Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7
| |
| |
Alert Type: | New File | File Name: | asa917-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7
| |
| |
Alert Type: | New File | File Name: | asa917-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7
| |
| |
Alert Type: | New File | File Name: | asa917-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5505 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7
| |
| |
Alert Type: | New File | File Name: | asa917-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5515-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5525-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5545-X Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5540 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7
| |
| |
Alert Type: | New File | File Name: | asa917-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5505, 5510, 5520, 5540, and ASA5550. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5550 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5510 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5555-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5512-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5520 Adaptive Security Appliance | Software Type: | Context Directory Agent (CDA) | Release Version: | CDA
| |
| |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5580 Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.4.2 Interim
| |
| |
Alert Type: | New File | File Name: | asa942-6-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.5.2.200
| |
| |
Alert Type: | New File | File Name: | asa952-203-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 28-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Software | Release Version: | 9.1.7.SMP
| |
| |
Alert Type: | New File | File Name: | asa917-smp-k8.bin | File Description: | Cisco Adaptive Security Appliance Software for the ASA 5512-x, 5515-x, 5525-x, 5545-x, 5555-x, 5580, 5585-x, and ASASM. Please read the Release Note prior to downloading this release. | File Release Date: | 18-JAN-2016 | | | | |
Software Updates for ASA 5500-X Series Firewalls
| ASA 5585-X Adaptive Security Appliance |
| | Adaptive Security Appliance (ASA) Software |
| | Suggested : | | | |
|
Software Updates for ASA 5500-X Series Firewalls
Product Name: | ASA 5585-X Adaptive Security Appliance | Software Type: | Adaptive Security Appliance (ASA) Device Manager | Release Version: | 7.5.2
| |
| |
Alert Type: | New File | File Name: | asdm-752-153.bin | File Description: | Cisco Adaptive Security Device Manager for ASA 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, 9.2, 9.3, 9.4, and 9.5. | File Release Date: | 21-JAN-2016 | | | | |
Known Bugs - ASA 5500-X Series Firewalls
| | |
Alert Type: | Updated * | Bug Id: | CSCut48009 | Title: | Traceback in thread CP Processing | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: ASA Crashes in CP Processing Thread
Conditions: -- Skinny inspection enabled. -- Skinny traffic contains StopMediaTransmission messages that are carried in the same packet as a StartMediaTransmission, StarMediaTransmissionACK, or a StartMediaAnnouncement. -- Depending on the how many of the above messages are seen the issue can take some time to happen (the more messages seen the faster the issue can happen).
Workaround: Disable Skinny Inspection
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5.19) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.122), 100.13(0.67), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.13), 100.14(26.10), 100.14(5.14), 100.14(6.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu84085 | Title: | DHCP-DHCP Proxy thread traceback shortly after failover and reload | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: Crash as soon as the standby unit becomes primary
Conditions: DHCP configured on ASA running 9.1(6)5 or 9.1(6)6.
Workaround: Downgrade to 9.1(6)4
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(0.16), 100.14(0.30), 100.14(0.42) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.81), 100.14(0.49), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54), 100.15(3.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67965 | Title: | CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: ASA running 9.4.1 stops accepting IKEv2 connections.
Conditions: ASA5545 running 9.4.1 with certificate authentication for Windows Mobile phones. The ASA may print a pki debug message "CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached".
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.28), 100.14(10.23), 100.14(5.17), 100.14(7.33), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui27831 | Title: | Nested Traceback with No Crashinfo File Recorded on ACL Manipulation | |
Status: | Fixed | |
Severity: | 1 Catastrophic | Description: | Symptom: An Adaptive Security Appliance (ASA) or ASA Services Module (ASASM) may reload unexpectedly after an Access Control List (ACL) change when ACL Optimization feature is enabled with the object-group-search access-control command. The problem may also occur on the standby unit in a failover pair, which is performing bulk synchronization; in that case, the standby ASA may continue to reload repeatedly.
Conditions: ACL Optimization enabled.
Workaround: Disable ACL Optimization.
More Info:
| |
Last Modified: | 15-JAN-2016 | |
Known Affected Releases: | 9.1(2), 9.1(2.5) | |
Known Fixed Releases: * | 100.10(0.6), 100.8(27.85), 100.8(38.28), 100.8(40.16), 100.8(41.2), 100.8(60.34), 100.9(10.4), 100.9(6.32), 100.9(7.41), 9.0(3.100) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux33808 | Title: | ASA ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16] | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may reboot when FIPS is enabled with different errors displayed on console: "ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16]", ERROR: FIPS Self-Test failure, fips_continuous_rng_test [-1:12:0:2:19]
Conditions: ASA may reboot when FIPS is enabled with different errors displayed on console: "ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16]", ERROR: FIPS Self-Test failure, fips_continuous_rng_test [-1:12:0:2:19]
Workaround: Reload ASA or must disable fips mode, 'no fips enable".
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.13(0.126), 100.15(0.111), 96.1(1.58), 96.2(1.109) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut40770 | Title: | Interface TLV to SFR is corrupt when frame is longer than 2048 bytes | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Some configured ASA interfaces missing or not displayed from Firesight Management Center
Conditions: Interface TLV ethernet frame greater than 2048 bytes. Usually occurs with multiple interfaces and sub-interfaces configured with lengthy names for each interface.
Workaround: Enable jumbo-frame reservation on ASA.
Further Problem Description:
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.3(1.221), 9.4(2) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.80), 100.15(20.14), 100.15(20.15), 100.15(8.27), 100.16(0.8), 100.16(1.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy01438 | Title: | ASA crash after upgrade to 9.5.2 | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: Crash seen when performing an upgrade from 9.3.1 to 9.5.2
Conditions: There were no configuration changes made during the upgrade
Workaround: NA
Further Problem Description:
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux98913 | Title: | ASA: Traceback on the ASA unit related to DNS inspection | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA device traceback possibly related to the DNS configuration
Conditions: DNS inspection enabled on the ASA unit
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy03024 | Title: | ASA may traceback in idfw_proc after upgrade to 9.5(2) | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA may traceback in idfw_proc after upgrade to 9.5(2)
Conditions: upgrade to 9.5(2)
Workaround:
Further Problem Description:
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux98621 | Title: | ASA may leak memory in 4096 byte bin on SSH Rekey Timeout | |
Status: | Other | |
Severity: | 2 Severe | Description: * | Symptom: Memory usage on ASA spikes suddenly to ~100%. The only way to recover memory is to reload the ASA. The memory leak happens in binsize 4096.
ciscoasa# sh mem det | in POOL|statistics|4096 MEMPOOL_DMA_ALT1 POOL STATS: ----- fragmented memory statistics ----- ----- allocated memory statistics ----- 2048 2 4096 MEMPOOL_DMA POOL STATS: ----- fragmented memory statistics ----- 256 128 40960 ----- allocated memory statistics ----- MEMPOOL_GLOBAL_SHARED POOL STATS: ----- fragmented memory statistics ----- 4096 1 5568 ----- allocated memory statistics ----- 4096 5089356 20846002176 <===== High value.
Conditions: All of the following conditions must be met.
1. There was an active SSH session on ASA. 2. ASA initiated the REKEY in the ssh session. 3. At the time of rekey, an interruptible command (ping, traceroute, real-time captures) was in progress. Or ASA was in process of writing some data on the SSH channel. 4. Client has stopped responding to the ASA, because of which the rekey initiated by the ASA will eventually timeout.
Workaround: 1. Gracefully disconnect SSH sessions if you do not plan to use it for considerable time. 2. Keep the ssh timeout as low as possible. It will reduce the possibility of hitting the conditions. Recommended is the default value (5 minutes)
Further Problem Description: ASA initiates SSH Rekey after every 55 min (approx) period. The output of "show ssh session detail" displays the time remaining before a Rekey will be initiated.
ciscoasa# sh ssh sess det
SSH Session ID : 0 Client IP : X.X.X.X Username : cisco SSH Version : 2.0 State : SessionStarted Inbound Statistics Encryption : aes128-ctr HMAC : md5 Bytes Received : 544 Outbound Statistics Encryption : aes128-ctr HMAC : md5 Bytes Transmitted : 5360 Rekey Information Time Remaining (sec) : 3292 <======== Data Remaining (bytes): 996141840 Last Rekey : 12:11:54.832 UTC Mon Jan 25 2016 Data-Based Rekeys : 0 Time-Based Rekeys : 0
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy01420 | Title: | ASA traceback in Thread Name: Unicorn Proxy Thread. | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA failover pair crashing in Thread Name: Unicorn Proxy Thread
Conditions: ASA5585-SSP-60 running version 9.5.2.
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut03495 | Title: | Cisco ASA DNS Denial of Service Vulnerability | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.
The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a request to an affected Cisco ASA appliance to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.
Note: Only traffic directed to the affected device can be used to exploit this vulnerability. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns1
Conditions: See Security Advisory
Workaround: See Security Advisory
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-6325 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 100.13(0.35), 9.2(1) | |
Known Fixed Releases: | 100.11(0.57), 100.12(0.120), 100.13(0.61), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux82168 | Title: | LDAP over SSL (LDAP-S) authentication failing | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: LDAP-secure over SSL (LDAP-S, port 636) authentication is failing for ASA releases 9.3.2, 9.4.x and 9.5.x.
LDAP (non secure, port 389) authentication is functional
Conditions: LDAP-over-SSL authentication for operations such as remote access VPN.
Workaround: Use LDAP (non-secure, port 389) .
Further Problem Description:
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: * | 9.3(2), 9.4(1.112), 9.4(2), 9.5(1.4), 9.5(1.5), 9.5(2), 96.1(1.58) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux23804 | Title: | ASA: Block depletion due to syslog server unreachable on port channel | |
Status: | Terminated | |
Severity: | 2 Severe | Description: * | Symptom: Block 256 and 1550 get depleted due to syslog server configured on port channel becomes unreachable. Issue is not seen on 9.x . Only 8.4 is affected by this bug.
Conditions: UDP syslog server configured on port channel becomes unreachable.
Workaround: No work around to prevent this issue from happening. Use physical interface to configure syslog server
Further Problem Description: | |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 8.4(7.26) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuy05714 | Title: | ASA Interfaces on SSP Module 1 flap when SFR software is rebooted | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: If the Firepower Software is rebooted on the SSP module on a 5585, then the interfaces on that SSP module will bounce for about 30 seconds. This causes traffic on those interfaces to get dropped, and can cause a possible outage.
Conditions: Firepower SSP Module installed on 5585 chassis Active traffic on interfaces on the module (ASA SSP interfaces begin with 0/ and SFR SSP interfaces begin with 1/)
Workaround: 1) Don't use Interfaces on the SSP Module 1 with active traffic while rebooting the Firepower software.
2) If upgrading or rebooting a failover pair, perform the action on the standby, wait until it comes up, and then force it to active so that there is no downtime due to the active ASA flapping interfaces.
