
Further Problem Description:
| |
Last Modified: | 28-SEP-2015 | |
Known Affected Releases: | 100.13(1.32), 9.3(2) | |
Known Fixed Releases: | 100.12(0.130), 100.13(0.80), 100.13(29.28), 100.14(0.43), 100.14(16.1), 100.14(5.20), 100.14(7.40), 100.15(0.16), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw42801 | Title: | ASA standby node crashing continuously | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA standby failover pair running 8.2.5.7 in multiple-context is crashing continuously with Stack Trace function.
Conditions: ASA standby failover pair running 8.2.5.7 in multiple-context
Workaround: None.
Further Problem Description:
| |
Last Modified: | 28-SEP-2015 | |
Known Affected Releases: | 8.2(5.7) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw26991 | Title: | ASA: Traceback in Thread Unicorn Admin Handler due to Threat Detection | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device traceback in Unicorn Admin Handler possibly due to Threat Detection configured on the ASA device
Conditions: ASA device configured with Threat Detection
Workaround: Disabling the Threat Detection is a possible workaround for this issue
Further Problem Description:
| |
Last Modified: | 28-SEP-2015 | |
Known Affected Releases: | 9.3(2.2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv87150 | Title: | ASA crash in Thread Name: fover_parse (ak47/ramfs) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA 5525 running version 9.5(1) crashing in Thread Name: fover_parse (ramfs)
Conditions: ASA is in failover pair.
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 28-SEP-2015 | |
Known Affected Releases: | 9.4(1.5), 9.5(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv96011 | Title: | OSPF over IKEv2 L2L tunnel is broken on ASA with 9.2.1 onwards | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: OSPF over IKEv2 L2L tunnel is broken on ASA in 9.2(1) onwards. Routes are installed into OSPF database successfully, but they are absent in the main routing table.
Conditions: -IKEv2 L2L configured to propagate routes over OSPF on ASA running 9.2.1 or above.
Workaround: -Downgrade the ASA to 9.1(5), if an option. -Use IKEv1 tunnel
Further Problem Description: None
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.2(1), 9.3(3), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15), 9.2(4.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus10787 | Title: | Transactional ACL commit will bypass security policy during compilation | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Traffic can bypass the security policy when transactional-commit access list is configured. This can happen only when a new ASA is added to a cluster and the access-list configuration is newly applied. The bypass can happen only during the compilation time. Additionally interface security policy will still be respected so no traffic will be passed from an interface with lower security level to an interface with higher security level.
Conditions:
Cisco ASA Software is affected by this issue if the transactional-commit access list feature is enabled. This can be determined by using the show running-config asp rule-engine transactional-commit access-group command and verifying that it returns output. The following example shows a Cisco ASA configured with transactional-commit feature:
ciscoasa# show running-config asp rule-engine transactional-commit access-grou$ asp rule-engine transactional-commit access-group
Note: Transactional-commit feature is not configured by default.
Workaround: There is no workaround other then disabling the feature
Further Problem Description: A vulnerability in the transactional-commit access list feature of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass interfaces access control policies and send traffic through the affected system.
The vulnerability is due to improper implementation of the feature. . An attacker could exploit this vulnerability by sending traffic through the affected system while the system boot for the first time or while an affected system join a cluster. Additionally interface security policy will still be respected so no traffic will be passed from an interface with lower security level to an interface with higher security level. An exploit could allow the attacker to send traffic through the system bypassing the interfaces access control policies.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.1: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 9.1(6.180), 9.1(6.181), 9.1(6.182), 9.1(6.183) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu61573 | Title: | 9.5.2 Gold Setup - Traceback in DATAPATH-6-2596 snp_fp_get_frag_chain | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback on slave unit in cluster after running large amounts of fragmented traffic through the device.
Conditions: Cisco ASA running release 9.1.6 in a 4-node cluster configure for L2 mode.
Workaround: None
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 100.13(0.31), 100.15(1.11), 9.0(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv80223 | Title: | ASA Rest-API fails to start with command authorization enabled | |
Status: | Terminated | |
Severity: | 2 Severe | Description: * | Symptom: REST-API will show as enabled but calls will fail with an internal error.
Conditions: ASA configured with REST-API agent and command authorization also enabled.
Workaround:
Further Problem Description: If "aaa authorization command" is configured, the REST Agent requires that an "enable_1" user with privilege 15 is present on the ASA. This is the account the REST Agent is using to communicate with the ASA, when it attempts to load and parse the ASA's configuration initially, and whenever the ASA's configuration changes.
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.3, 9.4 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw44744 | Title: | Traceback in WebVPN rewriter | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback while processing WebVPN connections in the rewriter
Conditions: ASA 5585 running special release 9.3.3.225.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw45910 | Title: | Traceback during SMBFS unmount | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: Traceback during SMBFS unmount
Conditions: Cisco ASA running special release 9.3.3.225
Workaround: None.
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv66333 | Title: | ASA picks incorrect trustpoint to verify OCSP Response | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may fail to verify a valid OCSP response during OCSP revocation check for VPN clients.
Conditions: Revocation check is enabled under the trustpoint using OCSP and an override using cert-map is not configured
Workaround: None
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.13(0.110), 100.15(0.48), 99.2(2.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus78450 | Title: * | ASA cert validation fails when suitable TP is above the resident CA cert | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: When a client tries to authenticate by sending the cert chain, in this case Client-ID and Sub-CA certificate, because the Sub-CA TP has "no validation-usage" configured, ASA picks up Root-CA TP to validate the certificate chain.
When such a condition occurs, where the validating trustpoint is higher in the hierarchy compared to the highest CA certificate [sent by the client in the certificate chain] resident on the ASA.
Conditions: ASA running on a version that contains the fix for CSCuq53421 such as 9.1(5)15, 9.3(2), 9.4(1). Also, the client certificate is issued at least by a first level Sub-ordinate CA. i.e the client certificate hierarchy should be at least 3 levels: Root -- Sub --- Client-ID
ASA is configured to authenticate clients using their ID certificate.
ASA would have Sub and Root CA loaded. ASA should end up picking Root CA TP in order to validate the client cert chain. For example: the Sub-CA TP could have "no validation-usage" configured
Workaround: Make sure the validating trustpoint is the same as the highest CA in the client certificate chain
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.1(5.16) | |
Known Fixed Releases: | 100.11(0.58), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCsd74902 | Title: | webVPN native browsing can't browse some pages | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | ASA webvpn native browsing.Browse to some links failed.
Version 7.1(1) and 7.0(4) has been tested,all have problem.
################################################################################# I opened this bug 9 years ago when I was in TAC. I'm not working in TAC or support ASA now. Not sure if this problem still happens. Could you please help to close this bug?
Symptom:Client from outside can browse server,but on certain page,when set per page lines to 19,failed to browse further;if set per page 18 lines or lower,can browse.Client from inside can browse the server without problem.
The symptom is consistent. Conditions:Tested with set the server's Nic mtu to very low(393) and also "sysopt conn tcpmss 1000". Workaround:No.
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 7.1(1) | |
Known Fixed Releases: | 7.1(2), 7.2(1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus11465 | Title: | ASA teardown connection after receiving same direction fins | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: ASA version 9.2.2.4 or 9.3.1 will teardown tcp connection after it receiving fin ack fin ack of the same direction
Conditions: ASA version 9.2.2.4 or 9.3.1 receiving fin ack fin ack of the same direction
Workaround: using tcp bypass
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 9.2(2), 9.3(1) | |
Known Fixed Releases: | 100.11(0.55), 100.12(0.111), 100.13(0.22), 100.13(19.9), 100.13(20.10), 100.13(21.7), 100.14(0.2), 100.14(1.2), 100.14(12.1), 100.14(2.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCup94968 | Title: | ASA Traceback in Thread Name: IP Address Assign | |
Status: | Terminated | |
Severity: | 2 Severe | Description: * | Symptom: ASA reloads with a traceback in thread name IP Address Assign
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 9.1(5.10) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCtq43504 | Title: | ASA: Traceback in SSH thread when removing manual NAT rule | |
Status: | Terminated | |
Severity: | 2 Severe | Description: | Symptoms When removing a manual NAT rule from the ASA's configuration, the ASA may crash and reload with a traceback in the SSH thread.
Conditions:
The user must be removing a manual NAT rule from the configuration with the following characteristics:
1. The destination portion of the rule must contain an object with a large range of addresses and 2. The rule must contain a service object
Workaround:
This issue is no longer reproducible on 8.4.4.1 and higher.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 8.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCur81376 | Title: | ASA traceback in Thread Name: ci/console, assertion "snp_sp_action.c" | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | ASA tracebacks in Thread Name: ci/console or Thread Name: Unicorn Admin Handler, assertion "snp_sp_action.c" while configuring dns inspection.
<B>Conditions:</B> So far this has only been observed while making changes dns inspect related configuration.
<B>Workaround:</B> N/A
<B>Further Problem Description:</B> PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 9.1(5.100), 9.3(1) | |
Known Fixed Releases: | 100.11(0.55), 100.12(0.111), 100.13(0.15), 100.13(1.36), 100.13(19.9), 100.13(21.6), 100.13(23.4), 100.13(24.4), 100.8(40.94), 9.0(4.31) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72094 | Title: | XMLSoft libxml2 XPath Evaluation Remote Denial of Service Vulnerabilit | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2011-2821
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:W/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2011-2821 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72091 | Title: | XMLSoft libxml2 String Substitutions Remote Denial of Service Vulnerab | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-0338
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-0338 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72093 | Title: | XMLSoft libxml2 XPath Handling Denial of Service Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2011-2834
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:UC
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2011-2834 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72045 | Title: | Info-ZIP Unzip Uncompressed Extra Fields Integer Underflow Vulnerabili | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-8140
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:W/RC:UR
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-8140 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72044 | Title: | Info-ZIP UnZip Zip64 Files Buffer Overflow Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-8141
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:U/RC:UR
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-8141 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72102 | Title: | Linux Kernel TCP Sequence Number Generator Packet Injection Vulnerabil | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2011-3188
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2011-3188 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72054 | Title: | Linux Kernel EXT4 Filesystem Denial of Service Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-0275
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2015-0275 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 1.1(2), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72048 | Title: | Info-ZIP UnZip Uncompressed Extra Fields Buffer Overflow Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-9636
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:W/RC:UR
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-9636 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72050 | Title: | Linux Kernel XFS Attribute Handling Privilege Escalation Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-0274
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2015-0274 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 1.1(2), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72104 | Title: | Linux Kernel shmid_ds Structure Local Information Disclosure Vulnerabi | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2010-4072
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 1.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:P/I:N/A:N/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2010-4072 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCun45787 | Title: | Duplicated CHILD SAs in 1 IKEv2 SA, traffic dropped vpn-overlap-conflict | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When the below condition matches, ASA may end-up creating multiple SPI-sets for a single proxy-id set. i.e. Multiple IPSec SAs or Child-SAs are created for the same local and remote Subnets/Idents.
Note that this only occurs for the second or the subsequent Child-SA negotiations, barring the first Child-SA created during IKE-AUTH.
When this occurs, ASA drops the traffic over this SA with "vpn-overlap-conflict" asp drop reason [show asp drop].
Conditions: ASA acting as IKEv2 L2L End-point, where we have more than one IPSec SAs negotiated. IKEv2 SA goes down, and re-negotiates due to an external comm-failure.
Workaround: Clear the SA and make sure that the race condition does not occur
Further Problem Description: Note that there are no duplicate crypto acl entries [aka procy-identities], and if it exists, this scenario does not apply and it is not supported
| |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: * | 100.12(30.8), 9.1(4) | |
Known Fixed Releases: | 100.11(0.54), 100.12(0.98), 100.12(23.4), 100.12(24.3), 100.12(30.2), 100.13(0.11), 100.13(1.3), 100.13(11.19), 100.13(12.40), 100.13(16.18) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuv72064 | Title: | Network Time Protocol Daemon Authentication Bypass Vulnerability | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-9296
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-9296 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 1.1(2), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv11566 | Title: | ASA LDAP CRL query baseObject DN string is malformed | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In the following example configuration, notice that the LDAP DN String for CRL query is: CN=TAC CA KRK 10,o=VPN TAC,c=Pl
Instead the ASA sends: CN=TAC CA KRK 10,o 20TAC,c,c=Pl
Since the LDAP Query is malformed, the CRL check will fail
Conditions: ASA 9.3 and above configured to perform CRL validation of Peer certificates using LDAP.
Example: crypto ca trustpoint Praveen revocation-check crl policy static url 1 ldap://10.48.62.208:389/CN=TAC%20CA%20KRK%2010,o=VPN%20TAC,c=Pl
Workaround: None. CRL check using HTTP continues to work
Further Problem Description: This issue occurs when the LDAP query url contains white-spaces encoded as %20
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 10-SEP-2015 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: * | 100.12(0.137), 100.13(0.91), 100.14(0.68), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4), 100.15(2.75), 100.15(3.20), 100.15(4.25) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw19520 | Title: | ASA cluster crash with Thread Name: ci/console on show int ip br | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptom: ASA in cluster crash with Thread Name: ci/console on issuing command show int ip br within a context.
Conditions: L2 clustering should be enabled on the ASA.
This happens when nameif is not applied on a L3 interface while it has cluster pool IP and IP address configured.
Workaround: To work-around the issue, apply the nameif to the interface.
Further Problem Description:
| |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur45455 | Title: | ASA crashes in DHCPV6 Relay agent feature Functionality | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: ASA may crash in thread name DHCPv6 Relay
Conditions: This can be triggered by malformed DHCPv6 packet when DHCPv6 relay is configured. To verify whether this feature is configured, use the show run ipv6 dhcprelay and confirm that the feature is enabled on at least one interface. The following example shows DHCPv6 relay feature enabled on the outside interface:
asa#show run ipv6 dhcprelay ipv6 dhcprelay enable outside
Workaround: Further Problem Description: A vulnerability in the DHCP relay function of Cisco ASA Software could allow an unauthenticated, adjacent attacker to cause a reload of the affected system.
The vulnerability is due to insufficient validation of crafted DHCP packets. Only Cisco ASA configured as DHCP version 6 relay are affected by this vulnerability. An attacker could exploit this vulnerability by sending crafted DHCPv6 packets through the affected system.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5.7/4.7: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-0578 has been assigned to document this issue.
Additional details about the vulnerability described here can be found at: http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0578
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 16-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.54), 100.12(0.103), 100.12(24.5), 100.12(30.2), 100.13(0.12), 100.13(1.13), 100.13(11.23), 100.13(16.22), 100.13(19.6), 100.13(20.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu45813 | Title: | ASA Name Constraints dirName improperly verified | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a dirName constraint, the ASA fails with the error: CERT-C: I pkixpath.c(2726) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv70576 | Title: | ASA: 1550 block depletion to due to L2L VPN traffic | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device 1550 Block depletion due to the L2L VPN Traffic
Conditions: ASA device configured with L2L VPN configuration
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6.6) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu73395 | Title: | Auth-prompt configured in one context appears in another context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Auth-prompt configured in one context appears in another context.
Conditions: ++ Device in multiple context. ++ More than one context. ++ More than on context with cut through proxy configured. ++ Only one context with custom auth-prompt.
Workaround: If auth-prompt is configured in all the contexts then there is no issue seen.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0(4.24), 9.1(4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(1.51), 100.15(15.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu84697 | Title: | ASA Traceback in Thread Name ssh/client | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA Traceback in Thread Name: ssh/client
Conditions: There are two known crashes: The first one is ASA using "copy scp://" CLI to communicate with an external SSH v1 server. SSH v1 is not a supported protocol when using scp on the ASA. The second one is when multiple simultaneous "copy scp://" CLI are issued on the ASA. There is a timing factor here. The crash can only be seen if two "copy scp://" CLI are issued on the ASA more or less at the same time. This can only be done through an automated script.
Workaround: For the first crash, make sure that the external SSH server is running SSH v2. For the second crash, it can be avoided if the automated script used does not start multiple concurrent "copy scp://" CLI on the ASA at the same tme.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6), 9.1(6.1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.87), 100.14(0.66), 100.14(16.3), 100.14(5.26), 100.15(0.20), 100.15(1.34), 100.15(10.4), 100.15(2.73) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu04160 | Title: | snmpwalk causes slow memory leak on ASA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Free memory declines on ASA slowly over time. Free memory leaks
Conditions: ASA configured to allow SNMP polling. NMS is snmp walking the ASA
Workaround: Disable SNMP on the ASA Stop SNMP walking the ASA Reboot the ASA to clear up the memory leak
Further Problem Description: This may also cause a cpu-hog in qos_metric_daemon after some time.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.13(30.7), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.72), 100.13(21.13), 100.13(29.28), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.25), 100.14(7.23), 100.15(0.9), 100.15(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut15570 | Title: | Anyconnect SSL VPN certificate authentication fails o ASA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Anyconnect SSL VPN certifcate authentication fails o ASA
Conditions: -- certificate authentication -- in debug crypto ca the following error is observed:
CERT-C: I pkixpath.c(1170) : Error #72
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv88785 | Title: | RA validation failed when CA/subCA contains name constraints | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension ASA fails with the error:
CRYPTO_PKI: Found a subject match - inserting the following cert record into certList CERT-C: I pkixpath.c(2728) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received CRYPTO_PKI: Unable to read CA/RA certificates.Error processing auth response. Unable to send PKI request CRYPTO_PKI: transaction PKCSReq completed CRYPTO_PKI: status: Crypto CA thread sleeps!
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1), 9.4(1.100), 9.4(1.201) | |
Known Fixed Releases: * | 100.13(0.100), 100.14(0.74), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv12884 | Title: | Unable to authenticate with remove aaa-server from different context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Authentication error on a context when he removed aaa-server config from different context.
Conditions: -Some contexts is using same LDAP server.
Workaround: ASA reload
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.6(1), 9.1(5), 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.89), 100.14(0.67), 100.14(16.8), 100.14(5.32), 100.15(0.21), 100.15(1.38), 100.15(10.4), 100.15(15.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu56912 | Title: | ASA change non-default port to 443 for https traffic redirected to CWS | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA change non-default port to 443 for https traffic redirected to CWS
When user type in web browser url htts://X.X.X.X:YYYY debug scansafe generates ... Complete Connect Method (513) CONNECT X.X.X.X:443 HTTP/1.0 HOST: X.X.X.X:443 ...
For traffic captured on outside interface towards CWS tower in 'Follow TCP Stream' statistic Wireshark display CONNECT X.X.X.X:443 HTTP/1.0 HOST: X.X.X.X:443
Conditions: ASA is configured to redirect non-default port for https traffic to CWS.
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0, 9.1, 9.4 | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.13(29.28), 100.14(0.39), 100.14(16.1), 100.14(5.19), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv25327 | Title: | bgp ipv6 neighborship fails with ASA after hard reset on router | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: bgp ipv6 neighborship fails with ASA after hard reset on router
Conditions: ASA with 9.5.1 or above has this issue.
Workaround: Reset connection on ASA using clear ip bgp * command.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.14(0.61) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.85), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu32905 | Title: | ASA WebVPN: Javascript fails to execute when accessing internal portal | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: On an ASA running WebVPN, when a user clicks on internal portal page, java console logs the error "function expected" in cte.js.
Conditions: Issue was seen an replicated on ASA 9.1(5.21) and 9.1(6).
Workaround: None.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.8(40.67), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.26), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCze96017 | Title: | Active ftp-data is blocked by Firepower on Chivas Beta on 5512 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The system incorrectly processes data channels matching applied access control, intrusion, and network discovery policies.
Conditions: Configure an ASA FirePOWER module running Version 5.0 or later with network address translation (NAT).
Workaround: 1. Create a policy to allow ftp-data traffic from Server to Client or 2. Use passive FTP
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12), 100.15(5.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq10239 | Title: | Windows 8 with new JRE, IE is not gaining access to smart tunnel | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: IE on windows 8 with java start is not gaining access to smart tunnel
Conditions: user is starting smart tunnel with java, UAC is turned on
Workaround: turn UAC off or use active-x to start smart tunnel
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(7) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut49111 | Title: | ASA traceback because of TD tcp-intercept feature | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Multiple crash has been observed on ASA with threat-detection statistics tcp-intercept enabled
Conditions: When threat-detection statistics tcp-intercept is enabled
Workaround: Disabling TD for tcp intercept statistics stops crash.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.13(29.28), 100.14(0.12), 100.14(10.17), 100.14(5.15), 100.14(6.27), 100.14(7.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu66218 | Title: | ASA is not correctly handling errors on AES-GCM ICV | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: A vulnerability in the AES-GCM code of Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to modify the contents of an encrypted IPSec or IKEv2 packet, and for those modifications not to be detected.
The vulnerability is due to an error on the firmware of the Cavium Networks cryptographic module. Due to this vulnerability, the ICV is not checked. An attacker could exploit this vulnerability by intercepting encrypted packets in transit and modifying their contents. Such packets would be decrypted by the ASA and then forwarded to their destination, without the modification being detected.
Please note that this vulnerability does NOT allow an attacker to decrypt the packets in transit, nor obtain information about the session keys being used for the security association.
This vulnerability does NOT impact SSL/TLS traffic originated or destined to the ASA.
Conditions: An IKEv2 or an IPSec policy using any of the following algorithms for data encryption: aes-gcm, aes-gcm-192, aes-gcm-256.
This vulnerability only applies to the following ASA models: ASA5506-X (all hardware models), ASA5508-X, and ASA5516-X.
Workaround: There is no workaround for customers whose security policy requires the use of AES-GCM.
For customers that can use an alternative encryption algorith, IKE or IPSec policies using AES-GCM could be changed to use instead AES.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4550 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3), 9.4(1.1) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 9.3(3.2), 9.4(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv01177 | Title: | ASA: traceback in IDFW AD agent | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA5585 in failover pair may traceback in IDFW process.
Conditions: ASA running IDFW features.
Workaround: Disable IDFW.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut28217 | Title: | Active ASA in failover setup reboots on its own | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Active ASA in failover setup reboots on its own.
Conditions: Active ASA in failover setup reboots on its own.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu97304 | Title: | SSL connection failing to WebVPN portal | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: access to webvpn portal broken
Conditions: try to access the webvpn portal via a browser
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.12(0.130), 100.14(0.39), 100.14(0.43), 100.14(0.46) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.13(29.28), 100.14(0.56), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12), 100.15(4.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu48626 | Title: | ASA - access list address argument changed from host 0.0.0.0 to host :: | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA changes the configured access-list address argument from "host 0.0.0.0" to "host ::"
Conditions: ASA version 9.3.2 and 9.3.3
Workaround: The check can be bypassed by using an object in the ACL: 1. Create a network object for host 0/0 object network HOST-0 host 0.0.0.0 2. Use this network-object in an extended access-list: access-list NAME extended permit ip object HOST-0 any
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.3(3) | |
Known Fixed Releases: * | 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut37974 | Title: | EIGRP authentication not working with simple pasword | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Routes are not learning after authentication MD5 in EIGRP, and EIGRP authentication key does not work with 16 char key
Conditions: ASA(9.1.3) running EIGRP with authentication
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.14(2.10), 100.14(4.12), 9.2(3.4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus84220 | Title: | ASA crashes for the OSPFv2 packets from codenomicon | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Cisco ASA crashes in thread name OSPF-3
Conditions: OSPFv2 configured and crafted packets are sent to the ospf interface
Workaround: none
Further Problem Description: A vulnerability in OSPFv2 code of Cisco ASA Software could allow an unauthenticated, adjacent attacker to cause the reload of the affected system.
The vulnerability is due to improper handling of OSPFv2 packets . An attacker could exploit this vulnerability by sending crafted packets to the affected system
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 6.1/5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-4239 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.13(0.21), 9.3(2.243) | |
Known Fixed Releases: * | 100.12(0.116), 100.13(0.51), 100.13(21.8), 100.14(0.3), 100.14(1.3), 100.14(10.7), 100.14(11.7), 100.14(2.8), 100.14(26.3), 100.14(3.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus32005 | Title: | ASA - Traceback in thread name SSH while applying BGP show commands | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in thread name SSH during performing BGP show commands.
Conditions: ASA running 9.2.2.4
Workaround: not known
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.56), 100.13(21.10), 100.13(29.28), 100.14(0.5), 100.14(1.4), 100.14(10.8), 100.14(11.8), 100.14(2.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus47259 | Title: | Cisco ASA XAUTH Bypass Vulnerability | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Due to a vulnerability in the IKEv1 code is it possible to bypass XAUTH authentication by sending crafted IKE messages
Conditions: This applies only to deployment configured with Remote VPN and IKEv1. The knowledge of the PSK or a valid certificate is needed to perform the attack.
This vulnerabilities affects only the following trains: - 7.x - 8.0 - 8.1 - 8.2 prior to 8.2.2.13
This issue has been fixed as part of another bug: CSCtg28821
Workaround: none
Further Problem Description:
A vulnerability in IKE version 1 code of Cisco ASA Software could allow an authenticated, remote attacker to bypass x-auth authentication and successfully login via IPsec remote VPN.
The vulnerability is due to improper implementation of the logic of the x-auth code . An attacker could exploit this vulnerability by sending crafted IKEv1 packets to the affected system. The attacker would need to know the tunnel group pre-shared-key or have a valid certificate in order to exploit this vulnerability. This vulnerability affects only Cisco ASA Software configured for IKEv1 IPSec remote access and IKEv1 IPSec Lan-to-Lan. An exploit could allow the attacker to bypass the authentication and gain access to the network via remote VPN.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4/3.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2015-0760 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.0(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.123), 100.13(0.68), 100.13(21.13), 100.13(29.28), 100.14(0.10), 100.14(10.13), 100.14(26.11), 100.14(5.14), 100.14(6.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv87744 | Title: | traceback in Thread Name: fover_parse | |
Status: | Other | |
Severity: | 2 Severe | Description: * | Symptom: ASA reloads in Thread Name: fover_parse
Conditions: ASA running 9.4.1.5 code.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu63656 | Title: | ASA not generating PIM register packet for directly connected sources | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Topology ------------ Sender ---> ASA(DR) ----> RP -----> Receiver
Running 9.2.1 or later on the ASA and the Sender is directly connected to the ASA (DR) Sender is behind ASA RP is in front of ASA ASA not sending PIM Register packet to RP
Conditions: running 9.2.1 or later
Workaround: downgrade to code 9.1.5
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1), 9.3(2), 9.4 | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.14(0.45), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut56198 | Title: | Clustering: Traceback in DATAPATH with transparent FW | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback occurred on one of the slave units in a 4 node cluster in the DATAPATH thread. Stack trace indicates that the ASA was doing a transparent firewall operation.
Conditions: Cisco ASA running release 9.2.1.213 and configured as a cluster slave with multi-context configuration which included mixed-mode contexts.
Workaround: None
Further Problem Description: Please see Eng-note.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1.213), 9.3(2.108) | |
Known Fixed Releases: * | 100.11(0.57), 100.11(0.58), 100.12(0.120), 100.12(0.121), 100.13(0.61), 100.13(21.12), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88437 | Title: | ASA5506-X:copy file operations fail with jumbo-frame-reservation config | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptom: Copy file operations fail with error when running these images (9.4.1.1, 9.4.1.2) on a ASA-5506-X, when the config is enabled for "jumbo-frame reservation". The error displayed is as below:
"Error writing disk0:/ (Cannot allocate memory)"
It doesn't matter what file you operate on , an asdm or an lfbff image , and whether you are copying ftp/tftp to disk0 or just simply copying a file on disk0://file to disk0://file1. I used asdm-732.bin image for this operation: "copy disk0:/asdm-732.bin disk0:/asdm1", which errors out with above error.
Conditions: Copying file operations to disk0 on a ASA5506-X.
Workaround: Remove the "jumbo-frame reservation" CLI config, reboot, and then copy operations succeed.Re-enable the CLI after copy operations are complete.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.14(0.47) | |
Known Fixed Releases: * | 100.13(0.81), 100.14(0.48), 100.14(0.49), 100.14(0.66), 100.14(16.1), 100.14(16.3), 100.14(5.23), 100.14(5.26), 100.14(7.42), 100.15(0.17) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus92856 | Title: | ASA traceback in DATAPATH Thread due to Double Block Free | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA reloads and generates crashinfo inThread DATAPATH Issue is specific to cluster with multi-context and interface sharing. Issue was exposed by fragmentation happening in shared interface
Conditions: Clustering is enabled on ASA
Workaround: Avoid using loopback/shared interface
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.13(29.28), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.24), 100.14(7.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus70693 | Title: | ASA 9.3.2 SSL doesn't work with error: %ASA-4-402123: CRYPTO: | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | After upgrade to 9.3.2 SSL VPNs stop working.
Symptom: SSL (either Web or AnyConnect cannot be establish) with the error from AnyConnect: "Could not connect to server. Please verify Internet connectivity and server address."