Further Problem Description:
| |
Last Modified: | 30-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuy05949 | Title: | ASA: MAC address changes on active context when WRITE STANDBY is issued | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: In an Active-Active HA setup, when one group is active on the secondary ASA and a write standby command is issued, the mac-address changes for both the active and standby contexts in that group.
Conditions: -multi-context HA pair -the write standby command should be issued on the active context of the secondary ASA.
Workaround:
Further Problem Description:
| |
Last Modified: | 30-JAN-2016 | |
Known Affected Releases: | 9.1(7) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux40311 | Title: | ASA: Watchdog traceback without crashinfo on 100% memory usage | |
Status: | Terminated | |
Severity: | 2 Severe | Description: * | Symptom: ASA reloads without writing any crashinfo
Conditions: ASA's memory usage at the time of reload was 100%
Workaround:
Further Problem Description: If ASA reloads due to software error, it writes a crashinfo to the disk. But in high memory usage conditions, ASA may fail to generate crashinfo. Note that this bug is only for investigation of the crash, irrespective of the source of high memory usage.
| |
Last Modified: | 30-JAN-2016 | |
Known Affected Releases: | 9.4(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv20449 | Title: | Traceback in Thread Name: ssh when using capture or continuous ping | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA Traceback in Thread Name: ssh
Conditions: The crash happens when a rare condition is hit when two things are happening simultaneously. They are:
1. An interruptible command is in progress in a SSH session. Examples are ping, traceroute, real-time captures etc. 2. ASA and SSH Client are in process of rekeying the SSH connection. This rekey would normally take place approximately after every 60 minute period in an SSH session.
Workaround: Avoid running interruptible commands in a SSH session which has been active for over 50 minutes.
Further Problem Description:
| |
Last Modified: | 01-FEB-2016 | |
Known Affected Releases: | 9.1(6), 9.1(6.1), 9.1(6.4), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.127) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux03626 | Title: | Traceback in thread name: Unicorn Proxy Thread | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA running code 9.5(1)4 faced a Traceback in Unicorn Proxy Thread.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 9.5(1.4) | |
Known Fixed Releases: * | 100.13(0.127), 96.1(1.59), 96.2(1.110) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux27903 | Title: | BOSC Runtime Buffer overflow error detected while executing OSPFV3 Tests | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco ASA crashes with BOSC Runtime Buffer overflow error
Conditions: OSPFv3 configured and crafted packets are sent to the ospf interface
Workaround: None
Further Problem Description: System Affected
| |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 100.16(0.7) | |
Known Fixed Releases: * | 100.13(0.127), 96.1(1.62), 96.2(1.111) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuy06600 | Title: | ASA crash in Kerberos (KCD) process during Clientless WebVPN operations | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: ASA crashed in Kerberos (KCD) process during Clientless WebVPN operations.
Conditions: Kerberos (KCD) is used for Clientless WebVPN.
Workaround: none
Further Problem Description:
| |
Last Modified: | 01-FEB-2016 | |
Known Affected Releases: | 9.0(4.29) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz98516 | Title: | Observed Traceback in SNMP while querying GET BULK for 'xlate count' | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA firewall may crash when being polled by SNMP in rare circumstances.
Conditions: This has been seen primarily in the 8.4.x ASA code train. The first fix is in ASA interim code 8.4.4.2. To trigger the bug, the ASA must be queried via SMP for GETBULK of the xlate OID:
1.3.6.1.4.1.9.10.77.1.2.1
Workaround: Stop polling the ASA firewall via SNMP until an upgrade to the fixed code can be performed or modify the OID's being polled by your SNMP monitor station to not include the affected OIDs. | |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 100.7(22.1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.127), 100.13(0.58), 100.13(28.2), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq97035 | Title: | WEBVPN: Citrix 5/6 application doesn't launch with IE10/Windows 7 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Citrix 5/6 application doesn't launch with IE10
Conditions: Windows 7 SP1, IE10, Citrix ICA client 14.1.0 32-bit
Workaround: Use IE11 or FF 28+
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.87), 100.14(0.67), 100.14(16.8), 100.14(5.32), 100.15(0.20), 100.15(1.35), 100.15(10.4), 100.15(2.66) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu56912 | Title: | ASA change non-default port to 443 for https traffic redirected to CWS | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA change non-default port to 443 for https traffic redirected to CWS
When user type in web browser url htts://X.X.X.X:YYYY debug scansafe generates ... Complete Connect Method (513) CONNECT X.X.X.X:443 HTTP/1.0 HOST: X.X.X.X:443 ...
For traffic captured on outside interface towards CWS tower in 'Follow TCP Stream' statistic Wireshark display CONNECT X.X.X.X:443 HTTP/1.0 HOST: X.X.X.X:443
Conditions: ASA is configured to redirect non-default port for https traffic to CWS.
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0, 9.1, 9.4 | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.13(29.28), 100.14(0.39), 100.14(16.1), 100.14(5.19), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88437 | Title: | ASA5506-X:copy file operations fail with jumbo-frame-reservation config | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptom: Copy file operations fail with error when running these images (9.4.1.1, 9.4.1.2) on a ASA-5506-X, when the config is enabled for "jumbo-frame reservation". The error displayed is as below:
"Error writing disk0:/ (Cannot allocate memory)"
It doesn't matter what file you operate on , an asdm or an lfbff image , and whether you are copying ftp/tftp to disk0 or just simply copying a file on disk0://file to disk0://file1. I used asdm-732.bin image for this operation: "copy disk0:/asdm-732.bin disk0:/asdm1", which errors out with above error.
Conditions: Copying file operations to disk0 on a ASA5506-X.
Workaround: Remove the "jumbo-frame reservation" CLI config, reboot, and then copy operations succeed.Re-enable the CLI after copy operations are complete.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(0.47) | |
Known Fixed Releases: * | 100.13(0.81), 100.14(0.48), 100.14(0.49), 100.14(0.66), 100.14(16.1), 100.14(16.3), 100.14(5.23), 100.14(5.26), 100.14(7.42), 100.15(0.17) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68860 | Title: | Linux Kernel raw_cmd_copyout() Local Privilege Escalation Vulnerabilit | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-1738
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-1738 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw09578 | Title: | ASA 9.3.3.224 traceback in ak47_platform.c with WebVPN stress test | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA 5585-20 in Failover Active/Standby assembly Traceback
Conditions:
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.224) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.14(5.34), 100.15(0.32), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw12844 | Title: | ASAv: Support for VFAT config_drive_format in openstack | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAv not able to load config file at the time of instantiation with config-drive format VFAT in openstack
Conditions: Openstack provides options to append a config file to ASAv and put it into config-drive and made available to VM. There are two config drive options in openstack: ISO9660 VFAT
With "ISO9660" format this takes the form of virtual CDROM. This is supported currently in ASAv.
With "VFAT" format this takes the form of virtual disk drive. This is not supported currently in ASAv.
Workaround: None
Further Problem Description: Openstack provides options to append a config file to ASAv and put it into config-drive and made available to VM. There are two config drive options in openstack: ISO9660 VFAT
With "ISO9660" format this takes the form of virtual CDROM. This is supported currently in ASAv.
With "VFAT" format this takes the form of virtual disk drive. This is not supported currently in ASAv.
This was fixed as part of DDTS below and integrated into multiple releases. http://cdetsweb-prd.cisco.com/apps/dumpcr?identifier=CSCuu86317&parentprogram=QDDTS.
Other commits have broken the fix.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.202), 9.5(1.200) | |
Known Fixed Releases: * | 100.14(0.76), 100.14(16.9), 100.14(5.33), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2), 100.16(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv10258 | Title: | ASA5505 permanent base license, temp secplus, failover, vlan count issue | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Show version display 3 VLANs license instead of 20 if base license, timebased for security plus license are combined on ASA5505 platform after failover is enabled
Conditions: Three combined condition: 1. Permanent base license 2. Timebased Security Plus License 3. Failover is enabled
Workaround: No known workaround
Further Problem Description: The problem exhibit itself after a reboot. Looks like a variant of CSCtf91862
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.86), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.34), 100.15(2.73), 100.15(3.17) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur99653 | Title: | Codenomicon HTTP-server suite may cause crash | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Codenomicon HTTP-server suite may cause crash
Conditions: Codenomicon server testing
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.12(0.108), 100.13(1.10), 9.3(1.113), 9.3(3.227) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.57), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu78835 | Title: | Webvpn rewrite issues for Confluence - by atlassian on latest v6.4.5 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: On the latest atlassian version of 6.4.5 for Confluence, we have following issues when using it over clientless SSL:
1. For a new "create content" page, only the title of the page can be added, the body of the page is not editable. 2. When trying to add a comment, the body of the comment is missing, so cannot add anything.
Conditions: Using Atlassian version 6.4.5 for Confluence
Workaround: Use the older versions of Atlassian
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.8(40.67), 9.2(2), 9.3(2), 9.3(3.229), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.57), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtg74172 | Title: | Can get around dynamic-filter by using caps in domain name | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Cisco ASA BTF feature should not be case sensitive. User can get around BTF feature with using CAP letters in domain names.
Conditions: Configuring whilte and black lists for BTF
Workaround:
Not known
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2(2.12) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.14(16.8), 100.14(5.32), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv43902 | Title: | ASA: Watchdog Traceback with Thread Name:- SXP CORE | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device traceback in thread name:- SXP CORE
Conditions: ASA device configured with the trust sec configuration.
Workaround: No workaround as of now
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: * | 100.12(0.138), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.53), 100.15(15.14), 100.15(16.1), 100.15(2.83) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv88785 | Title: | RA validation failed when CA/subCA contains name constraints | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension ASA fails with the error:
CRYPTO_PKI: Found a subject match - inserting the following cert record into certList CERT-C: I pkixpath.c(2728) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received CRYPTO_PKI: Unable to read CA/RA certificates.Error processing auth response. Unable to send PKI request CRYPTO_PKI: transaction PKCSReq completed CRYPTO_PKI: status: Crypto CA thread sleeps!
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1), 9.4(1.100), 9.4(1.201) | |
Known Fixed Releases: * | 100.13(0.100), 100.14(0.74), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc12967 | Title: | OSPF routes were missing on the Standby Firewall after the failover | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Loss of OSPF routes from the Standby device after the failover
Conditions: FW1 and FW2 are in HA both have the OSPF routes Sync. with each other. When FW1 failover to FW2, FW1 is missing the OSPF routes.
Workaround: No workaround | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(3.9), 8.4(4.1) | |
Known Fixed Releases: * | 100.7(13.104), 100.7(6.104), 100.8(0.242), 100.8(11.42), 100.8(27.20), 100.8(33.27), 100.8(34.1), 100.8(38.1), 100.8(39.1), 100.9(0.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut88287 | Title: | ASA Traceback in vpnfol_thread_msg | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device Traceback in vpnfol_thread_msg
Conditions: ASA device running in Active/Standby HA Pair.
Workaround: NONE
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.79), 100.13(29.28), 100.14(0.42), 100.14(16.1), 100.14(5.20), 100.14(7.39), 100.15(0.16), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68867 | Title: | Linux Kernel shmem_fallocate() Local Denial of Service Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-4171
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:W/RC:UR
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-4171 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw44744 | Title: | Traceback in WebVPN rewriter | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback while processing WebVPN connections in the rewriter
Conditions: ASA 5585 running special release 9.3.3.225.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.12(0.151), 100.13(0.114), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4), 100.16(1.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut75983 | Title: | ASA Traceback in PPP | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in ppp_timer_thread.
Conditions: ASA under heavy traffic. ASA is already dropping VPN tunnels.(Over-subscription of the ASA)
Workaround: none
Further Problem Description: ASA reloaded on its own.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(7) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv72064 | Title: | Network Time Protocol Daemon Authentication Bypass Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-9296
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-9296 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu27334 | Title: | ASA: Traceback with Thread Name - AAA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device Traceback with Thread Name:- AAA
Conditions: ASA device running ASA 9.1(4) version
Workaround: Upgrade to 9.1.6.4 or later.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(4) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.18), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07799 | Title: | Cisco ASA DNS Denial of Service Vulnerability | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: A vulnerability in the DNS code of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause an affected system to reload.
The vulnerability is due to improper processing of DNS packets. An attacker could exploit this vulnerability by sending a crafted request to an affected Cisco ASA device to cause it to generate a DNS request packet. The attacker would need to spoof the reply packet with a crafted DNS response.
Note: This vulnerability can be exploited only by traffic that is directed to the affected device. This vulnerability affects Cisco ASA Software configured in routed or transparent firewall mode and single or multiple context mode. This vulnerability can be triggered by IPv4 and IPv6 traffic.
Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151021-asa-dns2
Conditions: See Security Advisory
Workaround: See Security Advisory
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 7.1/5.9: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6.3) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.74), 100.13(21.13), 100.13(29.28), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.36), 100.14(7.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut92194 | Title: | ASA traceback in Thread Name: CP Processing | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA running version 9.3.2 is crashing intermittently on Thread Name: CP Processing.
Conditions: ASA is configured for Websense url filtering.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.19), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur07369 | Title: | SXP Version Mismatch Between ASA & N7K with clustering | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: SXP connection cannot be established when ASA cluster is interacting with a SXP peer running SXP version 1 protocol.
Conditions: (1) ASA is running cluster with 2 or more units and (2) SXP peer is running SXP version 1 protocol and (3) SXP peer hash the SXPv1 request from the SXP peer to reach the slave unit of the ASA instead of the master unit.
Workaround: - Upgrade SXP peer to run SXP version 2 or above, or - Change the IP address used for establishing SXP connection so that the hash algorithm may direct the SXPv1 request from the SXP peer to the master unit of the ASA cluster instead of the slave unit.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.143), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.68), 100.15(16.3), 100.15(17.1), 100.15(3.37), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut56198 | Title: | Clustering: Traceback in DATAPATH with transparent FW | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback occurred on one of the slave units in a 4 node cluster in the DATAPATH thread. Stack trace indicates that the ASA was doing a transparent firewall operation.
Conditions: Cisco ASA running release 9.2.1.213 and configured as a cluster slave with multi-context configuration which included mixed-mode contexts.
Workaround: None
Further Problem Description: Please see Eng-note.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(1.213), 9.3(2.108) | |
Known Fixed Releases: * | 100.11(0.57), 100.11(0.58), 100.12(0.120), 100.12(0.121), 100.13(0.61), 100.13(21.12), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur20322 | Title: | ASA 9.2.1 - DATAPATH Traceback in L2 cluster environment | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA in an L2 cluster environment causes a DATAPATH traceback. The unit comes back up but will not join the cluster and results in an RPC_SYSTEMERROR failure. Manual joining into the cluster causes an immediate crash after entering "enable".
Conditions: ASA operating in 9.2.1 code and in multi-context. ASA in a cluster L2 environment.
Workaround: No workaround at this time.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.11), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu86195 | Title: | conn-max counter is not decreased accordingly | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Problem description: - after the maximum number of TCP connections for a class-map are exceeded the counter for the active connections("current conns") starts to decrease into negative values - all the new connections that are matching our configured policy are dropped even if we are not exceeding the number of configured connections %ASA-3-201011: Connection limit exceeded -36/30 for input packet from 10.100.48.4/54675 to 172.29.41.10/8443 on interface in
Similar scenarios: - legitimate connections are dropped when the counter: - "current conns" is decreased into negative values; Ex: -36/30 - "current conns" is not dropping to zero(after all the connections are closed) and is stuck to a random value; Ex: 26/30 --> just 4 new connectios are allowed - "current conns" is going over the maximum value and is not dropping to zero(after all the connections are closed); Ex: 32/30
Conditions: issue observed in ASA software version 9.2.2 and 9.2.24(tested versions) just for TCP traffic
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(2), 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv57389 | Title: | ASA PKI: cert auth fails after upgrade to 9.1(6.4) / 9.1(6.6) / 9.1(6.8) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA running running 9.1(6.4) or 9.1(6.6) releases will fail to authenticate IKEv2/IPSec sessions using RSA-SIG for authentication.
The following error is generated in the IKEv2 debugs:
IKEv2-PROTO-2: (1): Verify peer's authentication data IKEv2-PLAT-1: (1): Failed to verify signature IKEv2-PROTO-1: (1): Failed to compute or verify a signature
Conditions: ASA running 9.1(6.4) or 9.1(6.6) and authenticating IKEv2/IPSec sessions using RSA-SIG.
This has only been observed when talking to an IOS Lan-to-Lan peer. Tests show IKEv2 Cert Auth with AnyConnect and ASA Lan-to-Lan peers is successful.
Workaround: A downgrade to 9.1(6.1) or 9.1(6) corrects the behavior. Preshared keys can also be used.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6.4), 9.1(6.6), 9.1(6.8) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.97), 100.14(16.8), 100.14(5.32), 100.15(0.25), 100.15(16.3), 100.15(17.1), 100.15(3.44), 100.15(6.29) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv25327 | Title: | bgp ipv6 neighborship fails with ASA after hard reset on router | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: bgp ipv6 neighborship fails with ASA after hard reset on router
Conditions: ASA with 9.5.1 or above has this issue.
Workaround: Reset connection on ASA using clear ip bgp * command.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(0.61) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.85), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu39615 | Title: | eglibc 2.18 is missing upstream fix #15073 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA could crash due to heap corruption
Conditions: Heavy memory allocation
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.3(2.2) | |
Known Fixed Releases: * | 100.12(0.127), 100.13(0.77), 100.13(21.16), 100.13(29.28), 100.14(0.30), 100.14(16.1), 100.14(5.19), 100.14(7.38), 100.15(0.13), 100.15(1.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw24664 | Title: | ASA:Traceback in Thread Name:- netfs_thread_init | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in netfs_thread_init
Conditions: ASA device configured with SSL webvpnconfiguration
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.113), 100.13(32.1), 100.14(0.79), 100.14(5.34), 100.15(0.53), 100.15(17.23), 100.15(3.76), 100.15(8.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu18989 | Title: | ASA %ASA-3-201011: Connection limit exceeded when not hitting max limit | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: It was noticed that when the maximum number of simultaneous connection limit is set, ASA might drop the connection with the error message ' %ASA-3-201011: Connection limit exceeded' even when it is clearly not close to hitting the maximum limit specified.
Conditions: ASA 5585 running 9.4(1) version code
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.83), 100.14(0.62), 100.14(16.1), 100.14(5.24), 100.14(7.45), 100.15(1.28), 100.15(10.3), 100.15(2.59) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur51645 | Title: | Linux Kernel ptrace Local Privilege Escalation Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-4699
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-4699 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu45812 | Title: | asa Traceback with Thread Name idfw_proc | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: asa Traceback with Thread Name idfw_proc
Conditions:
Workaround: no workaround available currently
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut29845 | Title: | Linux Kernel Netlink Message Security Bypass Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0181
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 1.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0181 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv10938 | Title: | 'redistribute' cmds under 'router eigrp' removed on deleting any context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: 'redistribute' commands under 'router eigrp' removed from unrelated contexts when deleting any context with EIGRP configured and redistribution enabled. Error of following format is seen on ASA's console:
ERROR: unable to locate route-map
Conditions: 1. ASA is multiple context mode. 2. More than one context on the ASA has EIGRP enabled with redistribution configured. 3. Issue seen on deleting any of the contexts that meet the criteria in point 2 above using command "no context ".
Workaround: None apart from re-adding all those commands back manually.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.85), 100.14(0.66), 100.14(16.2), 100.14(5.25), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw36853 | Title: | ASA: ICMP error loop on cluster CCL with Interface PAT | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Elevated CPU may be observed on 2 or more units of an ASA cluster. Packet captures on the cluster control link will show ICMP error packets looping continuously between the units displaying high CPU conditions.
Conditions: 1. ASA in Layer-2 cluster mode. 2. PAT configured. 3. ICMP error packet is received on a unit where that unit is the directory for embedded payload flow. 4. Embedded payload of the ICMP error packet matches an existing xlate entry but doesn't match any connections. The owner of the PAT address of the xlate is a different unit than the one where the packet is received.
Workaround: With Interface PAT, workaround is to deny ICMP on the ASA's interface using the 'icmp' command. With a PAT pool, workaround is to deny ICMP error packets on the interface ACL.
Or just add xlate per-session configuration.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.3), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.114), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv70932 | Title: | FO: ASAv crashed while syncing during upgrade from 9.4.1 to 9.5.1 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: FO: ASAv crashed while syncing during upgrade from 9.4.1 to 9.5.1
Conditions: Upgrade from 9.4.1 to 9.5.1 with huge customer configuration.
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68854 | Title: | Linux Kernel compat_sys_recvmmsg Function Local Privilege Escalation V | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0038
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:POC/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0038 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv01177 | Title: | ASA: traceback in IDFW AD agent | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA5585 in failover pair may traceback in IDFW process.
Conditions: ASA running IDFW features.
Workaround: Disable IDFW.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur54853 | Title: | Linux Kernel NF_CONNTRACK Local Information Disclosure Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-1690
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-1690 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw59388 | Title: | Unable to load ASDM to a Context in Multiple Context Mode | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Unable to load ASDM to a context when ASA is in Multiple Context Mode.
Conditions: ASA Running In multiple Context
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.15(0.72), 9.5(1.53), 99.1(3.147), 99.1(3.182), 99.1(3.95) | |
Known Fixed Releases: * | 100.15(0.73), 100.15(17.33), 100.15(20.12), 100.15(8.23), 100.16(0.7), 100.16(1.20), 9.5(1.99), 9.5(2), 99.1(3.186) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut44082 | Title: | EIGRP configuration not being correctly replicated between failover ASAs | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: We have found that the 'no passive-interface (interface-name)' and the 'distribute-list (distr-list-name) out interface (interface-name)' commands are not being correctly replicated between a pair of ASA firewalls configured in failover.