In the DART: Type : Error Source : acvpnui
Description : Function: ConnectMgr::run File: .\ConnectMgr.cpp Line: 674 Invoked Function: ConnectMgr::initiateConnect Return Code: -29622263 (0xFE3C0009) Description: CONNECTMGR_ERROR_UNEXPECTED
This errors are seen:
"%ASA-4-402123: CRYPTO: The ASA hardware accelerator encountered an error (Invalid PKCS Type, Pad, or Length, code= 0x1B) while executing the command PKCS1 v1.5 RSA Decrypt with CRT (> 1024 bits) (0x202)."
These errors are seen while debugs enabled: RC4-SHA / RC4-MD5 error:1415FFA5:SSL routines:SSL_accept:pkp error@ssl_engine.c:2838
AES256-SHA / AES128-SHA / DES-CBC3-SHA error:1415FFA5:SSL routines:SSL_accept:pkp error@ssl_engine.c:2639
Tests: + AnyConnect 3.1.05160 uses TLS 1.0 - fails + AnyConnect 4.0.00057 uses TLS 1.2 - fails + with IE TLS 1.0 - fails + with IE TLS 1.1/1.2 - fails + with Mozilla Firefox TLS 1.0 - fails but + Mozilla Firefox TLS 1.1/1.2 - work ok + Chrome also uses TLS 1.2 - works ok.
Conditions: ASA running 9.3.2 (the issue is not seen on the 9.3.1)
Certificate with: - RSA keys size: 2048 bits - Signature Algorithm: sha256RSA - Signature Hash Algorithm: sha256
It is not happening for all certificates, it has to be something specific in the certificate which hasn't been identified yet.
Workaround: + Downgrade + try to regenerate the certificate + for WebVPN use Firefox/Chrome and TLS 1.2
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu77207 | Title: | ASA - URL filter - crash on thread name uauth_urlb clean | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAs running URL filtering (Websense) and traffic redirection to the SFr module may experience a crash on the thread name uauth_urlb clean process.
Conditions: - Seen on 9.4.1 ASA code - URL filtering configured and being used - Higher amounts of traffic (500+ mbps) - Traffic redirection to the SFr module
Workaround: Possible temporary workarounds:
- Disable of the traffic redirection to SFr module - Disable URL filtering (websense)
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.95), 100.14(0.71), 100.14(16.8), 100.14(5.32), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv10938 | Title: | 'redistribute' cmds under 'router eigrp' removed on deleting any context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: 'redistribute' commands under 'router eigrp' removed from unrelated contexts when deleting any context with EIGRP configured and redistribution enabled. Error of following format is seen on ASA's console:
ERROR: unable to locate route-map
Conditions: 1. ASA is multiple context mode. 2. More than one context on the ASA has EIGRP enabled with redistribution configured. 3. Issue seen on deleting any of the contexts that meet the criteria in point 2 above using command "no context ".
Workaround: None apart from re-adding all those commands back manually.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.85), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq99821 | Title: | ASA/ASASM drops SIP invite packets with From field containing "" and \ | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASASM running version 9.1.4.6 with SIP inspection turned on, silently drops SIP INVITES that has the similar value in the from field:
"\"210*******\"" ;tag=SD7osu201-gK0d0f565b
Conditions: ASA/ASASM running 9.1.4.6 with SIP inspection turned on.
Workaround: disable SIP inspection.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(4.6) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.122), 100.13(0.67), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.41) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus53692 | Title: | ASA traceback in Thread Name: fover_parse | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may generate a traceback during failover synchronization in thread name fover_parse.
Conditions: This issue has been seen on ASA 5500x running 9.1(3), other versions may also be affected. WCCP ACL configured with either users, user group, or a fully qualified domain name object which is not supported.
Workaround: Remove ACL with users, user group, or a fully qualified domain name object from WCCP configuration.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(3) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.116), 100.13(0.51), 100.13(21.8), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.7), 100.14(11.7), 100.14(2.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut39985 | Title: | Per-session PAT RST sent to incorrect direction after closing session | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When Per-session PAT is configured, RST,ACK is sent to Non close initiator side after closing TCP session. It should be sent to close initiator side(The device which send FIN first).
xlate per-session permit tcp any4 any4 no xlate per-session deny tcp any4 any4
Conditions: Per-session PAT is configured like below
xlate per-session permit tcp any4 any4 no xlate per-session deny tcp any4 any4
Workaround: Disable Per-session PAT
xlate per-session deny tcp any4 any4
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1 | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.65), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw00971 | Title: | ASA truncates url-redirect at 160 chars for ra vpn clients (ISE 1.3+) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: --- URL redirect is not working for clients connected via ra vpn clients
The url redirect feature is used to support some ISE posture assessment flows
Conditions: --- ISE using the posture assessment feature ------ ISE 1.3 is more likely to require long url-redirect attributes --- ASA 9.2.1 and above (ISE posture assessment not supported on ASA versions <9.2.1) --- RA vpn client
Workaround: --- Use Anyconnect SSL VPN client
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1), 9.5(2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.146), 100.13(0.98), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.79), 100.15(16.3), 100.15(17.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu53928 | Title: | ASA does not set forward address or p-bit in OSPF redistrubution in NSSA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA can advertise OSPF routes to a peer with the p-bit disabled, and with a null forward address when in a Not so Stubby Area. This can cause the peer device to be unable to translate this LSA and forward it on to the rest of the topology.
OSPF Router with ID (10.0.0.50) (Process ID 1) Type-7 AS External Link States (Area 100)
LS age: 23 Options: (No TOS-capability, No Type 7/5 translation, DC) <--- LS Type: AS External Link Link State ID: 192.168.0.0 (External Network Number ) Advertising Router: 10.0.0.50 LS Seq Number: 80000001 Checksum: 0x791e Length: 36 Network Mask:255.255.0.0 Metric Type: 2 (Larger than any link state path) TOS: 0 Metric: 20 Forward Address: 0.0.0.0 <--- External Route Tag:
This condition occurs if the route that is advertised is directly connected, and that link comes up before the link that contains the OSPF neighborship.
Conditions: - ASA in an OSPF Not So Stubby Area - Redistributing Connected Routes - Observed in single and multiple context - Observed in failover mode or standalone mode
Workaround: - Clear OSPF Process on ASA with command "clear ospf process" - Bounce link of connected route that is being advertised incorrectly
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(1), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.13(29.28), 100.14(0.44), 100.14(16.1), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv39775 | Title: | ASA cluster-Incorrect "current conns" counter in service-policy | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Incorrect "currents conns" counter on service-policy ASA cluster. Does not match up with the current connection "show connection count" on the unit, will lead to traffic drops in the service-policy once the limit is hit in the service-policy.
Conditions: 1) ASA in a cluster setup. 2) Applies to both single or multiple mode. 3) Typical config : class connection_limit set connection conn-max 500000 embryonic-conn-max 2000 per-client-max 200 per-client-embryonic-max 50
Workaround: None.
Further Problem Description: CLSTR1-Primary/ASAFW# cluster exec show service-policy | i conns CLSTR1-Primary(LOCAL):************************************************ current embryonic conns 3, current conns 5732, drop 0
CLSTR1-Secondary:******************************************************* current embryonic conns 1, current conns 88720, drop 0 <<<< CLSTR1-Primary/ASAFW# cluster exec show conn count CLSTR1-Primary(LOCAL):************************************************ 5823 in use, 36602 most used Cluster stub connections: 3300 in use, 30142491 most used
CLSTR1-Secondary:******************************************************* 3270 in use, 120262 most used <<<<<<<<<<<<<<Cluster stub connections: 5794 in use, 5288523 most used
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(2), 9.2(2.4), 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(15.11), 100.15(16.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus56590 | Title: | ASA - Traceback in Thread Name: fover_parse | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Standby ASA would enter a boot loop after attempting to replicate the configuration from the Active member, generating a Trace back with the name : fover_parse
Standby ASA finishes the bulk sync in failover but never gives "sync config finished " message to active, this is the point where it reloads.
Conditions: ASA with failover
Versions : 9.3.2 and 9.4.1
Workaround: Go in to version 9.3.1, 9.3.2.104
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.4(1), 9.4(1.170), 9.4(1.175) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.11), 100.13(29.28), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus97061 | Title: | ASA Cluster member traceback in DATAPATH | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA crashed with DATAPATH thread.
Conditions: -> ASA5585 units running Clustering -> Release 9.2.3.2
Workaround: -> Crash is not experienced when transit interfaces have their MTU set as 9198.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3.2), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.120), 100.13(0.61), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu28909 | Title: | ASA cluster: ICMP loop on CCL for ICMP packet destined to the VPN tunnel | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In ASA cluster we may see a packet loop on the cluster control link. The loop is formed when we have ICMP error packet that should be going via a site to site VPN tunnel. Such packet may go into a loop and cause elevate CPU utilization on the ASA.
Conditions: +ASA cluster +site to site VPN tunnel configured +ICMP error packets destined to the VPN tunnel
Workaround: +deny icmp erros using an access-list on the data interfaces
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6.1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.17), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv57389 | Title: | ASA PKI: cert auth fails after upgrade to 9.1(6.4) / 9.1(6.6) / 9.1(6.8) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA running running 9.1(6.4) or 9.1(6.6) releases will fail to authenticate IKEv2/IPSec sessions using RSA-SIG for authentication.
The following error is generated in the IKEv2 debugs:
IKEv2-PROTO-2: (1): Verify peer's authentication data IKEv2-PLAT-1: (1): Failed to verify signature IKEv2-PROTO-1: (1): Failed to compute or verify a signature
Conditions: ASA running 9.1(6.4) or 9.1(6.6) and authenticating IKEv2/IPSec sessions using RSA-SIG.
This has only been observed when talking to an IOS Lan-to-Lan peer. Tests show IKEv2 Cert Auth with AnyConnect and ASA Lan-to-Lan peers is successful.
Workaround: A downgrade to 9.1(6.1) or 9.1(6) corrects the behavior. Preshared keys can also be used.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6.4), 9.1(6.6), 9.1(6.8) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.14(16.8), 100.14(5.32), 100.15(0.25), 100.15(16.3), 100.15(17.1), 100.15(3.44), 100.15(6.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv10258 | Title: | ASA5505 permanent base license, temp secplus, failover, vlan count issue | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Show version display 3 VLANs license instead of 20 if base license, timebased for security plus license are combined on ASA5505 platform after failover is enabled
Conditions: Three combined condition: 1. Permanent base license 2. Timebased Security Plus License 3. Failover is enabled
Workaround: No known workaround
Further Problem Description: The problem exhibit itself after a reboot. Looks like a variant of CSCtf91862
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.86), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.34), 100.15(2.73), 100.15(3.17) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur07369 | Title: | SXP Version Mismatch Between ASA & N7K with clustering | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: SXP connection cannot be established when ASA cluster is interacting with a SXP peer running SXP version 1 protocol.
Conditions: (1) ASA is running cluster with 2 or more units and (2) SXP peer is running SXP version 1 protocol and (3) SXP peer hash the SXPv1 request from the SXP peer to reach the slave unit of the ASA instead of the master unit.
Workaround: - Upgrade SXP peer to run SXP version 2 or above, or - Change the IP address used for establishing SXP connection so that the hash algorithm may direct the SXPv1 request from the SXP peer to the master unit of the ASA cluster instead of the slave unit.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.143), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.3), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus91636 | Title: | Adding subnet(s) to the object group for NAT causes high CPU | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The CPU spikes on an ASA when we add an object to an object group that is being used in NAT command.
Conditions: ASA 5585 running 8.4 and above code with a huge number of object groups configured and passing heavy traffic.
Workaround: None known yet.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.56), 100.12(0.114), 100.13(0.40), 100.13(20.12), 100.13(21.7), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.5), 100.14(11.5) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw02702 | Title: | ASA - Traceback in thread name aaa_shim_thread | |
Status: | Other | |
Severity: | 3 Moderate | Description: | Symptom: ASA traceback in thread name aaa_shim_thread
Conditions: ASA 9.2.3.4
Workaround:
Further Problem Description:
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 9.2(3.4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq27723 | Title: | WebVPN Citrix client browser couldn't save Java Client as preferred | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: - As a remote access user - On the Citrix client accessed through the browser - When the client preference option in settings is changed from default native client to Java client and saved - It's not showing up the new change when the settings is visited again.
Conditions: Access XenApp server using web-browser through Clientless SSL VPN This happens on Mac OS X v10.9 with FireFox 30 and Safari v7.x This also happens on Windows 7 with FireFox v28 and Internet Explorer 9
Workaround: None
Further Problem Description:
| |
Last Modified: | 02-SEP-2015 | |
Known Affected Releases: | 9.2(1.102) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.23), 100.15(1.54), 100.15(15.15), 100.15(16.1), 100.15(2.85), 100.15(3.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67779 | Title: | Investigate impact of jumbo-frame reservation on low-end ASA platforms | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Low-end ASA models, like ASA5512-X or ASA5515-X may fail to boot if Jumbo frames are enabled (jumbo-frame reservation) and additional interface card, like ASA-IC-6GE-CU-A card is present in the chassis.
Conditions: This issue was seen in 9.2(3) and 9.3(1) software.
Workaround: Try to load 9.3(2) software, run "no jumbo-frame reservation" and reload.
Further Problem Description: Even though 9.3(2) software boots up, the ASA cannot service ASDM connections if Jumbo frames are enabled. This happens due to low volume of free DMA memory. Use "show memory detail" command to check.
| |
Last Modified: | 02-SEP-2015 | |
Known Affected Releases: | 9.2(3), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86), 100.15(3.31), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtf06209 | Title: | Dynamic-filter config corrupted when removing classify-list from enable | |
Status: * | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom: If you remove the classify-list of a "dynamic-filter enable" command while "object-group-search access-control" is enabled, it will corrupt the config and give you something similar to:
dynamic-filter enable classify-list ????D O???????????????????????????X??????'?????XO6 O?????????
Conditions: Removing a classify list while ACL optimization is enabled.
Workaround: Clear the dynamic-filter config and issue it again
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 8.3(0.17) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv60724 | Title: | Cisco ASA Unicast Reverse Path Forwarding (uRPF) Bypass Vulnerability | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A vulnerability in the Unicast Reverse Path Forwarding (uRPF) feature in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to bypass the uRPF validation checks.
The vulnerability is due to incorrect uRPF validation where IP packets from an outside interface whose IP address is both in the ASA routing table and associated with an internal interface are not dropped. An attacker could exploit this vulnerability by sending spoofed IP packets to the ASA in a subnet range which should be dropped. An exploit could allow the attacker to bypass uRPF validation on the ASA and the packet will be incorrectly forwarded on the internal network.
Conditions: The ASA has the command ''ip verify reverse-path interface '' configured on an outside interface which has a default route.
Workaround: None.
Further Problem Description: This problem was introduced by ASA software version 9.3(3).
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2015-4321 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.3(1.50), 9.3(2.100), 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.32), 100.15(6.19), 100.15(6.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv86227 | Title: | ASA sending incorrect ACL hash for ASDM TopN ACL statistics on a cluster | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Error message under firewall dashboard "n/a config out of sync" for ASDM supporting ASA cluster.
Conditions: Running ASA cluster on ASDM with threat detection statistics turned on.
Workaround: None
Further Problem Description:
| |
Last Modified: | 05-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw02696 | Title: | ASA - Traceback in IKE Daemon | |
Status: | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom: ASA traceback in thread name IKE Daemon
Conditions:
Workaround: Upgrade past 9.3.3
Further Problem Description:
| |
Last Modified: | 07-SEP-2015 | |
Known Affected Releases: | 9.2(3), 9.2(3.4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv71763 | Title: | ASAv does not increment broadcast packet count | |
Status: | Open | |
Severity: | 3 Moderate | Description: * | Symptom: The "broadcasts" counter is not getting incremented correctly in the ASAV "show interface" command
Conditions: Only occurs on virtual platforms, first observed on 9.3.2
Workaround: None
Further Problem Description:
| |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 100.14(5.26), 9.3(2), 9.4(1.200) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCur56038 | Title: | RPC error in request config after replicated a large configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptoms: RPC error when configuration is replicated in a cluster environment
Conditions: ASA configured for firewall cluster
Workaround: none
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: | 100.11(0.55), 100.11(0.57), 100.12(0.111), 100.12(0.118), 100.13(0.17), 100.13(0.58), 100.13(19.9), 100.13(21.11), 100.13(21.6), 100.14(0.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsl74827 | Title: | Error messages on console due to QoS configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Due to QoS configuration on the ASA, errors like below might be seen on the console:
Message #941 : ERROR: Problem with interface 8 Message #942 : ERROR: Problem with interface 9 Message #943 : ERROR: Problem with interface 10
It is believed that these errors are cosmetic, and do not indicate a problem with the operational state of the ASA.
Conditions: QoS must be configured to encounter this problem
Workaround: None known
Further Problem Description:
| |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.0(2), 8.1(0.135), 9.4(1.3) | |
Known Fixed Releases: * | 100.12(0.146), 100.13(0.100), 100.14(0.73), 100.15(0.26), 99.1(2.235) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw15152 | Title: | Fix broken gcov build in dublin/main | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Fix broken gcov build in dublin/main
Conditions: Fix broken gcov build in dublin/main
Workaround:
Further Problem Description:
| |
Last Modified: | 10-SEP-2015 | |
Known Affected Releases: | 100.12(0.145) | |
Known Fixed Releases: * | 100.13(0.102), 100.15(1.92), 100.15(16.5), 100.15(17.7), 99.1(2.238) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv95320 | Title: | ASA User Ident MAC mismatch remove command not applied | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: -"no user-identity action mac-address-mismatch remove-user-ip" will be applied in the running-config -Users will disappear from CDA (if in use) -When users query whoami.scansafe.net, they may return their IP address where their username should be -When "debug user-ident user" and "debug user-ident ad-agent" are applied, the following log messages will appear:
Dispatch Unit: NP IDFW: mac addr changed since last request for ip 192.168.17.102 Dispatch Unit: NP IDFW: remove ip 192.168.17.102 from user JoeUser domain=1 uid=164 import=0 useripcnt=1 hashcnt=223 Dispatch Unit[0]: IP-User mapping 192.168.17.102(0)<->unity\JoeUser removed
Conditions: Unknown. First ASA found with this issue is a ASA5510 running asa915-k8.bin.
Workaround: Reloading the ASA has been shown to resolve the issue in previous lab testing.
re-apply user-identity action mac-address-mismatch remove-user-ip no user-identity action mac-address-mismatch remove-user-ip
Further Problem Description:
| |
Last Modified: | 10-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.102), 100.15(1.92), 100.15(16.5), 100.15(17.7), 99.1(2.238) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw03407 | Title: | DHCPD Search domain shorter than 10 characters is corrupted | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When the ASA is acting as a DHCPD server, it may corrupt the DHCP OFFER and DHCP ACK packets if the domain name configured in the DHCPD section is shorter than 10 characters long.
Conditions: This is seen when the DHCPD cofiguration has an interface specific DNS search suffix that is less than 10 characters long:
dhcpd address 192.168.1.40-192.168.1.40 guest dhcpd dns 10.0.0.100 interface guest dhcpd domain abc.ca interface guest <<<<<<<<<<<<<<<< dhcpd enable guest
This will result in the DNS search domain being sent out as a combination of the configured domain and 'cisco.com'. This can be checked using packet captures of the DHCP traffic.
In the above example, the ASA will pad the configured domain with the letters from cisco.com to reach 'abc.caom'.
Workaround: Do not configure this field or use a longer domain if feasible.
Further Problem Description:
| |
Last Modified: | 10-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.99), 100.14(0.73), 100.15(0.26), 100.15(1.81), 100.15(16.3), 100.15(17.1), 100.15(3.49), 100.15(6.31), 100.15(8.13), 99.1(2.232) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCta03382 | Title: | SQLNET query via inspection cause communication errors | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: With SQLNET inspection Oracle database connection drops errors with -ORA-12569 TNS packet checksum failure -ORA-03106 fatal two-task communication protocol error if a specific query sent.
Also, the following syslog may be printed: %ASA-4-507003: tcp flow from dmz:172.20.1.1/65000 to inside:172.16.1.1/1521 terminated by inspection engine, reason - proxy inspector drop reset.
Conditions: ASA with SQLNET inspection
Workaround: Disabling SQLNET inspection is an option as long as they are not doing NAT. | |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: * | 7.2(4.21), 8.0(4.28), 8.2(1) | |
Known Fixed Releases: * | 7.0(8.9), 7.2(4.42), 8.0(4.43), 8.0(5), 8.1(2.32), 8.2(1.10), 8.2(4), 8.3(0.0) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut88196 | Title: | Conn teardown syslogs and show conn output use 32-bit byte counts | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The output of 'show conn' and syslogs resulting from the teardown of connection (ASA-6-302014, ASA-6-302016, etc) use 32-bit counters for the bytes transferred on a connection. This provides incorrect data to network administrators and may cause confusion.
Conditions: This is seen on multiple versions of ASA code when hosts transfer more than 2^32 bytes of data on a connection.
Workaround: None at this time.
Further Problem Description:
| |
Last Modified: | 13-SEP-2015 | |
Known Affected Releases: | 9.3(2.2) | |
Known Fixed Releases: * | 100.14(0.71), 100.15(0.25), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.54), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu79657 | Title: | Pin hole creation failed on 3RU cluster. libc_functions.mmap failure | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Logs: ciscoSSPasa# pinhole-peek : proto-17 management:0.0.0.0/68 -> 255.255.255.255/67 pinhole-peek : proto-17 management:192.168.1.1/67 -> 255.255.255.255/68 pinhole-peek : proto-6 inside:192.168.127.7/43577 -> 10.100.127.7/21 flow: requesting PH_SNORT_INSPECT - mapped inside:192.168.127.7/0 -> mapped inside:10.100.127.7/53489 emb_time_out:110 est_time_out:0 map_sock_opt:0x8 flow_opts:0x1000000fuser_data_len:0 conn_flags:0x0 nat: rewriting real outside:10.100.127.7/53489, hint 10.100.127.7/0, dest inside:192.168.127.7/0 (rdip 192.168.127.7) nat: rewriting real inside:192.168.127.7/0, hint 0.0.0.0/0, dest outside:10.100.127.7/53489 (rdip 10.100.127.7) libc_fnctions.mmap(addr=0x0000000000000000, len=1073741824, prot=3, flag=8001, fd=1483, off=0) returned -1 errno=12! libc_fnctions.mmap(addr=0x0000000000000000, len=2097152, prot=3, flag=8001, fd=1483, off=0) returned -1 errno=12! flow: failed to allocate hole PH_SNORT_INSPECT src inside:192.168.127.7/0
Conditions: Cluster setup on 3RU and ftp initiated connection
Workaround: NA
Further Problem Description:
| |
Last Modified: | 13-SEP-2015 | |
Known Affected Releases: | 99.1(3), 99.1(8.11) | |
Known Fixed Releases: * | 100.15(1.86), 100.15(16.4), 100.15(17.3), 100.15(3.54), 100.15(6.16), 100.15(8.14), 99.1(3.138), 99.1(8.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu13345 | Title: | Drop reasons missing from asp-drop capture | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Drop reasons missing from asp-drop capture.
Conditions: Viewing capture with "show capture -or- Downloading via HTTP with https:///capture/
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0 | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.12(0.128), 100.13(0.77), 100.13(0.78), 100.13(21.15), 100.13(21.16), 100.14(0.27), 100.14(0.35), 100.14(10.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut80316 | Title: | Ikev2 Session with bogus assigned IP address stays on ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Ikev2 EAP-TLS Connection with Win 8.1 Phone
Conditions: Ikev2 EAP-TLS Connection with Win 8.1 Phone with continuous connect/disconnect
Workaround: - Remove bogus externally assigned IP address to avoid issue /or - Wait for sometime before connecting again as address becomes available again
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1.230) | |
Known Fixed Releases: * | 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.24), 100.14(7.23), 100.15(0.9), 100.15(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu81932 | Title: | ASA tunnel-group-map cannot contain spaces | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA can not use spaces in tunnel-group-map even though tunnel group can use it.
Conditions: spaces are used in tunnel-group-map such as tunnel-group-map TEST 5 "TEST CISCO"
Workaround: NOT use spaces at now
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(5) | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(16.1), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv02304 | Title: | EEM action not executed on absolute time when NTP is configured | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: EEM action is not executed on exact time of "absolute time" configured when NTP is configured. Command is executed with some delay or earlier than configured. On the following configuration, action should be executed on 10:30:00. But actually, it is not executed on time.(for example 10:29:58)
event manager applet eem-test event timer absolute time 10:30:00 action 0 cli command "show xxxxx" output file new ntp server x.x.x.x
Conditions: When NTP server is configured or if the clock time is changed.
Workaround: Re-configure the EEM applet absolute timer if NTP is configured or the time is changed by any other means (e.g. via the 'clock set' command if NTP is disabled). This will cause the timer to be re-synced with the current clock time.
Further Problem Description: The time difference is due to the internal clock drift. It is typically a few seconds.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut23991 | Title: | PPPoE session state timer does not initialize properly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The value of "Last Chg" always showed 4294967 secs after execute "show vpdn session pppoe state".
Conditions: The value of "Last Chg" remains at its maximum value once the max value(4294967) is reached. The pppoe connection will not be effected if the value of "Last Chg" remains reaches the maximum value.
Workaround: Reboot device.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.2(3), 8.4(6), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.117), 100.13(0.54), 100.13(21.10), 100.14(0.4), 100.14(1.4), 100.14(10.7), 100.14(11.7), 100.14(2.10), 100.14(26.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut85049 | Title: | Issue with downloading images from Sharepoint | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Image cannot be downloaded from Sharepoint
Conditions: After cookies and cache are cleared from browser
Workaround: Right click on the image and do a 'Save As' and select local disk
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.14(3.8), 9.4(1.112) | |
Known Fixed Releases: * | 100.12(0.137), 100.13(0.93), 100.14(0.13), 100.14(10.23), 100.14(5.15), 100.14(6.7), 100.14(7.6), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67315 | Title: | ASA :Top 10 Users status is not getting enabled from ASDM. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Top 10 Users status is not getting enabled from ASDM.
Conditions: ASA running code 9.3.2
Workaround: Downgrade ASA to 9.1.5 to get this feature working.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(1), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.66), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut04182 | Title: | NFS connections not timing out after failover | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: NFS connections are not timing out correctly after a failover. The show conn detail output shows a timeout value of "timeout -".
Conditions: Cisco ASAs running release 9.1.5.10 in a failover configuration with SunRPC inspection disabled and after a failover has occurred.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.10) | |
Known Fixed Releases: * | 100.11(0.56), 100.12(0.114), 100.13(0.42), 100.13(20.12), 100.13(21.7), 100.14(0.3), 100.14(1.3), 100.14(10.5), 100.14(11.5), 100.14(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus83476 | Title: | More than 255 messages in multicast packet with jumbo frames | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: PIM join messages are lost after passing through the ASA.
Conditions: 1. ASA has jumbo-frames enabeld and has an MTU of 5134 or higher 2. Multicast routing is enabled on ASA and there are more than 255 (*/S,G) groups on it
Workaround: Disable jumbo frames or use MTU lower than 5134
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(6) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.115), 100.13(0.47), 100.13(21.8), 100.13(29.28), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88548 | Title: | Ampersand (&) not encoded in packet tracer phase 'extra' field | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASDM is unable to run packet tracer when traffic traverses and interface with an ampersand (&) in the name. ASDM will show an error indicating 'Error while forming XML'
Conditions: This is seen when the packet path traverses an interface with an ampersand character in the name.
Workaround: Change the interface name to not include an ampersand.
Further Problem Description: This is caused by the ASA not encoding the ampersand as & when generating the XML payload. You can verify you are hitting this issue by running the packet tracer command on the CLI and looking for an unencoded ampersand character. For example:
ASA# packet-tracer input inside tcp 192.168.100.200 12345 10.10.0.100 80 xml ::output truncated::
2 ROUTE-LOOKUP Resolve Egress Interface ALLOW
found next-hop 10.10.10.254 using egress ifc DMZ&Servers <<<< Unencoded ampsersand
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.14(0.44), 100.14(16.1), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu92632 | Title: | ASA sets non-zero FA in OSPF for anyconnect redistrubuted network | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Re-distribution of anyconnect static routes on ASA 9.x doesn't work.