Conditions: This issue occurs just when the active FW is replicating the configuration to the standby unit in the following two scenarios:
1.- When issuing the 'write standby' in the active FW.
OR
2.- When after rebooting the standby unit, the active unit automatically replicates the configuration to the standby unit.
(ASA-1/pri/act# Beginning configuration replication: Sending to mate. End Configuration Replication to mate)
NOTE: In the recreation lab just disappears the distribution list but in the production environment one of the 'no passive-interface' commands disappears too.
Workaround: While running ASA codes 9.2(2)4, 9.2(3) and 9.3(2):
1.- Avoid using the 'write standby' command in the active ASA and just use the 'write memory' or the 'copy running-config startup-config'.
2.- If for whatever reason the standby unit is being rebooted, then you will need to manually add the EIGRP missing configuration lines in the active unit in order to allow the standby unit to receive the whole needed EIGRP configuration.
I already confirmed this EIGRP replication issue is not happening when running codes 8.6(1), 9.1(1) and 9.1(5), then downgrading to these ASA codes is another workaround.
Further Problem Description: Here the detail EIGRP configuration for our testing:
ASA-1/pri/act(config)# router eigrp 7 ASA-1/pri/act(config-router)# no auto-summary ASA-1/pri/act(config-router)# distribute-list NO-PUB-ROUTES-OUT out interface $ ASA-1/pri/act(config-router)# distribute-list NO-PUB-ROUTES-OUT out interface $ ASA-1/pri/act(config-router)# distribute-list NO-PUB-ROUTES-OUT out interface $ ASA-1/pri/act(config-router)# network 10.1.4.0 255.255.254.0 ASA-1/pri/act(config-router)# network 10.1.50.16 255.255.255.248 ASA-1/pri/act(config-router)# network 10.1.94.0 255.255.254.0 ASA-1/pri/act(config-router)# network 10.1.97.0 255.255.255.128 ASA-1/pri/act(config-router)# network 10.6.254.128 255.255.255.128 ASA-1/pri/act(config-router)# network 198.209.254.0 255.255.255.0 ASA-1/pri/act(config-router)# network 198.209.255.0 255.255.255.0 ASA-1/pri/act(config-router)# passive-interface default ASA-1/pri/act(config-router)# no passive-interface outside ASA-1/pri/act(config-router)# no passive-interface inside ASA-1/pri/act(config-router)# no passive-interface dmvpndmz ASA-1/pri/act(config-router)# no passive-interface stldcdmz
ASA-1/pri/act# sh run router router eigrp 7 distribute-list NO-PUB-ROUTES-OUT out interface inside distribute-list NO-PUB-ROUTES-OUT out interface dmvpndmz distribute-list NO-PUB-ROUTES-OUT out interface stldcdmz network 10.1.4.0 255.255.254.0 network 10.1.94.0 255.255.254.0 network 10.1.97.0 255.255.255.128 network 198.209.254.0 255.255.255.0 network 198.209.255.0 255.255.255.0 network 10.1.50.16 255.255.255.248 network 10.6.254.128 255.255.255.128 passive-interface default no passive-interface inside no passive-interface dmvpndmz no passive-interface stldcdmz no passive-interface outside
ASA-1/pri/act# sh run all router router eigrp 7 no auto-summary distance eigrp 90 170 distribute-list NO-PUB-ROUTES-OUT out interface inside distribute-list NO-PUB-ROUTES-OUT out interface dmvpndmz distribute-list NO-PUB-ROUTES-OUT out interface stl | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(2.4), 9.2(3), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.38) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv07106 | Title: | ASATraceback in ssh whilst adding new line to extended ACL | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in ssh whilst adding an extended ACL
Conditions: Making a change to an ACL that is part of class-map which is then applied under policy-map
Workaround: 1. Remove any ethertype ACL if any configured. e.g. no access-list bpdu-deny ethertype deny bpdu
2. Do modification/add new ACE to ACL associated with class-map
3. Reapply ethertype removed and with its relevant configuration
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(7.22), 8.4(7.27), 8.4(7.28) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut39985 | Title: | Per-session PAT RST sent to incorrect direction after closing session | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When Per-session PAT is configured, RST,ACK is sent to Non close initiator side after closing TCP session. It should be sent to close initiator side(The device which send FIN first).
xlate per-session permit tcp any4 any4 no xlate per-session deny tcp any4 any4
Conditions: Per-session PAT is configured like below
xlate per-session permit tcp any4 any4 no xlate per-session deny tcp any4 any4
Workaround: Disable Per-session PAT
xlate per-session deny tcp any4 any4
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1 | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.65), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv51649 | Title: | SSL : Unable to Join nodes in Cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA slave is unable to join cluster and fails with the error "cluster_ccp_make_rpc_call failed to clnt_call. msg is CCP_MSG_REGISTER". Debugs with "debug ssl 255" show the error message -
error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460 error:14080FA3:SSL routines:SSL3_ACCEPT:setup crypto context failed@s3_srvr.c:460
Conditions: Attempting to join the cluster on ASA slave using "enable" command fails with an rpc error message
Workaround: Remove the RC4 cipher using either of the following commands -
ssl cipher default custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA" ssl cipher tlsv1 custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA" ssl cipher dtlsv1 custom "DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:AES128-SHA"
OR use the older version of the same command -
ssl encryption dhe-aes128-sha1 dhe-aes256-sha1 aes128-sha1
Then, attempt to join the cluster again
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.15(3.19) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.33), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu87823 | Title: | ASAv traceback in DATAPATH when used for WebVPN | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAv traceback in DATAPATH when used for WebVPN
Conditions: ASAv running release 9.4.1 and configured for WebVPN
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.143), 100.13(0.95), 100.13(29.28), 100.14(0.71), 100.14(16.5), 100.14(5.30), 100.15(0.24), 100.15(1.68), 100.15(16.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus32005 | Title: | ASA - Traceback in thread name SSH while applying BGP show commands | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in thread name SSH during performing BGP show commands.
Conditions: ASA running 9.2.2.4
Workaround: not known
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(2.4) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.56), 100.13(21.10), 100.13(29.28), 100.14(0.5), 100.14(1.4), 100.14(10.8), 100.14(11.8), 100.14(2.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv39775 | Title: | ASA cluster-Incorrect "current conns" counter in service-policy | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Incorrect "currents conns" counter on service-policy ASA cluster. Does not match up with the current connection "show connection count" on the unit, will lead to traffic drops in the service-policy once the limit is hit in the service-policy.
Conditions:
1) ASA in a cluster setup. 2) Applies to both single or multiple mode. 3) Typical config : class connection_limit set connection conn-max 500000 embryonic-conn-max 2000 per-client-max 200 per-client-embryonic-max 50
Workaround: None.
Further Problem Description: CLSTR1-Primary/ASAFW# cluster exec show service-policy | i conns CLSTR1-Primary(LOCAL):************************************************ current embryonic conns 3, current conns 5732, drop 0 CLSTR1-Secondary:******************************************************* current embryonic conns 1, current conns 88720, drop 0 <<<< CLSTR1-Primary/ASAFW# cluster exec show conn count CLSTR1-Primary(LOCAL):************************************************ 5823 in use, 36602 most used Cluster stub connections: 3300 in use, 30142491 most used CLSTR1-Secondary:******************************************************* 3270 in use, 120262 most used <<<<<<<<<<<<<< | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(2), 9.2(2.4), 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(15.11), 100.15(16.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68870 | Title: | Linux Kernel SCTP NULL Pointer Dereference Remote Denial of Service Vu | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-5077
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-5077 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68871 | Title: | QEMU L2 Table Size Validation Integer Overflow Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0222
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0222 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw29566 | Title: | ASA5585 9.5(1): Support Failover Lan on Management0/0 port | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Post upgrade to 9.5(1) version code, ASA does not permit configuring Management0/0 port as a Failover lan interface.
Conditions: Observed on ASA 5585-X version 9.5(1) running Failover
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4), 100.16(1.10), 9.5(1.99), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux88237 | Title: | ASA crash in DATAPATH thread | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: ASA in cluster environment crashes in DATAPATH
Conditions: ASA in cluster environment crashes in DATAPATH
Workaround: None
Further Problem Description:
| |
Last Modified: | 19-JAN-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux86728 | Title: | ASA 8.4(7)23 traceback in Thread Name: DATAPATH due to double block free | |
Status: | Open | |
Severity: | 2 Severe | Description: * | Symptom: crash in Thread Name DATAPATH triggered by a double block free
Conditions: ASA5585-SSP-10 running Software Version 8.4(7)23
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 19-JAN-2016 | |
Known Affected Releases: | 8.4(7.23) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux90497 | Title: | Traceback in unicorn-proxy:aware_parse_req_headers with SSL stress test | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptom: ASA may Traceback in unicorn-proxy:aware_parse_req_headers with SSL VPN stress test
Conditions: SSL VPN stress test
Workaround: none
Further Problem Description:
| |
Last Modified: | 21-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux56111 | Title: | "no ipv6-vpn-addr-assign" CLI not working | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When AnyConnect clients connect, they always request both IPv4 and IPv6 addresses even if IPv6 is not configured. A session will fail if the IPAA subsystem doesn't return a response to the request, even though there's no need for the request in the first place if IPv6 is not configured.
Conditions: Failure can occur even when "no ipv6-vpn-addr-assign " are set.
Workaround: none
Further Problem Description:
| |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.109), 100.16(0.19), 100.8(40.111), 9.0(4.210), 9.1(6.113), 9.4(2.5), 96.1(1.52) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux92403 | Title: | Standby traceback on watchdog with write standby | |
Status: | Other | |
Severity: | 2 Severe | Description: * | Symptom: Crash may happen when doing show command with pager on standby unit and then write standby on active unit
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 21-JAN-2016 | |
Known Affected Releases: | 9.5(1.175) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux33726 | Title: | ASA traceback - WebVPN CIFS_file_rename_remove operations | |
Status: | Open | |
Severity: | 2 Severe | Description: | ASA may traceback with high stress Clientless SSL VPN CIFS-RAMFS file operations (browse, add, remove, delete).
Symptom:
Conditions: ASA may traceback with Clientless SSL VPN CIFS-RAMFS file operations (browse, add, remove, delete) when perfromed under a high stressful conditions.
Workaround: Clientless SSL VPN and File operations.
Further Problem Description:
| |
Last Modified: | 21-JAN-2016 | |
Known Affected Releases: * | 100.13(32.2), 8.4, 9.1(6.107), 9.1(6.111), 9.1(6.112), 9.3(3.227), 9.3(3.229), 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux70784 | Title: | ASA Crash while viewing large ACL | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: An ASA may crash and reload when viewing an ACL that has a lot of remarks in the configuration. In testing, this appears to happen when running a command such as 'show access-list'
Conditions: This has been seen with a configuration with over 150k remarks present in the configuration.
Workaround: Do not use many remarks or clean up the existing remark to avoid significant numbers of remarks.
Further Problem Description:
| |
Last Modified: | 22-JAN-2016 | |
Known Affected Releases: | 9.4(1), 9.5(2) | |
Known Fixed Releases: * | 100.13(0.125), 100.15(0.110), 96.1(1.52), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw92005 | Title: | Thread Name: DATAPATH-17-3095: Unit reboots when joining cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA running 9.4.2 may reboot when attempting to join a cluster
Conditions: ASA configured for Cluster
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 23-JAN-2016 | |
Known Affected Releases: | 9.4(2), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.124), 100.15(0.109), 100.16(0.19), 9.4(2.191), 96.1(1.52), 96.2(1.103) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux69987 | Title: | ASA: Crash on ASA device after adding FQDN objects in NAT rule | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device crash after adding FQDN objects in NAT rules
Conditions: ASA device configured with NAT rule referencing FQDN objects
Workaround: We should not use FQDN objects in NAT statements
Further Problem Description:
| |
Last Modified: | 24-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.13(0.125), 100.15(0.110), 100.16(0.20), 96.1(1.53), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux85863 | Title: | FIPS: Continuous RNG test can mistakenly report an error | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The FIPS Continuous RNG test can incorrectly fail and reset the ASA.
Conditions: This condition appears to be triggered by a race condition under load.
Workaround: Disabling FIPS mode will prevent the issue; however, that may not be a feasible option in some cases. There is currently no other workaround.
Further Problem Description:
| |
Last Modified: | 24-JAN-2016 | |
Known Affected Releases: | 9.1(6.10) | |
Known Fixed Releases: * | 100.13(0.124), 100.15(0.110), 100.16(0.20), 96.1(1.53), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuf57232 | Title: | XMLSoft libxml2 CVE-2012-5134 CVE-2012-2807 CVE-2013-0338 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | <b>Symptoms:</b>
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2011-3102 CVE-2011-3919 CVE-2012-2807 CVE-2012-5134 CVE-2013-0388
These vulnerability have been analyzed by the ASA business unit and the product is not impacted
<b>Conditions:</b>
Device with default configuration.
<b>Workaround:</b>
Not currently available.
<b>Further Problem Description:</b>
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html. PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 25-JAN-2016 | |
Known Affected Releases: | 8.4, 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.3(2), 9.3(2.200) | |
Known Fixed Releases: | 100.7(13.115), 100.7(6.114), 100.8(27.63), 100.8(50.40), 100.9(0.36), 100.9(4.5), 100.9(6.16), 100.9(7.9), 8.4(5.99), 8.4(6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCub84164 | Title: | ASA traceback in threadname Logger | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in threadname Logger Conditions: ASA traceback while sending syslogs to the ssh session via the "logging monitor debug" command Workaround: N/A | |
Last Modified: | 25-JAN-2016 | |
Known Affected Releases: | 8.2(3), 8.4(4.1) | |
Known Fixed Releases: * | 100.7(13.109), 100.7(6.105), 100.8(27.26), 100.8(34.1), 100.8(38.4), 100.8(50.9), 100.9(0.17), 100.9(4.1), 8.2(5.39), 8.4(5.5) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux98029 | Title: | ASA traceback in thread name :DATAPATH-3-3196 | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: SIP inspection enabled on the ASA
Conditions:
Workaround: NA
Further Problem Description: The ASA was in Failover. The Primary Active ASA had a crash file after which it failed over to the Secondary . No Configuration changes were made when the crash occurred.
| |
Last Modified: | 26-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux97932 | Title: | ASA: Traceback in Thread name:- CTM Daemon with no crashinfo generated | |
Status: | Open | |
Severity: * | 2 Severe | Description: | Symptom: ASA Device Tracback with Thread Name:- CTM Daemon without any crashinfo being generated
Conditions: No specific conditions known so far
Workaround: No Workarounds at this time.
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux71867 | Title: | ASA prefers Suite-B algorithms w/ AC Essentials enabled for AC IKEv2 | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: Currently, the ASA prefers a Suite-B algorithm during a AnyConnect IKEv2 "IKE_SA_INIT Exchange" with AC Essentials enabled. As per the following documents,
http://www.cisco.com/c/en/us/products/collateral/security/anyconnect-secure-mobility-client/qa_c67-712937.html http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect31/administration/guide/anyconnectadmin31/ac09localpolicy.html
To use Suite-B with AC IKev2 we need to have AC Premium License installed. So if customer is using Suite-B for Initial exchange for his L2L IKEv2 tunnels (configured on the same ASA that terminates AC IKEv2 connections), we always prefer the Suite-B algorithms for AC IKEv2 negotiation hence failing the connection due to AC Essentials license restriction. Also, the order of the IKEv2 policy seems to be ineffective in this case so even if we have a non-suiteB configured at the top of the list, it is not negotiated upon during the AC IKEv2 connection.
This is the error message we see on the ASA during the failure:
IKEv2-PLAT-1: Failed to create an IKEv2 Proposal because an AnyConnect Premium license is required to support an IKEv2 remote access connection using NSA Suite B algorithms IKEv2-PLAT-1: unable to build ikev2 policy IKEv2-PROTO-1: (7): Failed to locate an item in the database
On the AC client, this is the failure message:
Could not connect to server. Please verify Internet connectivity and server address.
Conditions: #AC w/ IKEv2. #ASA configured w/ Suite-B IKEv2 policies apart from non-SuiteB policies. #AC Essentials enabled on the ASA.
Workaround: disable AC essentials license
Further Problem Description: | |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu16907 | Title: | ASA: Watchdog traceback in DATAPATH | |
Status: * | Terminated | |
Severity: | 2 Severe | Description: | Symptom: ASA Watchdog traceback after an upgrade in failover environment.
Conditions: ASA in failover pair environment, upgraded to 9.1.(5)21.
Workaround: None
Further Problem Description:
| |
Last Modified: | 05-JAN-2016 | |
Known Affected Releases: | 9.1(5.21) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv58559 | Title: | Traceback in Thread Name: DATAPATH on modifying "set connection" in MPF | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA Traceback in Thread Name: DATAPATH
Conditions: 1) While modifying the "set connection" config under MPF. 2) Live traffic is passing through both units matching the MPF connection policy.
Workaround: Do not modify the connection MPF policy while live traffic is inspected through it.
Further Problem Description: Sample config :
policy-map global_policy class conn-test set connection conn-max 4000 embryonic-conn-max 2500
| |
Last Modified: | 06-JAN-2016 | |
Known Affected Releases: | 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCum70178 | Title: | Datapath:Observing Deadlock in different DATAPATH threads | |
Status: | Fixed | |
Severity: | 2 Severe | Description: * | Symptom: Cisco ASA working as a Failover Standby Unit, periodically reloads in thread name datapath.
Crash message could be like the following :
Deadlock in thread DATAPATH-9-2588, from: Traceback from thread DATAPATH-9-2588: Test scenario was Multiple ftp Clients from Outside to single FTP Server on Inside, with 1K conn/sec rate
Conditions: Cisco ASA 8.4 when configured as standby in a failover pair. Reason problem is more evident on Standby could be that, as there isn't much work to do, it is possible that multiple Cores to work on flow-time-out at the same time
As part of detaching a flow from host->h_tcp_eflow emb-flow-count is being decremeted But this is being done for a paired_flow->host, while holding the flow->host lock
This can lead to dead-locck, in the following senario : Core-1 : Forward_flow->host_A host-lock was acquired snp_host_detach_flow and invoke snp_flow_dec_host_tcp_eflow_counters Reverse_flow->host_B host-lock is attempt to acquire at snp_flow_dec_host_tcp_eflow_counters.
Core-2 : Forward_flow->host_A host-lock was acquired snp_host_detach_flow and invoke snp_flow_dec_host_tcp_eflow_counters Reverse_flow->host_B host-lock is attempt to acquire at snp_flow_dec_host_tcp_eflow_counters.
Workaround: None
Further Problem Description:
| |
Last Modified: | 06-JAN-2016 | |
Known Affected Releases: | 100.8(38.102), 8.4(7.9), 9.1, 9.1(4.5), 9.1(5) | |
Known Fixed Releases: | 100.10(9.6), 100.7(6.131), 100.8(38.126), 100.8(40.68), 100.8(56.32), 100.8(63.2), 100.8(64.6), 100.8(65.4), 100.8(66.7), 8.2(5.50) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux74071 | Title: | ERROR: Internal error configuring service on TCP port 80 in ASA9.6.0.50 | |
Status: | Open | |
Severity: | 2 Severe | Description: | Symptom: AAA authentication redirect commands does not get accepted when we apply first time
Conditions: AAA authentication redirect commands does not get accepted when we apply first time
Workaround: Reconfigure the AAA redirect command it will make it work.
Issue will not be seen till we give clear config all
Further Problem Description: | |
Last Modified: | 06-JAN-2016 | |
Known Affected Releases: | 9.6(0.50) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw17930 | Title: | Improper S2S IPSec Datapath Selection for Remote Overlapping Networks | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traffic may be sent to a wrong tunnel when overlapping
Conditions: - S2S IPSec VPN - Remote network which partially overlaps
Workaround: Removing and re-applying crypto map to the interface when issue is happening or deny statement on the crypto map for part of the network which overlaps
Further Problem Description:
| |
Last Modified: | 08-JAN-2016 | |
Known Affected Releases: | 9.0(4), 9.1(5.21), 9.1(6.8) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.108), 100.14(0.77), 100.15(0.41), 100.15(17.15), 100.15(3.64), 100.15(8.16), 100.16(0.2), 100.16(1.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCun66161 | Title: | 5585-20 8.4.7.11 traceback in Thread Name Datapath w/ DCERPC inspection | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When configuring dcerpc inspection the device may crash in Datapath.
Conditions: ASA5585-20 on ASA 8.4.7.11 dcerpc inspection configured
Workaround: Disable dcerpc inspection
Further Problem Description:
| |
Last Modified: | 12-JAN-2016 | |
Known Affected Releases: | 8.4(7.11) | |
Known Fixed Releases: * | 100.10(9.7), 100.11(0.3), 100.7(6.130), 100.8(40.66), 100.8(56.39), 100.8(65.6), 100.8(66.12), 8.4(7.16), 9.0(4.8), 9.1(5.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw22130 | Title: | ASA traceback when removing dynamic PAT statement from cluster | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Master ASA in clustering running code 9.3.3.2 presented a DATAPATH-1-1958 resulted by Address not mapped fault.