The output of the command "show ospf database external" shows the forward address being set to non-zero/incorrect value.
ciscoasa# show ospf database external 10.0.103.161
OSPF Router with ID (172.16.10.1) (Process ID 1)
Type-5 AS External Link States
LS age: 1503 Options: (No TOS-capability, DC) LS Type: AS External Link Link State ID: 10.0.103.161 (External Network Number ) Advertising Router: 172.16.10.1 LS Seq Number: 80000001 Checksum: 0xfff4 Length: 36 Network Mask:255.255.255.255 Metric Type: 2 (Larger than any link state path) TOS: 0 Metric: 20 Forward Address: 172.16.10.10 <---------------- External Route Tag: 0
Conditions: - ASA with OSPF enabled - redistributing Anyconnect VPN static addresses into OSPF - Anyconnect VPN terminates on the same interface where distribution is performed
Workaround: Route redistributed network to the Null0 interface
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.86), 100.14(0.66), 100.15(0.20), 100.15(1.33), 100.15(10.3), 100.15(2.65), 100.15(3.16), 100.15(4.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv62204 | Title: | "show ipv6 neighbor" command not available in system space | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "show ipv6 neighbor" command is not available in the system execution space
Conditions: ASA in multiple mode.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.13(0.97), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30), 100.15(8.13), 9.4(1.107), 9.4(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut08663 | Title: | Both ASAs in failover use the same MAC address | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: - If manually configured the "mac-address mac_address [ standby mac_address ]" within the physicall interface, bot ASAs active and standby will use the same active MAC address disrupting the traffic. - If the "mac-address" command is used within the subinterface then both ASAs will negotiate properly the MAC address based on the failover state.
Conditions: ASAs in failover with an interface using subinterfaces.
Workaround: Do not configure the "mac-address mac_address [ standby mac_address ]" into the physical interface, instead configure it within the sub interface.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(7), 9.0(4), 9.1(2), 9.1(4), 9.1(5.21), 9.1(6), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus92570 | Title: | 'client-services' is not accepted if the interface has no IP addr | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA does not accept a configuration below when the interface (OUTSIDE) has no IP address. The ASA can accept the command after the interface gets IP address. ciscoasa(config)# crypto ikev2 enable OUTSIDE client-services port 443
The following messages shows after issuing the command. ERROR: Failed to start client services listener
Only 'crypto ikev2 enable OUTSIDE' is seen on the result of 'show run' after that.
This symptom is not seen on ASA 8.4(7)
Conditions: The interface is configured as PPPoE or DHCP client. The command issued before PPPoE or DHCP assigns IP address
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(2) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.115), 100.13(0.45), 100.13(20.12), 100.13(21.7), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu73087 | Title: | Standalone AnyConnect fails to connect due to empty DAP user message | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Standalone AnyConnect client fails with the following message: 'The VPN configuration received from the secure gateway is invalid. Please contact your network administrator.'
Conditions: 1) The AnyConnect client version 2.5.6005 or lower is referenced on the ASA. 2) The DAP record being hit - not the Default DAP record - has no user message. 3) ASA version is 9.3.2 and above.
Workaround: 1) Configure a User Message for the DAP record. 2) Use the AnyConnect client version 3.0.x/3.1.x/4.x on the ASA.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2), 9.3(3.1), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(16.1), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw10189 | Title: | Alpha:Getting: LU allocate connection failed syslog on standby | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: On standby unit of ASA in active/standby failover setup, below syslog observed
%ASA-3-210005: LU allocate connection failed for TCP connection from STG-WIRELESS-DATA-VLAN1:192.168.2.110/63205 to outside:108.168.245.114/443
Conditions: ScanSafe re-direction is enabled.
Workaround: Although there is no functional impact, we can filter-out the Syslog ASA-3-210005 or disable the scansafe inspect would do.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1.109) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu54046 | Title: | All Static routes not removed on adding zone membership to an interface | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: out of the previously configured static routes, static routes are deleted one by one from the config on adding zone membership to the interface
Conditions: 1) zone membership is added to an interface AND 2) static routes configured on that interface
Workaround: 1) re-add the zone membership to the interface OR 2) manually clear the routes from the config
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.12(0.134), 100.13(0.87), 100.14(0.67), 100.15(0.21), 100.15(1.37), 100.15(10.4), 100.15(15.2), 100.15(2.75), 100.15(4.23), 100.15(5.27) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut92373 | Title: | ASA 9.0.3 not logging permitted UDP traffic | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: * | Symptom: Permitted UDP traffic not getting logged. We dont see the below log when the connection is permitted,%ASA-6-106100: access-list permitted UDP ->
Conditions: Issue consistently seen whenever there is a Change made to the ACL or during Bulk ACL compilation.
Workaround: Reload of the ASA
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0(3), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.23), 100.14(7.22), 100.15(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu99902 | Title: | Saleen Alarm LED lit when BMC SEL log is full | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Alarm LED turned on
Conditions: SEL in BMC is full
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.6(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus14568 | Title: | seamless upgrade on spyker A floods error messages to both asa units | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The following error message floods the console of both the primary during step of a seamless upgrade operation from any build 9.3.1 or older to 9.3.2 and newer:
Number of interfaces on Active and Standby are not consistent. If the problem persists, you should disable and re-enable failover on the Standby.
Conditions: There is a phase in the seamless upgrade operation when the primary asa has a different image on it than the secondary. During this phase, a stream of debug messages will continually get generated to the console.
It appears as though these messages are only a nuisance and they will subside once both units are returned to a state where they are both running the same image.
The event stream is somewhat of a flood but not bad enough to prevent basic control of the seamless upgrade procedure.
Workaround: No work around is needed because all operations remain functional throughout the process
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.13(1.24), 9.3(2) | |
Known Fixed Releases: * | 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.66), 100.15(16.1), 100.15(17.1), 100.15(3.35), 100.15(6.21), 100.15(8.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus98309 | Title: | Duplicate IPv6 address is configurable in 1 ASA or context | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Duplicate IPv6 address is configurable in 1 ASA or context.
In case of L2 transparent mode, a duplicate ipv6 address for 2 BVI interfaces in 1 context is configurable by configuring 'ipv6 address' first and 'bridge-group' later. In case of L3 routed mode, duplicate ipv6 address is configurable for multiple interfaces by configuring the 'ipv6 address' is first and 'nameif' later.
Conditions: IPv6 environments
Workaround: 'bridge-group' configures first for L2 transparent mode. 'nameif' configures first for L3 routed mode.
Further Problem Description: none
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.12) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.115), 100.13(0.47), 100.13(21.8), 100.14(0.3), 100.14(1.3), 100.14(10.6), 100.14(11.6), 100.14(2.8), 100.14(26.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut37042 | Title: | Secondary ASA stuck in config sync while upgrading to 8.4.x | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In a situation where we are doing a "zero-downtime upgrade" of the firewall from 8.2(5)48 to 8.4.x, we see the following repeated messages appear on the console of the secondary unit (the primary has not yet been upgraded). Even after waiting for several hours the logs keep on appearing.
WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 10.0.0.0 255.0.0.0 eq 9998 log WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 172.20.0.0 255.252.0.0 eq 9998 log WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 192.168.0.0 255.255.0.0 eq 9998 log : :
Conditions: While upgrading to 8.4(6) or 8.4(7)3 or 8.4(7)23.
Workaround: The issue does not occur for standalone ASA.
Manually upgrade (no zero-downtime upgrade) wherein we can arrange a downtime to upgrade the primary and secondary at the same time so that they don't get into syncing configuration.
Further Problem Description: If we refer the flow towards getting these warning messages, it looks like this starts occurring when at the "replication" phase than the "upgrade" phase (upgrade occurs successfully).
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(6), 8.4(7), 8.4(7.230) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.16), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui37201 | Title: | Misleading error msg for pat-pool with mapped object | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Wrong error message thrown while configuring dynamic PAT
Conditions: Issue is seen with dynamic PAT.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(2.5) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.56), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv35243 | Title: | ASA: Not able to remove ACE with "log default" keyword | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA: Unable to remove ACE with "log default" keyword enabled
Conditions: "log default" should be added at the end of the ACE
Workaround: Do not use the "log default" keyword at the end of the ACE.
In case of CSM , use the ACL Parameter as "traffic" rather than "speed"
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.66), 100.15(16.1), 100.15(17.1), 100.15(3.35), 100.15(6.22) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc16662 | Title: | HTML/Java File Browser- created file or folder shows 9 months offset | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Create a new folder or file on the FTP or CIFS server over webvpn, the date created shown has 9 months offset.
Conditions: 1. Create a new folder or file on the FTP or CIFS server. 2. The date has 9 months offset. 3. Checked the date on the share server it looks fine. 4. Could be a display issue
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.3(1), 9.0(0.113) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.75), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut05676 | Title: | Handling esmtp default parameters for TLS | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In multi-mode, when migrated from one version to another. Each context should have TLS behavior based on it config-url file's version. It should not be with respect to startup configuration version.
Conditions: When migration happen in Multimode where a context's config-url contains a old version followed by next context which contains new version.
Workaround: Can use user-defined esmtp policymap instead depending on default-esmtp policymap. Or Do 'write memory all' in multimode before migrating to a new version.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.17), 100.14(26.6), 100.14(3.5), 100.14(4.25) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32157 | Title: | Remove Code for Type 0 Routing Headers | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.
Conditions: Device configured with default configuration.
Workaround: Not applicable or available.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.54), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv11963 | Title: | TP Auth fails when sub CA using RSA keys is signed by root using ECDSA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA fails to validate the Anyconnect client certificate issued by the intermediate CA under below conditions.
Conditions: 1. ASA running 9.3.3.1, should be configured for certificate authentication.
2. Root CA cert must have ECDSA Signature algorithm and ECDSA public key
3.Intermediate CA cert must have ECDSA signature algorithm with RSA public key.
4.ASA ID cert must have RSA signature algorithm with RSA public key.
5.Client cert must have RSA signature algorithm with RSA public key.
Workaround: NONE
Further Problem Description: When we connect to ASA from Anyconnect client machine, we see the client is sending its ID cert and ASA fails to verify the cert chain with below debug.
CRYPTO_PKI: Verify chain of certs, Getting public key from signersCert. CRYPTO_PKI:Failed to set key info for get public key obj, status: 542, keylen: 294 CRYPTO_PKI: Verify chain of certs failed to get pubkey from signer.
Root, intermediate and ID certs are installed in separate Trustpoints in ASA. We have also tried installing intermediate and ID cert in single Trustpoint which results in same failure.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3.1), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.2), 100.15(3.50), 100.15(6.33), 100.15(8.13), 9.4(1.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu76651 | Title: | Traps are not sent after hyperlite bootsup with all data interfaces shut | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: SNMP traps are not transmitted from the ASA
Conditions: Saleen and Kenton platforms.
The ASA boots with all of its data interfaces administratively shutdown.
Workaround: admin-up a data interface.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.13(29.11) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.84), 100.13(29.101), 100.13(29.34), 100.14(0.63), 100.14(16.2), 100.14(5.24), 100.14(7.46), 100.15(1.29), 100.15(10.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu18527 | Title: | ASA WebVPN: HTTP 302 Location URL rewritten incorrectly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In some corner conditions, if the Backend Server responds with HTTP "302 Found" where in the Location URL the fqdn and the URI are not separated by "/", but are separated instead by a "?", ASA appends the same URI prefix as the one it got redirected from resulting in a "HTTP 404" condition.
For example: Client Performs: GET /abcd/login.php Backend Server Responds with HTTP 302 Found: Location: http://server.company.com?email=bsg73kdpo1098 At this stage, ASA rewrites this HTTP header as: HTTP 302 Found: Location: http://server.company.com/abcd/?email=bsg73kdpo1098
Here, notice that the ASA appends /abcd/ from the original URI
Conditions: ASA acting as Clientless SSLVPN Server, and the users access Intranet Websites through the WebVPN portal. The WebSites are served through ASA's Rewriter engine
Workaround: Use Smart-Tunnel feature
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3.1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.23), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu16983 | Title: | ASA: failover logging messages appear in user context | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Failover syslog messages should appear in the admin context, but they appear in user context.
Conditions: ASA in multi-context mode.
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.19), 9.2(2.8) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu02635 | Title: | Remove demo and eval warning for sfr monitor-only | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A warning is produced when configuring the SFR module to monitor-only mode. Example:
ciscoasa(config)# policy-map global_policy ciscoasa(config-pmap)# class sfr ciscoasa(config-pmap-c)# sfr fail-open monitor-only WARNING: Monitor-only mode should be used for demonstrations and evaluations only. This mode prevents SFR from denying or altering traffic.
Conditions: This policy map sfr monitor-only mode is supported for production which makes the "should be used for demonstrations and evaluations only" incorrect and confusing.
Workaround: None. Ignore the "should be used for demonstrations and evaluations only" portion of the warning.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCup89922 | Title: | ASA DNS lookups always prefer IPv6 response | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A DNS server configured on the ASA will always use IPv6 DNS requests (type=AAAA) if any of the interfaces are configured with IPv6. There is no way to prevent this behaviour, or make the ASA prefer and sending type=A requests.
Conditions: This only occurs if IPv6 is enabled on any interface of the ASA, even if no Globally Unique Address is assigned. If IPv6 is enabled, then the ASA only makes Type=AAAA DNS requests. This will always result in an IPv6 DNS response, and potentially cause features that depend on DNS to fail (ie. Smart Call Home).
Workaround: Disable all IPv6 addresses on the ASA.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(0.2), 9.1(1), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu96492 | Title: | 'terminal pager' does not clear when authorization auto-enable is used | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Terminal pager lines will not re-initiates the pager value from the running config even after the sessions terminates, unless we use a login or enable in the EXEC mode.
But when this is used along with aaa authorization, the user will not be prompted for the password when entering privileged EXEC mode. aaa authorization exec authentication-server auto-enable
So, if any of the user enters the terminal pager command, it is affecting other user sessions when logged in using aaa with privilege credentials.
Conditions: terminal pager is used and the following command is enabled. aaa authorization exec authentication-server auto-enable
Workaround: We can clear the terminal pager instead of logging in with enable or login command. clear terminal pager
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.240) | |
Known Fixed Releases: * | 100.13(0.85), 100.14(0.66), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.63), 100.15(3.16), 100.15(4.20), 100.15(5.23), 9.4(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus37840 | Title: | AnyConnect upgrade from AC 2.5 to AC 3.1 fails | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: AnyConnect upgrades fail from 2.5.X to 3.1.Y.
Conditions: ASA 9.2(1), AC upgrade from client 2.5.6005 to 3.1.5170. In general, any upgrades from AC 2.5 to 3.1 fail. Failure here means that the new version is not able to resume the tunnel initiated by the old version. The new version is still downloaded and installed.
Workaround: None.
Have client manually reconnect with the new version.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2 | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.13(29.28), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut48571 | Title: | Incorrect cert chain sent to connecting IPSec clients | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA might not send the correct certificate chain to connecting IPSec clients.
Conditions: This may occur if the ASA has more than one version (same DNs, but different public keys) of any one of the chain certificates in its configuration.