Statement removed was: no nat (visitors,outside) source dynamic Guest_network PAT-Guest-Pool
Conditions: > ASA running code 9.3.3.2 > Individual (L3) mode > Removing Dynamic PAT rule
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.2) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.15(0.94), 100.15(20.22), 100.15(8.33), 100.16(0.10), 100.16(1.50), 100.16(15.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur54965 | Title: | cURL and libcurl Certificate Validation Remote SSL Server Spoofing Vul | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-4545
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-4545 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 8.7(1), 9.2(1), 9.3(2), 9.3(2.200), 9.4(1), 9.5(2), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68856 | Title: | Linux Kernel IPv6 Router Advertisement Packet Processing Denial of Ser | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-2309
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.1:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-2309 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur54856 | Title: | XMLSoft libxml2 Entity Expansion Handling Denial of Service Vulnerabil | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0191
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0191 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv05386 | Title: | Clientless webvpn on ASA does not display asmx files | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Clientless user selects bookmark from webportal. The page does not display correctly, there is a portion of the page that is garbled or is missing text
Conditions: -Clientless user authenticates to the webportal, then selects bookmark that points to internal HTTP site. -The user see's garbled or incomplete text returned from the ASA.
Workaround: Smart Tunnel resolves the issue. Using the stand alone AC client resolves the issue.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.90), 100.14(0.68), 100.14(16.8), 100.14(5.32), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68877 | Title: | Linux Kernel ext4/file.c Local Denial of Service Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-8086
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:W/RC:UC
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-8086 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut29842 | Title: | Linux Kernel Memory Fault Privilege Escalation Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-9322
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-9322 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv92371 | Title: | ASA traceback: SSH Thread: many users logged in and dACLs being modified | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may reload when multiple users are logged into the ASA running show commands and the ACLs are being added/deleted
Conditions: This was observed under the following condition 1) there were multiple users logged into the ASA 2) One user was trying to run show running-config or show access-list 3) downloadable ACLs were being added and removed based on user logins in auth proxy
Workaround: If show access-list issued on one session don't issue "clear config access-list " from another session, let the "sh access-list" display all elements from that session
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(2), 9.1(6), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.111), 100.14(0.78), 100.15(0.50), 100.15(17.21), 100.15(3.72), 100.15(8.17), 100.16(0.3), 100.16(1.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw41548 | Title: | DNS Traceback in channel_put() | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA reloads and generates a corefile
Conditions: Multiple simultaneous DNS queries with retries
Workaround: disable DNS
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.225) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.109), 100.14(0.77), 100.15(0.43), 100.15(17.18), 100.15(3.66), 100.15(8.16), 100.16(0.2), 100.16(1.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu75901 | Title: | ASA failover due to issue show local-host command make CPU-hog | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In an ASA active-standby failover setup having a huge number of connections, running 'show local-host connections' command results in ASA switching to failover
Conditions: 1. Configure active-standby failover on ASA5585-SSP60/40 running software version 9.2.3. This issue may be observed on other ASA platforms and versions as well 2. Have low ASA unit hello interval configured for failover: failover polltime unit msec 200 holdtime msec 800 3. Send large number of connections (~ 1 million) through the ASA 4. Run 'show local-host connections embryonic' command
Workaround: Increase the failover unit hold time
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1, 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.137), 100.13(0.91), 100.14(0.68), 100.14(16.8), 100.14(5.32), 100.15(0.22), 100.15(1.42), 100.15(10.4), 100.15(15.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68861 | Title: | Linux Kernel raw_cmd_copyin() Privilege Escalation Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-1737
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-1737 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv66333 | Title: | ASA picks incorrect trustpoint to verify OCSP Response | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA may fail to verify a valid OCSP response during OCSP revocation check for VPN clients.
Conditions: Revocation check is enabled under the trustpoint using OCSP and an override using cert-map is not configured
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.48), 100.15(17.20), 100.15(3.71), 100.15(8.17), 100.16(0.3), 100.16(1.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu45813 | Title: | ASA Name Constraints dirName improperly verified | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a dirName constraint, the ASA fails with the error: CERT-C: I pkixpath.c(2726) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu66218 | Title: | ASA is not correctly handling errors on AES-GCM ICV | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: A vulnerability in the AES-GCM code of Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to modify the contents of an encrypted IPSec or IKEv2 packet, and for those modifications not to be detected.
The vulnerability is due to an error on the firmware of the Cavium Networks cryptographic module. Due to this vulnerability, the ICV is not checked. An attacker could exploit this vulnerability by intercepting encrypted packets in transit and modifying their contents. Such packets would be decrypted by the ASA and then forwarded to their destination, without the modification being detected.
Please note that this vulnerability does NOT allow an attacker to decrypt the packets in transit, nor obtain information about the session keys being used for the security association.
This vulnerability does NOT impact SSL/TLS traffic originated or destined to the ASA.
Conditions: An IKEv2 or an IPSec policy using any of the following algorithms for data encryption: aes-gcm, aes-gcm-192, aes-gcm-256.
This vulnerability only applies to the following ASA models: ASA5506-X (all hardware models), ASA5508-X, and ASA5516-X.
Workaround: There is no workaround for customers whose security policy requires the use of AES-GCM.
For customers that can use an alternative encryption algorith, IKE or IPSec policies using AES-GCM could be changed to use instead AES.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/3.6:
http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C&version=2.0
CVE ID CVE-2015-4550 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3), 9.4(1.1) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.13(29.28), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 9.3(3.2), 9.4(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut46019 | Title: | MARCH 2015 OpenSSL Vulnerabilities | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: This product includes a version of OpenSSL that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-0286, CVE-2015-0292, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288
This bug has been opened to address the potential impact on this product.
Conditions: Exposure is not configuration dependent.
First Fixed Information:
8.2.5.58 (April 2015) 8.3.2.45 (April 2015) 8.4.7.29 (April 2015) 8.5.1.25 (April 2015) 8.6.1.18 (April 2015) 8.7.1.17 (April 2015) 9.0.4.34 (April 2015) 9.1.6.2 (24-Apr-2015) 9.2.3.5 (April 2015) 9.3.3.1 (8-May-2015) 9.4.1.1 (8-May-2015)
Published advisory is at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150320-openssl
Workaround: Not available.
More Info: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are: 7.1/6.9
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2(5), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 9.2(1), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.123), 100.13(0.73), 100.13(21.13), 100.13(29.28), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.28), 100.14(7.28) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut49111 | Title: | ASA traceback because of TD tcp-intercept feature | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Multiple crash has been observed on ASA with threat-detection statistics tcp-intercept enabled
Conditions: When threat-detection statistics tcp-intercept is enabled
Workaround: Disabling TD for tcp intercept statistics stops crash.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.13(29.28), 100.14(0.12), 100.14(10.17), 100.14(5.15), 100.14(6.27), 100.14(7.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv31964 | Title: | Update Windriver OS to RCPL 21 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptoms: Cisco Adaptive Security Appliance (ASA) Software includes a version of Windriver OS that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2015-3331,CVE-2015-1819
This bug was opened to address the potential impact on this product.
Conditions: Device with default configuration.
Workaround: Not currently available.
Further Problem Description: Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 9.3/7.7: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2015-3331,CVE-2015-1819 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 6.0, 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 99.1 | |
Known Fixed Releases: | 100.15(1.45), 100.15(10.3), 100.15(15.6), 100.15(16.1), 100.15(2.77), 100.15(3.26), 100.15(8.10), 9.5(1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68843 | Title: | GnuTLS Regression Error Denial of Service Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-2116
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-2116 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut45114 | Title: | 2048-byte block leak if DNS server replies with "No such name" | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The ASA may become responsive due to excessive loss of 2048-byte memory blocks.
Conditions: Many DNS lookups for bad hostnames are done from the ASA, so that the DNS server replies "no such name".
Workaround: A reboot is required to recover the lost memory blocks.
Further Problem Description: To monitor block utilization, use the CLI command "show blocks".
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2.101) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.58), 100.13(21.10), 100.14(0.5), 100.14(1.4), 100.14(10.9), 100.14(11.9), 100.14(2.13), 100.14(26.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu53928 | Title: | ASA does not set forward address or p-bit in OSPF redistrubution in NSSA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA can advertise OSPF routes to a peer with the p-bit disabled, and with a null forward address when in a Not so Stubby Area. This can cause the peer device to be unable to translate this LSA and forward it on to the rest of the topology.
OSPF Router with ID (10.0.0.50) (Process ID 1) Type-7 AS External Link States (Area 100)
LS age: 23 Options: (No TOS-capability, No Type 7/5 translation, DC) <--- LS Type: AS External Link Link State ID: 192.168.0.0 (External Network Number ) Advertising Router: 10.0.0.50 LS Seq Number: 80000001 Checksum: 0x791e Length: 36 Network Mask:255.255.0.0 Metric Type: 2 (Larger than any link state path) TOS: 0 Metric: 20 Forward Address: 0.0.0.0 <--- External Route Tag:
This condition occurs if the route that is advertised is directly connected, and that link comes up before the link that contains the OSPF neighborship.
Conditions: - ASA in an OSPF Not So Stubby Area - Redistributing Connected Routes - Observed in single and multiple context - Observed in failover mode or standalone mode
Workaround: - Clear OSPF Process on ASA with command "clear ospf process" - Bounce link of connected route that is being advertised incorrectly
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.13(29.28), 100.14(0.44), 100.14(16.1), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.53) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv05916 | Title: | Need to prevent traceback in js_parser_print_rest | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback in Unicorn Proxy Thread
Conditions:
Workaround: none identified
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.3(3) | |
Known Fixed Releases: * | 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.14(16.8), 100.14(5.32), 100.15(0.24), 100.15(1.68), 100.15(16.2), 100.15(17.1), 100.15(3.37) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu67411 | Title: | Timeout:FloatingConnection valid(0:0:30-1193:0)remove http &telnet confg | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Timeout:FloatingConnection valid(0:0:30-1193:0)remove http &telnet confg
Symptom: Configure "timeout floating-conn 0:01:00"(any valid range 0:0:30-1193:0:0),it is configured in ASA and checking TELNET to ASA and HTTP connection of ASA is lost.
Conditions: Issue on : 1.Saleen -5512,5525 2.Kenton--5506 3.vASA
Workaround: Set the "timeout floating-conn 0:00:00"
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(0.27), 100.14(0.30), 100.14(6.38) | |
Known Fixed Releases: * | 100.14(0.42), 100.14(16.1), 100.14(5.20), 100.14(7.39), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12), 100.15(5.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv32615 | Title: | ASA: LDAP over SSL Authentication failure | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: LDAP over SSL authentication fails with the below LDAP debugs. Session Start New request Session, context 0x00007fffddc694c0, reqType = Authentication Fiber started Creating LDAP context with uri=ldaps://10.1.1.219:636 Connect to LDAP server: ldaps://10.1.1.219:636, status = Failed Unable to read rootDSE. Can't contact LDAP server. Fiber exit Tx=0 bytes Rx=0 bytes, status=-2 Session End
Can see the below errors increasing under "show asp drop" ssl-record-decrypt-error np-socket-close
The "show count" output will show an increase in count SSL error. ASA5500-21# sho count | in SSL SSLERR DECRYPT_FAIL_OR_BAD_RECORD_MAC 1 Summary
Conditions: LDAP over SSL used for client authentication on ASA running version 9.3(2)1 and above and TLSv1.2 is used.
Workaround: Downgrade to 9.3(2)
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2.1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.146), 100.13(0.102), 100.14(0.75), 100.14(16.8), 100.14(5.32), 100.15(0.28), 100.15(1.92), 100.15(16.5), 100.15(17.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCze96017 | Title: | Active ftp-data is blocked by Firepower on Chivas Beta on 5512 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: The system incorrectly processes data channels matching applied access control, intrusion, and network discovery policies.
Conditions: Configure an ASA FirePOWER module running Version 5.0 or later with network address translation (NAT).
Workaround: 1. Create a policy to allow ftp-data traffic from Server to Client or 2. Use passive FTP
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1) | |
Known Fixed Releases: * | 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12), 100.15(5.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv86500 | Title: | Webvpn: JS parser may crash if the underlying connection is closed | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback when WebVPN client connected and ASA is processing JavaScript.
Conditions: ASA running release 9.3.3.221.
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.221) | |
Known Fixed Releases: * | 100.12(0.145), 100.13(0.98), 100.14(0.73), 100.14(16.8), 100.14(5.32), 100.15(0.26), 100.15(1.91), 100.15(16.5), 100.15(17.6), 100.15(3.51) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv96011 | Title: | OSPF over IKEv2 L2L tunnel is broken on ASA with 9.2.1 onwards | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: OSPF over IKEv2 L2L tunnel is broken on ASA in 9.2(1) onwards. Routes are installed into OSPF database successfully, but they are absent in the main routing table.
Conditions: -IKEv2 L2L configured to propagate routes over OSPF on ASA running 9.2.1 or above.
Workaround: -Downgrade the ASA to 9.1(5), if an option. -Use IKEv1 tunnel
Further Problem Description: None
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(1), 9.3(3), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.104), 100.14(0.76), 100.15(0.29), 100.15(1.95), 100.15(16.7), 100.15(17.10), 100.15(3.55), 100.15(8.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCti05769 | Title: | Migration of max_conn/em_limit to MPF is completely wrong in 8.3 | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Migration to Modular Policy Framework may yield an incorrect configuration. This may result in loss of TCP Intercept protection against SYN floods coming from the outside as MPF limits are configured in incorrect direction. Protection against server overloading may also be lost because the migrated configuration incorrectly limits the number of outbound established connections from the server to the outside.
Conditions:
Workaround: Configuration, created by migration process, must be removed and limits must be set manually via MPF and in proper direction.
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2.5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 No CVE ID has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.3(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68844 | Title: | Xen QEMU SCSI REPORT LUNS Memory Corruption Code Execution Vulnerabili | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-4344
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-4344 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu31751 | Title: | ASA OSPF database not reflect changes | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: shut down interface from R3 did not reflect routing table on R#1 as ASA ospf database did not reflect changes. but routing table on ASA reflect properly. seeing same issue only in 9.2 or 9.3 but not in 9.1
R#1 <-ospf area 2--> ASA <--ospf area 0---> R#3
sh route ospf O 10.20.20.0 255.255.255.0 [110/11] via 192.168.1.97, 00:32:33, backbone
ASA# sh ospf database 10.30.30.0 Summary Net Link States (Area 1)
Link ID ADV Router Age Seq# Checksum 10.30.30.0 1.1.1.1 1939 0x80000001 0xa245
Summary Net Link States (Area 2)
Link ID ADV Router Age Seq# Checksum 10.30.30.0 1.1.1.1 1939 0x80000001 0xa245
R1#sh ip route 10.30.30.0 Routing entry for 10.30.30.0/24 Known via "ospf 10", distance 110, metric 12, type inter area Last update from 192.168.1.50 on GigabitEthernet0/0/0, 00:29:13 ago Routing Descriptor Blocks: * 192.168.1.50, from 1.1.1.1, 00:29:13 ago, via GigabitEthernet0/0/0 Route metric is 12, traffic share count is 1
Conditions: Only seeing 9.2.x or 9.3.x (tested on 9.2(3), 9.2(3)4 and 9.3(3)) but it works fine on 9.1 (tested 9.1(5)21 and 9.1(6)1
Workaround: clear ospf x process
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 108.2(0.7) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw22886 | Title: | Split-tunnel not working for EzVPN client on Kenton device (9.5.1) | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Ezvpn client connects however Split tunnel will not be applied.
Conditions: Using ASA5506 Kenton with ASA code 9.5.1
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.14(0.76), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2), 100.16(1.2), 9.5(1.99), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68845 | Title: | Linux Kernel Networking recvmsg Memory Leak Local Information Disclosu | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-6405
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:S/C:P/I:P/A:N/E:U/RL:W/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-6405 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu28909 | Title: | ASA cluster: ICMP loop on CCL for ICMP packet destined to the VPN tunnel | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: In ASA cluster we may see a packet loop on the cluster control link. The loop is formed when we have ICMP error packet that should be going via a site to site VPN tunnel. Such packet may go into a loop and cause elevate CPU utilization on the ASA.
Conditions: +ASA cluster +site to site VPN tunnel configured +ICMP error packets destined to the VPN tunnel
Workaround: +deny icmp erros using an access-list on the data interfaces
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6.1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.17), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw15615 | Title: | Backup unknown with dynamic pat pool | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: PAT Pool IP's Backup shows up as unknown
Conditions: Two node cluster is brought up with dynamic pat pool configs and transactional commit for NAT is enabled
Workaround: Disable transactional commit for NAT
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.15(1.86), 9.4(1.100) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.152), 100.13(0.117), 100.14(0.81), 100.15(0.67), 100.15(17.30), 100.15(20.10), 100.15(8.22), 100.16(0.5), 100.16(1.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68875 | Title: | Linux Kernel Network Packet Processing Null Pointer Dereference Denial | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3535
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.4:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-3535 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu73395 | Title: | Auth-prompt configured in one context appears in another context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Auth-prompt configured in one context appears in another context.
Conditions: ++ Device in multiple context. ++ More than one context. ++ More than on context with cut through proxy configured. ++ Only one context with custom auth-prompt.
Workaround: If auth-prompt is configured in all the contexts then there is no issue seen.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0(4.24), 9.1(4), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.49), 100.15(1.51), 100.15(15.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu39636 | Title: | Cert Auth fails with 'max simultaneous-login restriction' error | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: VPN Clients connections with Certificate Authentication fail with the following error:
[IKEv1]Group = , IP = X.X.X.X, Session terminated due to 'X' max simultaneous-login restriction.
Conditions: VPN Cients with Certificate Authentication
ASA running 9.1.6 or later
Workaround: Use PSK and X-Auth for authentication Downgrade to a non-affected version
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.13(29.28), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.37), 100.15(0.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu63656 | Title: | ASA not generating PIM register packet for directly connected sources | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Topology ------------ Sender ---> ASA(DR) ----> RP -----> Receiver
Running 9.2.1 or later on the ASA and the Sender is directly connected to the ASA (DR) Sender is behind ASA RP is in front of ASA ASA not sending PIM Register packet to RP
Conditions: running 9.2.1 or later
Workaround: downgrade to code 9.1.5
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(1), 9.3(2), 9.4 | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.14(0.45), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.54), 100.15(3.8), 100.15(4.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu46569 | Title: | ASA CA certificate import fails with different types of Name Constraints | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When performing the SCEP enrollment to the CA that contains Name Constraints x509 extension with a URI or DNS constraint, the ASA fails with the error: CERT-C: I pkixpath.c(2726) : Error #751h CRYPTO_PKI:Invalid certificate received (status = 1873) CRYPTO_PKI:Invalid RA certificate received
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(1), 9.1(2), 9.3(1), 9.4(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.27), 100.14(10.23), 100.14(5.17), 100.14(7.38), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68873 | Title: | Linux Kernel Reliable Datagram Sockets Denial of Service Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-7339
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.7:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-7339 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv92384 | Title: | ASA TCP Normalizer sends PUSH ACK for invalid ACK for half-open CONNS | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: When a connection entry on ASA is in half-open state and an invalid ACK (sequence and acknowledgement numbers out of sequence ) is received for that connection, ASA is dropping the invalid ACK received but it is responding to the TCP peer with a packet containing flags PUSH ACK and with correct sequence and acknowledgement numbers that ASA is expecting from the peer. As per the RFC below, ASA is not supposed to respond with TCP PUSH ACK flags for invalid ACK segments when the connection is half-open state. It should instead respond with a segment containing RESET flag.
https://tools.ietf.org/html/rfc793#section-3.5
Information from the RFC link above :
2. If the connection is in any non-synchronized state (LISTEN, SYN-SENT, SYN-RECEIVED), and the incoming segment acknowledges something not yet sent (the segment carries an unacceptable ACK), or if an incoming segment has a security level or compartment which does not exactly match the level and compartment requested for the connection, a reset is sent.
Conditions: ASA working as TCP normalizer.
Workaround: Configure TCP state bypass.
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpstatebypass.html
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.114), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut44075 | Title: | Traceback in snp_cluster_get_buffer | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Traceback in snp_cluster_get_buffer
Conditions: Single or two node cluster
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0, 9.3(2.101), 9.4(0.117) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.15), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68878 | Title: | Red Hat qemu-kvm High Resolution Display Memory Leak Information Discl | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3615
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 2.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:H/Au:S/C:P/I:P/A:N/E:U/RL:TF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-3615 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu06081 | Title: | ASAv licesing enforcement should not be CLI parser based | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASAv doesn't accept CLI commands without proper license in place.
Conditions: NA
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2), 100.16(1.2), 9.4(1.203), 9.5(1.201), 9.5(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68851 | Title: | Linux Kernel CIFS Pointer Handling Local Denial of Service Vulnerabili | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0069
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.2:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:P/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0069 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv12884 | Title: | Unable to authenticate with remove aaa-server from different context | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: Authentication error on a context when he removed aaa-server config from different context.
Conditions: -Some contexts is using same LDAP server.
Workaround: ASA reload
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.6(1), 9.1(5), 9.2(3) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.89), 100.14(0.67), 100.14(16.8), 100.14(5.32), 100.15(0.21), 100.15(1.38), 100.15(10.4), 100.15(15.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv45756 | Title: | ASA may tracebeck when displaying packet capture with trace option | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA traceback.
Conditions: ASA running 9.4(1) displaying captures with trace detail option.
Workaround: Avoid using trace detail option in captures.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.140), 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68866 | Title: | QEMU virtqueue_map_sg() Function Input Validation Buffer Overflow Vuln | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2013-4535
This bug was opened to address the potential impact on this product.