Workaround: It may be possible to work around this by repositioning the affected certificates and trustpoints in the configuration
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.17), 100.14(26.7), 100.14(3.5), 100.14(4.25) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut69675 | Title: | Radius Acct-Terminate-Cause for L2TP over IPSec is incorrect. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Radius Acct-Terminate-Cause for L2TP over IPSec session is incorrect. The value in Accounting-Request always be User-Request even if the disconnected reason is loss of service
Note: The session-timeout,idle-timeout, etc. was covered by (CSCus88626), now in verified state.
Conditions: none
Workaround: none
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(7.23), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(28.2), 100.14(0.8), 100.14(0.9), 100.14(1.7), 100.14(10.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32176 | Title: | IPv6 Complete Packet Fragment Reassembly Check Bypass | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: It is possible for a crafted IPv6 packet to bypass the fragment reassembly check of the Cisco Adaptive Security Appliance (ASA).
Conditions: Cisco ASA configured for IPv6.
Workaround: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/4.3: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0 CVE ID CVE-2012-5736 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.143), 100.12(0.146), 100.13(0.100), 100.13(0.95), 100.14(0.71), 100.14(0.73), 100.15(0.24), 100.15(0.26), 100.15(1.68) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut83833 | Title: | USB device hot plug not supported in running ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Hot plug of USB stick not working as expected on 5506, 5506H, 5506W, 5508, 5516 and follow on models
Conditions: After unit is started, unable to plug in a drive and have it recognized.
Workaround: Boot with USB stick inserted.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.13(11) | |
Known Fixed Releases: * | 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.8), 100.14(0.21), 100.14(10.23), 100.14(5.16), 100.14(7.32), 100.15(0.12), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut26062 | Title: | xszASA 9.2.1 Eigrp Authentication does not work with 16 character key | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA 9.2.1 Eigrp Authentication does not work with 16 character key. ASA not able to read 16th character of the key-string.
Conditions: ASA running 9.2 software version and using Eigrp Authentication key of 16 characters.
Workaround: This issue has not been observed in 8.2 and 9.1 all releases
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.116), 100.13(0.53), 100.13(21.10), 100.14(0.4), 100.14(1.4), 100.14(10.7), 100.14(11.7), 100.14(2.10), 100.14(26.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv90156 | Title: | All Remarks in ACLs are pushed to the end of each ACL after upgrade | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: All remarks in a ACLs are bundled together and pushed to the end of each ACL after running an upgrade
Conditions: This happens when the command "object-group-search access-control" is present in the configuration when you upgrade
Workaround: Remove the "object-group-search access-control" command before the upgrade and re-apply it after the upgrade.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3, 9.4, 9.5 | |
Known Fixed Releases: * | 100.12(0.145), 100.13(0.98), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13), 9.4(1.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut49711 | Title: | show cluster mem indicates incorrect values | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "show cluster memory" will indicate incorrect values of Free & Used memory in both summary and individual node output.
Conditions: When executing "show cluster memory" from Master or slave node in the cluster
Workaround: Issue "show memory" on individual nodes or "cluster exec unit show mem" to fetch correct values.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0, 9.3(2.103), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv09640 | Title: | ASA: "Auto-Enable" feature not working with SSH configured with PKF | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "Auto-enable" feature does not work with ASA device configured with the SSH PKF feature
Conditions: ASA SSH configured with the PKF feature
Workaround: Don't use the "auto-enable" command with SSH PKF feature
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.90), 100.14(0.68), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4), 100.15(2.75), 100.15(3.20), 100.15(4.25), 100.15(8.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu31281 | Title: | AAA Authorization HTTP sends username in password field of authorization | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASDM access may be denied to all users even if their passwords are correct, and they are in the correct groups for authorization. This occurs because after a change in asdm authorization in 9.4.1, administrators must configure a new command, "aaa authorization http console" to authorize HTTP/ASDM logins (this was not the case in pre-9.4 code). With that command entered, the ASA sends a second packet to the authentication server but the attempt causes a failure because the ASA puts the username in the password field of the packet.
Conditions: - ASA 9.4.1 or greater - "aaa authorization http console aaa-group" configured for ASDM authorization - Has been observed with the LDAP protocol and the RADIUS protocol, but may apply to others as well
Workaround: - Disable HTTP authorization by removing "aaa authorization http console" command from configuration (NOTE: This will allow all users to login to ASDM if their credentials are valid) - Downgrade to 9.3 or lower
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.76), 100.13(21.14), 100.14(0.19), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.10), 100.15(2.35), 100.15(3.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu93339 | Title: | Cisco ASA Poodle TLS Variant | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptoms: Cisco ASA models 5506-X 5508-X and 5516-X include a version of SDK which is vulnerable to a variant of POODLE TLS where the first byte of the padding is not checked.
Additional information about this issue can be found at: https://vivaldi.net/en-US/blogs/entry/there-are-more-poodles-in-the-forest
Conditions: The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only. Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...
Workaround: There are no workaround for this issue other then disabling the affected feature.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C&version=2.0 CVE-2015-4595 has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3.2), 9.4(1.3) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.81), 100.13(29.28), 100.14(0.48), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv85752 | Title: | Group-lock value can be set with space in a tunnel-group name | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Group-lock setting does not get deleted from group-policy attributes and causes AnyConnect connections to fail for a given tunnel-group.
Conditions: Standard AnyConnect configuration plus group-lock in the group-policy.
Workaround: Reapply the group-lock without space after a tunnel-group name.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.2, 9.1, 9.1(4), 9.3, 9.3(2), 9.4, 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu41142 | Title: | IPv6 local host route fail when setting link-local/Global simultaneously | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When configuring link local address and global address simultaneously by copy&paste from text editor, IPv6 local host route cannot be seen on "show ipv6 route". For example, assume trying to set 2001:1111:1111:111::1/128 as IPv6 address on interface, local host routing table of 2001:1111:1111:111::1/128 should be set but was not set in certain situation.
ciscoasa/C1(config-if)# sh ipv6 route
IPv6 Routing Table - 3 entries Codes: C - Connected, L - Local, S - Static O - OSPF intra, OI - OSPF inter, OE1 - OSPF ext 1, OE2 - OSPF ext 2 ON1 - OSPF NSSA ext 1, ON2 - OSPF NSSA ext 2 C 2001:1111:1111:111::/64 [0/0] via ::, outside L fe80::/10 [0/0] via ::, outside L ff00::/8 [0/0] via ::, outside
The following local host routing should be set.
L 2001:1111:1111:111::1/128 [0/0] via ::, outside
Conditions: The symptom only occurs when changing link local address and global address simultaneously. Therefore, symptom does not occur when not changing link local address or configuring link local address and global address 1 line by 1 line.
Workaround: - Configure link local address and global address 1 line by 1 line(Do not use copy&paste multiple lines) - Not change link local address when configuring global address
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut39169 | Title: | WebVPN:Rewrite issue with 'eval' expressions inside JS on Peoplesoft app | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Some content on a Peoplesoft based application may fail to be displayed or accessible through clientless webvpn
Conditions: The application is processed by the webvpn rewriter
Workaround: Use Smart-tunnel
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.17), 100.14(26.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu08031 | Title: | ASA QoS Priority Queue tx-ring-limit 512 causes high impact to LLQ | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: There is very big difference between tx-ring-limit 512 vs tx-ring-limit 511.
More specifically we see that with tx-ring-limit 512 packets the LLQ traffic is having packet loss, while we don't see any Tail Drops for BE traffic. With tx-ring-limit 512, the bigger the average packet size for BE traffic, the bigger the packet loss for LLQ traffic.
With tx-ring-limit 511 packets, LLQ traffic has no packet loss anymore while we start seeing many Tail Drops for BE traffic which is actually expected.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(7.26) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut58935 | Title: | WebVPN: Tsweb fails to work through clientless portal | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: TSweb access through clientless VPN may fail when using a customized TSWeb portal. Users will see a blank window instead of the server logon screen
Conditions: ASA running 9.1.5.10 or later releases
Workaround: Use the rdp plugin or smart-tunnel the terminal services client.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5.10), 9.1(5.19), 9.1(5.21), 9.2(2.4), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07308 | Title: | "ssh scopy enable" deleted from configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "ssh scopy enable" deleted from configuration
Conditions: Seen in multi context ASA
ssh scopy enable is turned on.
Command may be removed when making ASA system context changes. Confirmed command will disappear after deleting a context.
Workaround: simply re-add command to configuration to continue use of ssh scopy
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.75), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv32789 | Title: | ASA using IKEv2 rejects more than 10 NAT_DETECTION_SOURCE_IP payloads | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Acting as the IKEv2 responder, ASA receives initial IKEv2 packet that contains more than 10 payloads for NAT_DETECTION_SOURCE_IP from initiator. ASA rejects the connection, enumarates 10 payloads and prints "INVALID_SYNTAX" afterwards.
Conditions: -ASA acts as IKEv2 responder. -ASA receives more than 10 payloads for "NAT_DETECTION_SOURCE_IP" from the initator.
Workaround: Use IKEv1
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(2.8) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.141), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.62), 100.15(16.1), 100.15(17.1), 100.15(3.36), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu02761 | Title: | DNS should perform IPv4 lookups if IPv6 address is not reachable | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: DNS returns IPv6 addresses which are not reachable by ASA
Conditions: IPv6 is enabled on at least one ASA interface.
DNS lookups are configured.
Hosts are accessed by name rather than IP or IPv6 address.
Workaround: Options: 1. If this is a manual operation (e.g. ping), then specify the IP or IPv6 address.
2. disable IPv6 on all interfaces.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.123), 100.13(0.69), 100.13(21.13), 100.14(0.10), 100.14(10.14), 100.14(26.11), 100.14(5.14), 100.14(6.16), 100.14(7.16) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu54660 | Title: | ASA Remote Access - Phase 1 terminated after xauth | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: IPSEC remote access clients are intermittently not able to connect. The user is prompted for password and then the connection fails.
From the ASA debugs we can see the Phase 1 and X-auth + config mode are passing fine. Then the ASA deletes the Phase 1, sends delete information to the client and discards QM1 packet sent by the client.
Conditions: MacOS / iOS bult in IPSEC VPN client. Clients behind NAT. More detailed triggers unknown.
Workaround: Reload the ASA.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu19489 | Title: | ASA inspection-MPF ACL changes not inserted into ASP table properly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: New ACL changes not taking effect for inspection policies.
When adding new rules to the top of an existing ACL which is mapped to an inspection policy, the ASA installs this rule incorrectly at the bottom of its ASP table. This is applicable for any inspection policy that has an ACL bound to it.
Conditions: There should be an ACL bound to an inspection policy.
Workaround: Remove and re-apply the service-policy or remove and re-apply the effected class-map in the policy-map.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut24490 | Title: | L2TP/IPSec Optimal MSS is not what it's supposed to be | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: This is a bug to clarify how to calculate the optimal MSS for L2TP/IPSec
Conditions: ASA terminating IPSec/L2TP
For Windows 7, MTU on IPSec/L2TP virtual adaptor is 1300. Because 1300 is small enough, MSS configuration may not be required. However, it is not always the case for Android.
Workaround: TAC lab test indicates the following formula can be used to calculate MSS.
MSS = MTU - 156
e.g. when MTU is 1500: MSS = 1500 - 156 = 1344
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(2), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12), 100.14(2.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut96928 | Title: | ASA : Password creation date is decrementing by one with every reboot | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA " Local User" password creation date is decrementing by one day with every reboot
Conditions: ASA configured with Command : password-policy lifetime
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.23), 100.14(7.22), 100.15(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw40468 | Title: | DHCP proxy overrites chosen DHCP server in multiple DHCP server scenario | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Anyconncet clients stop connecting to the ASA because they are no longer able to get an address from the DHCP server.
Conditions: - multiple DHCP servers configured on the ASA - either DHCP server is behaving incorrectly where it sees the REQUEST (with the other server's IP) and still replies with an OFFER, or the OFFER was sent by the non-selected DHCP server before it sees the REQUEST
Workaround: configure only one DHCP server
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.15(0.44), 100.15(17.18), 100.15(3.68), 100.16(0.2), 100.16(1.5), 99.1(2.254) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw24668 | Title: | Multi-Node Service Graph produces mac-flap with l3out as consumer | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: traffic from an l3 out to a Service Device in a Multi-Node service chain is dropped after the EP is aged out in the fabric.
Conditions: mac flapping is occurring on the ASA causing the ARP response to be dropped and thus the EP database and ARP entry on the leaf never gets updated.
Workaround: n/a
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: * | 8.1(2.7) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw32125 | Title: | ASA stacktrace in vpn client disconnect that had dACL applied | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: On the console of an ASA, the following stacktrace is seen.
Aug 12 14:54:50 10.0.7.81 %ASA-0-711001: -Traceback: 000000000042A63E 0000000001187B31 00000000011A7195 00000000011A75B3 00000000011AFBDD 00000000011B1738 0000000000531469 0000000000532D1E 0000000000540F86 0000000000531F1F 00000000004286D5
It decodes to the following:
Version:arsenal/9.0.4.17 Image Type: asa Executable: smp Symbol File: smp.sort 000000000042A63E 0000000001187B31 00000000011A7195 00000000011A75B3 00000000011AFBDD 00000000011B1738 0000000000531469 0000000000532D1E 0000000000540F86 0000000000531F1F 00000000004286D5
The stack trace decode suggest that it occurs when a client disconnects that had a dACL applied.
Conditions: ASA 5580-40 running version asa904-17-smp-k8
Workaround: None
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.15(0.45), 100.15(3.69), 99.2(2.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv76342 | Title: | ISA3000 crashed while generating crypto rsa keys | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ISA3000 can produce back-trace after executing "crypto key generate rsa usage-keys label usage_key modulus 4096" command.
Conditions: After the unit is installed with not much initial configuration issue the command 'crypto key generate rsa label Key1_4096 modulus 4096' Try the same command manually 7-8 times. The ISA can crash and produce back trace around 8th iteration. However the issue cannot be reproduced consistently.
Workaround: ISA should reload after the back trace
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 100.13(29.28), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.104), 100.13(29.101), 100.13(29.36), 100.14(0.75), 100.15(0.29), 100.15(0.42), 100.15(1.94), 100.15(16.7), 100.15(17.18), 100.15(17.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw33713 | Title: | IKEv2: crypto iskamp identity auto doesn't work - DN not IKE ID but IP. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Despite the "crypto isakmp identity auto" the ASA does not send DN as IKE ID. It consistently sends IPv4 address.
As a result the peer identity verification fails.
Conditions: 1. IKEv2 L2L VPN
2. Certificate hierarchy:
ECDSA key root ECDSA key sub ECDSA key identity
OR
RSA key root ECDSA key sub ECDSA key identity
3. "crypto isakmp identity auto" enabled
Workaround: Disable peer id validation under the tunnel group:
tunnel-group x.x.x.x ipsec-attributes peer-id-validate nocheck
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.15(0.45), 100.15(3.69), 99.2(2.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut18736 | Title: | ASA crashes after clear configure all command | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA crashes after "clear configure all" command is configured
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.3(2.202) | |
Known Fixed Releases: * | 100.15(0.48), 99.2(2.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus88626 | Title: | Radius Acct-Terminate-Cause for L2TP over IPSec is incorrect. | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Radius Acct-Terminate-Cause for L2TP over IPSec session is incorrect. The value in Accounting-Request always be User-Request even if the disconnected reason is session-timeout,idle-timeout, etc. (Loss of service is covered under defect under CSCut69675)
Conditions: none
Workaround: none
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(7.23), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.56), 100.13(21.10), 100.14(0.5), 100.14(1.4), 100.14(10.8), 100.14(11.8), 100.14(2.12), 100.14(26.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCty30899 | Title: | fqdn command option is removed when deleting RSA key | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: If both fqdn and keypair commands are configured in trustpoint, and RSA key which is associated with the trustpoint is removed by crypto key zeroize, fqdn command's option is unexpectedly removed and remains blank.
Conditions: Both fqdn and keypair commands are configured in trustpoint.
Workaround: Reconfigure fqdn command with option in trustpoint configuration mode.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.2, 8.4 | |
Known Fixed Releases: * | 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.18), 100.14(26.7), 100.14(3.6), 100.14(4.26) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCtf65922 | Title: | Misleading ACL drop flow denied reason shown for NAT failure | |
Status: | Open | |
Severity: | 4 Minor | Description: | Symptom: An object outside interface PAT (for SSH) configured for a specific inside host and manual outside interface PAT defined for the entire inside network. Outside interface ACL configured to permit all traffic
Conditions: When an outside host attempt SSH to the static PATed address of the inside host, the connection attempt fails
"show asp drop" indicates the drop reason to be :
Frame drop: Flow is denied by configured rule (acl-drop)
But the drop is not due to any implicit or user configured ACL.
Workaround: n/a
Further Problem Description: The reason the flow is dropped is because of the manual NAT having priority over the object NAT - and NAT failure causes the flow to be dropped
But there is no indication of NAT failure - no Syslog/debug/error is shown
So there is no indication to the user as to why the connection failed
| |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 8.3(1), 9.1(5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw09324 | Title: | DOC:ASA 9.2 & later config guide not updated with OSPF distribute-list | |
Status: | Open | |
Severity: | 4 Minor | Description: | Symptom: This is a Document bug to add an example for ospf route filtering using distribute-list command used under the router OSPF configuration mode in ASA Config Guide 9.2 and later.
Conditions: N/A
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuo05238 | Title: | 'show activation-key' command does not display the flash key correctly | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Contents of the flash permanent activation key is not displayed correctly in the output of the 'show activation-key' command.
Conditions: An ASA with a running permanent activation key that is different from the flash permanent activation key.
Workaround: None. When the ASA is reloaded, and the flash permanent activation key becomes the running permanent activation key, its contents are displayed correctly.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 100.8(38.131) | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(16.1), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.54), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw16103 | Title: | ASA: Duplicate Remark created using object with range keyword | |
Status: | Open | |
Severity: * | 4 Minor | Description: | Symptom: Duplicate Remark created using object with range keyword in the "show acces-list" output
Conditions: You must be using the Object with range keyword
Workaround: You have to manually remove the remark using the "show run access-list" output
Further Problem Description:
| |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua71298 | Title: | Help arp in context shows arp permit-nonconnected | |
Status: | Fixed | |
Severity: | 4 Minor | Description: * | Symptom: Help arp in admin and user contexts shows arp permit-nonconnected entry, which is only available in system context.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur83911 | Title: | IPv6 DHCPRelay is not working in 100th Context in multimode | |
Status: | Open | |
Severity: * | 4 Minor | Description: | Symptom: IPv6 DHCPRelay is not working in 100th Context in multimode
Conditions: ASA in multimode
Workaround:
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 100.13(11.19), 9.1(2.8) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07393 | Title: | "sysopt traffic detailed-statistics" is removed after ASA reload | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: ASA command "sysopt traffic detailed-statistics" turns off automatically after reload
Conditions: 1. ASA is configured with 'sysopt traffic detailed-statistics' 2. The ASA is reloaded
Workaround: None
Further Problem Description:
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(3.37), 100.15(6.21), 100.15(8.12), 99.1(2.221) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCth38471 | Title: | Error message recommends using deprecated cach-fs command | |
Status: | Terminated | |
Severity: | 4 Minor | Description: * | Symptom: ASA Error when attempting to configure Anyconnect image:
rtpvpnoutbound6(config-webvpn)# anyconnect image flash:/anyconnect-macosx-i386$ ERROR: Unable to load Anyconnect image - extraction failed
Conditions: The 'cache-fs' comand was added in 8.0(2) and deprecated in 8.0(3). Subsequent versions do not support this command.
Workaround: Upgrade to version 8.2.5 or later. New versions allocate memory differently when loading SVC images and should not encounter this error.
Further Problem Description:
| |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 8.2(6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv62112 | Title: | show version and show tech show "BIOS Flash unknown" | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: You may see "BIOS Flash unknown @ 0x0, 0KB" in the show version and show tech outputs
Conditions: Affects ASA5506 appliances. Looking for bios flash information in show version or show tech output.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.15(0.23), 100.15(1.53), 100.15(15.15), 100.15(16.1), 100.15(2.83), 100.15(3.32), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuo72103 | Title: | ASA multi-context - SMTP logging not generating from system | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: SMTP logging is not sending log messages generated within the system execution space. For example, the failover log messages when a failover occurs. Other messages related to clustering are not sent either.
For example, messages like these are sent via email:
%ASA-1-104001: (Secondary) Switching to ACTIVE %ASA-1-104002: (Primary) Switching to STANDBY
Messages pertaining to the clustering operation are not sent via SMTP logging:
747003 747004 747005 747024
These messages are seen and sent to the syslog server.
Conditions: - ASA firewall in a multi-context configuration. - SMTP logging configured with messages being logged in the admin context. - Messages that are generated within the system execution space.
Workaround: Use syslogs to see the messages which are generated in the system execution space.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(2), 9.1(4), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.74), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.36), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv29505 | Title: | EEM Action Sometimes Executed Multiple Times | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Sometimes an event manager absolute time (time-of-day) applet can run multiple times.
Conditions: NTP is configured, or the system clock has been manually modified.
Workaround: None
Further Problem Description: This happens if the actual system time-of-day is earlier than the configured absolute time when the event manager applet runs. When that happens, the applet is then re-armed and will execute again that day at the expected time.
The applet execution time can get out-of-sync due to automatic time adjustments done by NTP, or if the system clock is manually changed via the "clock set" CLI command.
The fix for CSCuv02304 "EEM action not executed on absolute time when NTP is configured" reduced the likelihood of this happening, but there is still a possibility that it could occur.
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.133), 100.13(0.85), 100.14(0.66), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62), 100.15(3.16), 100.15(4.20), 100.15(5.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq09430 | Title: | ASA "debug webvpn anyconnect 255" not showing empty certificate issue | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: "debug webvpn anyconnect 255" should be much more in situations of empty certificate being sent
Conditions: Empty cert sent
Workaround: Troubleshoot the problem using capture on different end.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.65), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13), 100.14(6.9), 100.14(7.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua66557 | Title: | arp permit-nonconnected not indented in help arp multiplei mode | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: Help arp in multiple mode has incorrect indentation for "arp permit-nonconnected" entry.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 05-SEP-2015 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus22893 | Title: | Extra space after newline in some syslogs | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: There is an extra whitespace character after the newline character in syslogs:
733104 733105 734001 717012 717011 717010 717009 717008 717007 717006 717005 717004 717003
Conditions: This is seen in all versions of ASA code. Refer to the bug details for more information on fixed version.
Workaround: None, this is purely cosmetic.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(5), 9.2(3), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.28), 100.14(7.28), 100.15(0.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut39154 | Title: | Cluster trace message misspelled | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: The cluster message Mar 05 17:51:54.425 [DBUG]Send CCP message to id 3: CCP_MSG_QUIT from IFW-5585-CL-02 to IFW-5585-CL-04 for reason CLUSTER_QUIT_REASON_CLUSTER_TREADOWN
has the reason misspelled. It should be CLUSTER_QUIT_REASON_CLUSTER_TEARDOWN
Conditions: Cisco ASA running release 9.1.4.5 with clustering enabled. Issue occurs in the show cluster info trace output.
Workaround: None
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(4.5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.123), 100.13(0.68), 100.13(21.13), 100.14(0.10), 100.14(10.13), 100.14(26.11), 100.14(5.14), 100.14(6.13), 100.15(0.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut06553 | Title: | ASA - PBR Debug Output Shows HEX representation of DSCP Value w/o '0x' | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: The ASA policy-based routing debug output shows the HEX representation value and not the decimal value. This causes confusion since it looks like a decimal value due to the fact that the '0x' header is omitted. This is a cosmetic bug to modify the output so that the '0x' is printed in the output so that it's obvious that it is a HEX representation of the DSCP value.
Conditions: Using 'debug policy-route' to verify functionality of PBR on an ASA and viewing DSCP values
Workaround: N/A - this is a cosmetic issue.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37), 100.15(6.22), 100.15(8.13), 9.4(1.107) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCur91985 | Title: | ASA 5585 9.1.5.16 bcm_stat_sync errors on reboot | |
Status: | Terminated | |
Severity: | 5 Cosmetic | Description: | Symptom: ASA 5585 running 9.1.5.16. During reload, following errors are seen on the console
bcm_esw_clear_stats: bcm_stat_sync failed for unit 1, error -12 bcm_esw_clear_stats: bcm_stat_sync failed for unit 1, error -12-
Interface counters reflecting current status
Conditions: ASA 5585 platform. Errors are on unit 1. No running 'bcmCNTR.1' process in the show process output.
njASA5585-1/act# sh proc | i bcm Mwe 0x0000000001da2b88 0x00007ffecdde6168 0x00007ffed6182610 0 0x00007ffecddde380 32224/32768 bcmXGS3AsyncTX Mwe 0x0000000001da2b88 0x00007ffecddde138 0x00007ffed61815a0 0 0x00007ffecddd6330 32256/32768 bcmTX Msi 0x00000000021f4bc5 0x00007ffeceda4518 0x0000000005bc4010 384 0x00007ffeced9c680 31784/32768 bcmPOLL Mwe 0x0000000001da2bce 0x00007ffedb15f3a8 0x00007ffedb107e60 13462 0x00007ffedb1575d0 29400/32768 bcmLINK.1 Mwe 0x0000000001da2bce 0x00007ffedb1437f8 0x00007ffed61809b0 4447 0x00007ffedb13ba20 29656/32768 bcmLINK.0 Mwe 0x0000000001da2b88 0x00007ffecd49cd78 0x00007ffecd494ee0 0 0x00007ffecd494f50 32288/32768 bcmDPC Mwe 0x0000000001da2bce 0x00007ffeced26538 0x00007ffed6180ae0 2228 0x00007ffeced1e750 29976/32768 bcmCNTR.0
Workaround: None
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCui86305 | Title: | Add Remote Access VPN capability with firewall Clustering | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: This enhancement request is to track feature support for Remote access VPN terminating on an ASA running in a cluster.
This applies to both AnyConnect (using SSL and IKEV2) and IPSEC VPN clients (using IKEV1)
Conditions: ASA in clustering and Remote access VPN
Workaround:
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.1(3.53) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui67623 | Title: | SNMP: entPhySensorUnitsDisplay returns wrong data | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: According to the Cisco SNMP Navigator at http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en&translate=Translate&objectInput=1.3.6.1.2.1.99.1.1.1.6#oidContent the entPhySensorUnitsDisplay OID is supposed to return "A textual description of the data units that should be used in the display of entPhySensorValue." Instead it appears to return something like a description.
Conditions: Cisco ASA running release 8.6.1.10 with SNMP enabled.
Workaround: To get this information you can query the show inventory and show environment CLI.
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 8.6(1.10) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.117), 100.13(0.55), 100.13(21.10), 100.14(0.13), 100.14(0.4), 100.14(1.4), 100.14(10.23), 100.14(10.8), 100.14(11.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur55645 | Title: | Saleen: Add support for CISCO-ENTITY-SENSOR-EXT-MIB | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: ASA does not update or return the correct values for CISCO-ENTITY-SENSOR-EXT-MIB OIDs. This support was never added for the Saleen platforms
Conditions: Cisco ASA running release 9.2.1
Workaround: None within SNMP but you can get some of the values via the CLI
Further Problem Description:
| |
Last Modified: | 24-SEP-2015 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.117), 100.13(0.55), 100.13(21.10), 100.14(0.13), 100.14(0.4), 100.14(1.4), 100.14(10.23), 100.14(10.8), 100.14(11.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui93331 | Title: | ASA Policy-Based Routing (PBR) support | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: * | Symptom: ASA doesn't support Policy-Based Routing (PBR)
Conditions: -
Workaround: Note that the following workarounds can achieve PBR-like behavior, but are not fully tested. Please use them taking into account the introduced risk
Pre-8.3 code
We can manipulate the traffic to use another link, but only for specific destination/service not source IP/service.
nat (INSIDE) 1 0.0.0.0 0.0.0.0
!
global (ISP2) 1 interface
global (ISP1) 1 interface
!
route ISP1 0 0 192.168.1.250 <-- Default route pointing to ISP1
route ISP2 0 0 192.168.2.250 2 <-- Floating default route (Metric 2) via ISP2
!
nat (INSIDE) 1 0 0
global (ISP1) 1 interface
!all the traffic destined to any address on port 80 will be forcibly sent to ISP2
static (ISP2,INSIDE) tcp 0.0.0.0 80 0.0.0.0 80
If I want, I can sent to ISP1 traffic that goes to specific hosts for port TCP 80
static (ISP1,INSIDE) tcp 192.168.100.100 80 192.168.100.100 80
ASA codes 8.3.1 - 8.4.4.1
The NAT code in these releases doesn't have CSCtq47028 implemented. This creates problems achieving PBR-like behavior
ASA codes between 8.4.4.2 - 8.4.6.4, 9.0.1 - 9.0.3, 9.1.1 - 9.1.2.5
By specifying the destination service in a Twice NAT rule can 'force' the traffic to exit different interface. At the same time the source IP is checked so we have a PBR-like behavior.
route ISP1 0.0.0.0 0.0.0.0 192.168.0.121 1
route ISP2 0.0.0.0 0.0.0.0 192.168.27.2 2 <-- backup default route
!
object service WWW
service tcp destination eq www
!
object network HOST_10.10.10.11 <-- the host that you want to do PBR for host 10.10.10.11
!
!PAT host 10.10.10.11 to the IP of the interface ISP2 when accessing WWW
nat (INSIDE,ISP2) source dynamic HOST_10.10.10.11 interface service WWW WWW
!
!PAT the rest of the traffic to ISP1 interface IP
nat (INSIDE,ISP1) source dynamic any interface
Note: All IP addresses are private due to security reasons.
Further Problem Description:
| |
Last Modified: | 27-SEP-2015 | |
Known Affected Releases: | 8.4, 9.0(1), 9.1 | |
Known Fixed Releases: | 100.13(1.7), 100.13(11.23), 100.13(12.1), 100.13(12.2), 100.13(12.5), 100.13(12.8), 99.1(5.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur69271 | Title: | 5506-5508: "show file info lfbff-k8.SPA" missing version and wrong size | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: show file info for lfbff-k8.SPA images doesn;t display version and the file size is wrong: show file information disk0:/asa932-lfbff-k8.SPA show file information disk0:/asa-restapi-101-lfbff-k8.SPA
Conditions: show file info for lfbff-k8.SPA images doesn;t display version and the file size is wrong.
Workaround: Verify correct size of the image files via dir commands .
Further Problem Description:
| |
Last Modified: | 28-SEP-2015 | |
Known Affected Releases: | 100.12(0.96) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut78380 | Title: | ASA IPv6 ECMP routing does not load balance traffic | |
Status: * | Other | |
Severity: * | 6 Enhancement | Description: | Symptom: ASA is not load balancing IPv6 traffic Equal Cost Multi Path (ECMP) routes. Captures show that through the ASA traffic is not load balanced.
Conditions: ASA configured with Equal Cost Multi Path (ECMP) routes.
Workaround: None at this time.
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 9.1(2), 9.3(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtc26917 | Title: | ENH: Tracking Packet Count on Per-Connection Basis Through Netflow | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: * | Symptom: This is an enhancement request to add support for per-connection packet count tracking and export through Netflow on Adaptive Security Appliance (ASA).
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 8.2(1) | |
Known Fixed Releases: | 100.15(18.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCud90235 | Title: | SSH: ASA default config should support only SSHv2 | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptoms: The ASA default configuration should only support SSHv2 connections. The use of SSHv1 is not recommended for security reasons and, with this change, a user must explicitly enable it to allow a client to connect with any version other than SSHv2.
Conditions: ASA configured for SSH access.
Workaround: None
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 29-SEP-2015 | |
Known Affected Releases: | 100.12(0.65), 8.4(5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw21330 | Title: | ASA 9.4: ICMP Timeout of 2 seconds not applied for ICMP connections. | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: A minimal delay is observed for the 2 second timeout to be applied for ICMP connections.
Conditions: Underlying dynamic routing changes preventing ICMP reply to be received by inspection engine. All subsequent packets matching same tuple (IP, ID, SEQ) will match the existing connection.
Problem is not seen on the operating systems using ID randomization for ICMP packets. Problem is seen on IOS, where the ICMP echos have exactly the same ID.
Workaround: Relay on ICMP inspection closing the connection after the ICMP reply is received. Use an ICMP timeout of 3 seconds.
Further Problem Description: Problem reproduced locally. Packets below are matching the same connection:
1: 11:21:20.506779 10.10.0.2 > 10.0.0.2: icmp: echo request 2: 11:21:22.506886 10.10.0.2 > 10.0.0.2: icmp: echo request 3: 11:21:24.507008 10.10.0.2 > 10.0.0.2: icmp: echo request 4: 11:21:26.507114 10.10.0.2 > 10.0.0.2: icmp: echo request 5: 11:21:28.507236 10.10.0.2 > 10.0.0.2: icmp: echo request 6: 11:21:30.507343 10.10.0.2 > 10.0.0.2: icmp: echo request
Timeout is applied based on a packet queue, which may cause a delay.
| |
Last Modified: | 18-SEP-2015 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw29769 | Title: | Certificate map match on SubjectAltName URL component is not working | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: ASA certificate map is failing to parse Subject alternative name URI component . This can be seen in this message :
CRYPTO_PKI: Match of subject-alt-name field to map FAILED. Peer cert field: IP addr: 0.0.0.0, FQDN: , user FQDN: , User Principal Name(UPN): , map rule: alt-subject-name co scheme:unmanaged. // no URI info is included here .
This is causing anyconnect client not to land on the correct tunnel group .
Conditions: None
Workaround: Use the cert map to match on one of the following : IP address FQDN UPN
Further Problem Description: We can use the subject alternative name in crypto ca certificate maps .But looks like the ASA fails to match on the URI field which is a valid one as per the RFC :
id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 }
SubjectAltName ::= GeneralNames
GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName
GeneralName ::= CHOICE { otherName [0] OtherName, rfc822Name [1] IA5String, dNSName [2] IA5String, x400Address [3] ORAddress, directoryName [4] Name, ediPartyName [5] EDIPartyName, uniformResourceIdentifier [6] IA5String, iPAddress [7] OCTET STRING, registeredID [8] OBJECT IDENTIFIER }
OtherName ::= SEQUENCE { type-id OBJECT IDENTIFIER, value [0] EXPLICIT ANY DEFINED BY type-id }
EDIPartyName ::= SEQUENCE { nameAssigner [0] DirectoryString OPTIONAL, partyName [1] DirectoryString }
| |
Last Modified: | 18-SEP-2015 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw20109 | Title: | VMA: Updating source_event parameters | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Updating source_event API parameters from chars to predefined enums.
Conditions: Updating source_event API parameters from chars to predefined enums.
Workaround: None
Further Problem Description: None
| |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: | 100.15(14.1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtw47633 | Title: | ASA PKI needs to support IPv6 | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Currently there are no IPv6 support for any PKI feature on ASA
Conditions: ISSUE-1. IPv6 addresses that you enter to "enrollment url" gets truncated. crypto ca trustpoint bxbdevipv6 enrollment url http://[fd90:5000/certsrv/mscep/mscep.dll
ISSUE-2. In a case of dual stack deployments both A and AAAA record would be provided to resolve domain name, but according to rfc6555 "If the host's policy is unknown or not attainable, implementations MUST prefer IPv6 over IPv4.". The following message is provided: %ASA-ca-4-717026: Name lookup failed for hostname bxb2008dev-root during PKI operation.
Workaround: To use IPv4 addresses instead of domain names for dual stack deployments
More Info:
| |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: * | 100.8(0.40), 9.0(1), 9.1(2), 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw20102 | Title: | VMA: Update parameters for source_event API | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Updating parameters to use predefined enums instead of chars
Conditions: Updating parameters to use predefined enums instead of chars
Workaround:
Further Problem Description:
| |
Last Modified: | 11-SEP-2015 | |
Known Affected Releases: | 100.15(14.1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsh24794 | Title: | CS: PocketPC is unable to download p12 file - popups not supported | |
Status: * | Terminated | |
Severity: | 6 Enhancement | Description: * | Symptom: Attempting to enroll a Pocket PC device with the ASA Local CA may not be able to download and save the certificate file because PocketPC verison of Internet Explorer doesn't support popups.
Conditions:
Workaround: None
Further Problem Description:
| |
Last Modified: | 10-SEP-2015 | |
Known Affected Releases: | 8.0(0.159) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw16807 | Title: | ENH: To make sysopt connection timewait value as user changeable | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: TCP connection Timewait is disabled by default on ASA. Following command needs to be run to enable TCP Timewait which will make the ASA to retain the connection information for 15 seconds after the TCP CLOSE.
sysopt connection time wait
http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/S/cmdref3/s17.html#pgfId-1572802
Opening this enhancement to provide the option to change the timewait value from default 15 seconds to custom value.
Conditions: TCP timewait enabled on ASA
sysopt connection time wait
Workaround: na
Further Problem Description:
| |
Last Modified: | 09-SEP-2015 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw16361 | Title: | Implement support for PingOne IdP for SAML 2.0 | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Currently we only qualified four IdPs oracle OAM, MS ADFS, Sales force and oneLogin for SAML 2.0 authentication. Customer is trying to utlize PingOne and ran into issue. Hence they would like support for PingOne IdP for SAML 2.0 authentication.
Conditions:
Workaround: None. Enhancement Request
Further Problem Description: | |
Last Modified: | 08-SEP-2015 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsm90809 | Title: | DNS inspection support for DNS over TCP | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: DNS queries using TCP may be dropped from TCP inspections on the ASA
Conditions: DNS inspection
Workaround: use UDP queries with DNS inspection
Further Problem Description: DNS inspection does not support TCP yet. The Modular Policy Framework class-map should not direct TCP DNS packets to the inspection engine. If it does, the packets may be dropped by the inspection engine
| |
Last Modified: | 05-SEP-2015 | |
Known Affected Releases: | 7.2(3) | |
Known Fixed Releases: * | 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.31), 100.15(6.19), 100.15(6.20), 100.15(8.13) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw12459 | Title: | ASA ENH Support for VPN Radius Attribute IE-Proxy-Method = Use pac | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: ASA does support the following radius authorization attributes when setting up vpn session: http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/ref_extserver.html#wp1546973
This enhancement is to support the new value for attribute IE-Proxy-Method: 5 - Use PAC That can already be configured via CLI ("msie-proxy method use-pac")
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 05-SEP-2015 | |
Known Affected Releases: | 9.4(1.230) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw02001 | Title: | ASA 9.5.1 self-signed cert is applied instead of ssl trust-point defined | |
Status: * | Other | |
Severity: * | 6 Enhancement | Description: | Symptom: --- ASA ssl certificate is not applied correctly, when accessing ASA via https self-signed certificate is presented
Conditions: --- ASA 9.5.1; --- identity + ca certificates are installed and applied via ssl trust-point command; --- show ssl shows self-signed certs instead: BSNS-ASA5515-11# sh ssl Accept connections using SSLv3 or greater and negotiate to TLSv1 or greater Start connections using TLSv1 and negotiate to TLSv1 or greater SSL DH Group: group2 (1024-bit modulus) SSL ECDH Group: group19 (256-bit EC)
SSL trust-points: Self-signed (RSA 2048 bits RSA-SHA256) certificate available Self-signed (EC 256 bits ecdsa-with-SHA256) certificate available Interface outside: EXAMPLE (RSA 1024 bits RSA-SHA1) VPNLB interface outside: EXAMPLE (RSA 1024 bits RSA-SHA1) Certificate authentication is not enabled
Workaround: --- Downgrade, ASA 9.2.4 works fine.
Further Problem Description:
| |
Last Modified: | 04-SEP-2015 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut09778 | Title: | ASA : PAT round-robin replacing an existing pool based NAT fails to work | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom: PAT round-robin replacing an existing pool based NAT does not work properly. The new connections continue to use the first IP unless the pool is exhausted
Conditions: 1. ASA configure with a NAT statement having pat-pool: nat (inside,outside) source dynamic PAT_SOURCE pat-pool PAT_POOL 2. This pat-pool NAT is replaced by a round-robin NAT: nat (inside,outside) source dynamic PAT_SOURCE pat-pool PAT_POOL round-robin
Workaround: 1. Remove the existing round-robin NAT statement 2. Clear xlate 3. Re-add the NAT statement
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu19594 | Title: | Non-existent bridge id is assigned to interface is accepted | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: Assigning the non-existent bridge id to the interface , there was no error message regarding bridge id .
Conditions: ASA Version : 9.4.1 Rest-Api Version:asa-restapi-111-lfbff-k8.SPA
Workaround: Non-existent bridge id can be assigned to interface, but it doesn't impact the behavior . Later we can create an bvi interface with same id.
Manually we need to check while assigning the bridge id to interface .
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.4(1.49) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu35854 | Title: | The engine ID goes out of sync during upgrade of the ASA | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: The SNMP stops working for a FO pair when doing a zero-downtime upgrade. The engine-ID of the ASAs goes out of sync causing the SNMP to fail.
Conditions: Zero-downtime upgrade being performed on an ASA FO pair.
Workaround: None known.
Further Problem Description:
| |
Last Modified: | 03-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37), 100.15(6.22) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw06253 | Title: | Enh: Privilege levels or command author should work in system context | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Local/remote command authorization cannot be done in system context. This is an enhancement request to get this feature implemented.
Conditions: - Multi-Context ASA - Any version of ASA.
Workaround:
Further Problem Description:
| |
Last Modified: | 02-SEP-2015 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw06126 | Title: | ENH - syslog generated for captures that are running on ASA | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: This is an Enhancement request to create/generate a syslog(Severity 2 ? Critical conditions) after a specific threshold is exceeded:
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 02-SEP-2015 | |
Known Affected Releases: | 9.1, 9.2 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu02219 | Title: * | ASAv Smart licensing timers shoud be user configurable | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom: ASAv failes to get Smart License for long time due to messageing delay or packet drop
Conditions: N/A
Workaround: manually retry with "license smart register idtoken force"
Further Problem Description:
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw48547 | Title: | ENH: Add Clientless VPN Support-Remote Access VPN in Multi-Context Mode | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: This is an enhancement request.
Add support for Clientless VPN Remote For Access VPN in Multi-Context Mode.
Conditions: ASA is in mupltiple context
Workaround: Use AnyConnect
Further Problem Description:
| |
Last Modified: | 01-OCT-2015 | |
Known Affected Releases: | 9.5(1.53) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw02683 | Title: | ASA DOC - Need for a routing entry when using "set interface" in PBR | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: When using Policy Based Routing with "set interface" action, it is mandatory to have a route for the destination which can be routed via the interface configured by "set interface" command.
Conditions: ASA 9.4 when using PBR
Workaround:
Further Problem Description:
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 9.4 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw02556 | Title: | ASA ENH - Adding log message to track packets of closed connections | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: This enhancement was created to add additional log message to inform about packets that arrived on ASA interfaces after the connection was already closed.
Conditions: ASA logging
Workaround:
Further Problem Description:
| |
Last Modified: | 01-SEP-2015 | |
Known Affected Releases: | 9.2 | |
Known Fixed Releases: | | |
|
| |
|
I truly adored reading your posting. the vpn connection failed due to unsuccessful domain name resolution
回复删除