Conditions: Device with default configuration.
Workaround: Not currently available.
Further Problem Description: Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2013-4535 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: * | 100.12(0.136), 100.13(0.90), 100.14(0.68), 100.15(0.21), 100.15(1.43), 100.15(15.4), 100.15(2.75), 100.15(3.26), 100.15(4.25), 100.15(8.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu82229 | Title: | ikev2 with DH 19 and above fails to pass traffic after phase2 rekey | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: after rekey fails to pass traffic
Conditions: after rekey using DH 19 or above
Workaround: use lower DH (1,2,5,14)
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4, 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.113), 100.14(0.79), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9), 9.4(2.1), 9.5(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur07061 | Title: | Traceback on standby ASA during hitless upgrade | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Regression caused by a fix in CSCuq37448
Symptom:ASA system traceback was observed in data path.
Conditions:Cisco ASA running release 9.1.5.16. Workaround:NA
More Info:This issue was seen in one case when doing system test with ASAv during hitless upgrade. In another the trace indicated it might be related to using the capture feature on an ASA-SM. However, the issue is not related to failover or packet capture. In the bug fix of CSCuq37448, we added code for detecting and handling IPSec HA packets. That fix failed to handle certain corner cases and could subsequently cause a traceback. The fix removes the special handling.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.12(0.56), 100.13(11.7) | |
Known Fixed Releases: * | 100.11(0.50), 100.11(0.57), 100.12(0.118), 100.12(0.70), 100.12(6.20), 100.13(0.58), 100.13(0.6), 100.13(11.10), 100.13(12.16), 100.13(15.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq99821 | Title: | ASA/ASASM drops SIP invite packets with From field containing "" and \ | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASASM running version 9.1.4.6 with SIP inspection turned on, silently drops SIP INVITES that has the similar value in the from field:
"\"210*******\"" ;tag=SD7osu201-gK0d0f565b
Conditions: ASA/ASASM running 9.1.4.6 with SIP inspection turned on.
Workaround: disable SIP inspection.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(4.6) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.122), 100.13(0.67), 100.13(21.13), 100.13(29.28), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.41) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw06294 | Title: | ASA: Traceback in Thread Name Checkheaps due to webvpn | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device traceback in Thread Name Checkheaps
Conditions: ASA configured with webvpn configuration.
Workaround: None at this time
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.224) | |
Known Fixed Releases: * | 100.12(0.146), 100.13(0.99), 100.14(0.74), 100.15(0.28), 100.15(1.93), 100.15(16.7), 100.15(17.9), 100.15(3.54), 100.15(8.14), 9.3(3.225) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68859 | Title: | Linux Kernel n_tty_write Function Buffer Overflow Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-0196
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-0196 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68865 | Title: | Linux Kernel Futex Local Privilege Escalation Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3153
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-3153 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu10284 | Title: | ASA Dataplane captures dont capture packets when using match/access-list | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA Dataplane captures dont show any packet captured even though the condition matches the flow
Conditions: ASA dataplane captures applied with a match or access-list command
Workaround: use the dataplane captures without the match/access-list command
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.13(29.28), 100.14(0.20), 100.14(10.23), 100.14(5.16), 100.14(7.32), 100.15(0.12), 100.15(1.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur54979 | Title: | Linux Kernel KVM Subsystem Programmable Interval Timer Emulation Denia | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3611
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.5:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:A/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-3611 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu94945 | Title: | ASA: Traceback while copying file using SCP on ASA | |
Status: | Fixed | |
Severity: | 2 Severe | Description: | Symptom: ASA device trace back while copying files using SCP
Conditions: Copying files on the ASA device using SCP
Workaround: Don't use SCP to transfer files on ASA
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(0.43) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.14(0.46), 100.14(16.1), 100.14(5.23), 100.14(7.41), 100.15(0.17), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur68869 | Title: | Linux Kernel PPP L2TP Sockets Local Elevated Privileges Vulnerability | |
Status: | Other | |
Severity: | 2 Severe | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-4943
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 6.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-4943 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 9.5(2.200), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux58151 | Title: | BGP Socket Closes and Does Not Reopen | |
Status: | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom: The ASA will be unable to create a neighborship with a BGP peer.
You may see the following Syslog at Debug level:
%ASA-7-710005: TCP request discarded from source_address/source_port to interface_name:dest_address/179
Diagnostics:
show asp table socket - If you're being affected by this bug, then you will NOT see an entry on this table showing the Local Address (i.e., your ASA IP address) in a LISTENING state for TCP 179.
Conditions: -You have BGP and an IPv4 address-family configured on your ASA -You have configured and activated a BGP neighbor in that IPv4 address-family -The configured BGP neighbor is unable to establish a neighborship with the ASA.
Workaround: In the relevant IPv4 Address-Family configuration, deactivate the neighborship between the ASA and the peer that is unable to connect, and then reactivate it.
no neighbor [IP Address] activate neighbor [IP Address] activate
Note: This issue has been observed to affect only a single BGP neighborship on an ASA where multiple neighbors are configured. Technically, adding and removing any neighbor in the IPv4 address family should cause the ASA to open all sockets that have been closed by this defect. So it should be possible to run this command for any neighbor in the relevant IPv4 address family. If, however, your 'backup' BGP neighborship is down and you are unable to restore it by removing and re-adding its neighbor activate statement, it may be necessary to remove and re-add the active link.
Further Problem Description:
| |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 9.3(3) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuw56882 | Title: | Interface is Up on the ASA but fault is note cleared on APIC | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: You are seeing the following fault after adding an ASA device into the APIC: "Script Warning: Either the cable is incorrect or not plugged in"
Conditions: an ASA was added to the ACI fabric via the APIC.
Workaround: n/a The fault can be ignored.
Further Problem Description:
| |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 1.2(3.5), 1.2(3.7) | |
Known Fixed Releases: | 1.2(3.9), 1.2(5.0) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux51056 | Title: | vpn-sessiondb doesn't show DHE prefix in Encryption field | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: vpn-sessiondb doesn't show DHE prefix in Encryption field when DHE-AES ciphers are used for Clientless SSL VPN.
Conditions: DHE-AES ciphers used for Clientless SSL VPN.
Workaround: Verify via "logging class ssl Further Problem Description:
| |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 9.1(6.111) | |
Known Fixed Releases: * | 100.11(0.66), 100.8(40.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux69809 | Title: | 'write net' on the interface with managment-only keyword does not work. | |
Status: | Other | |
Severity: | 3 Moderate | Description: * | Symptom: When the command 'write net' is used to save the running configuration to TFTP server, and the TFTP server is located on an interface with management-only keyword, we see two issues:
Case 1 If there is only one interface configured, saving configuration fails with an error "(No such device)".
Case 2 If there are more then one interfaces configured, the global routing table is used, instead of the routing table of the interface facing the TFTP server and the saving configuration fails with an error "(Timed out attempting to connect)".
The issue is related to feature introduced in 9.5.1 code 'Separate routing table for management-only interfaces'.
Conditions: - Version 9.5(1) - management-only is configured under the interface facing the TFTP server
Workaround: Use command 'copy running-config tftp:'
Further Problem Description:
| |
Last Modified: | 05-JAN-2016 | |
Known Affected Releases: | 9.5(1), 9.5(1.5) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuo85585 | Title: | ARP debug messages are printing without new line on standby unit | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ARP debug messages are printing without new line on failover standby unit
Conditions: ARP debug messages prints on console without new line between each other.
Workaround: None
Further Problem Description:
| |
Last Modified: | 05-JAN-2016 | |
Known Affected Releases: | 9.1(5.1) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.121), 100.14(0.84), 100.8(40.106) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux64137 | Title: | ASA NTP Documentation Clarification | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptoms: This is a documentation issue for the Cisco Adaptive Security Appliance (ASA). ntp authenticate does not enforce authentication, it enables it. There are interdependent commands which must also be enable to create authenticated NTP sessions. The Usage Guidelines are unclear on this point.
To ensure an authenticated ntp session, one must 1) enable authentication: ntp authenticate 2) create an ntp key ntp authentication-key key_id md5 key 3) The key must be associated with the ntp server command ntp server ip-address key key-id
Conditions: Documentation bug
Workaround: Not applicable or available.
Further Problem Description:
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 06-JAN-2016 | |
Known Affected Releases: | 9.2(4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux76949 | Title: | Doc: New IPAA syslogs 737034-737036 | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: Update Syslog doc with 3 new syslogs: %ASA-5-737034: IPAA: Session=, {IPv4 | IPv6} address: %ASA-7-737035: IPAA: Session=, '' message queued %ASA-6-737036: IPAA: Session=, Client assigned from DHCP
Conditions: Syslogs
Workaround:
Further Problem Description:
| |
Last Modified: | 08-JAN-2016 | |
Known Affected Releases: | 9.1(6.116) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus79187 | Title: | ASDM may stall @ 72% refreshing large number of VPN Sessions | |
Status: | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom: Affected components: All ASA releases , ASDM 7.3.2 and 7.3.3 ASDM client host is Windows7 machine, Using JRE version 1.7.0_67
ASA 5585-20 with thousands of AnyConnect VPN (or other type) tunnels established .
To reproduce: 1)Navigate to ASDM Monitoring-VPN-VPN Statistics-Sessions 2)Select Filter BY:AnyConnect Client, "All Sessions" 3)Press the Refresh button on bottom of panel 4) ASDM may get stuck at 72% loading and never completes refreshing screen. 5) Clearing ASDM cache, Exiting and re-loging in doesn't refresh .
Conditions: ASDM Monitoring-VPN Sessions
Workaround: Easy workaround. Just need to change the ASDM timeout.
Further Problem Description:
| |
Last Modified: | 12-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux83951 | Title: | Doc bug as ASAv does not support VMXNET3 interface | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: This is a DOCUMENTATION bug only.
As per the CCO document:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa92/asdm72/general/asa-general-asdm/interface-basic-asav.pdf
ASAv supports VMXNET3 interface but it does not.
Document needs to be rectified for this.
Conditions:
Workaround:
Further Problem Description: | |
Last Modified: | 13-JAN-2016 | |
Known Affected Releases: | 9.4 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv11963 | Title: | TP Auth fails when sub CA using RSA keys is signed by root using ECDSA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA fails to validate the Anyconnect client certificate issued by the intermediate CA under below conditions.
Conditions: 1. ASA running 9.3.3.1, should be configured for certificate authentication.
2. Root CA cert must have ECDSA Signature algorithm and ECDSA public key
3.Intermediate CA cert must have ECDSA signature algorithm with RSA public key.
4.ASA ID cert must have RSA signature algorithm with RSA public key.
5.Client cert must have RSA signature algorithm with RSA public key.
Workaround: NONE
Further Problem Description: When we connect to ASA from Anyconnect client machine, we see the client is sending its ID cert and ASA fails to verify the cert chain with below debug.
CRYPTO_PKI: Verify chain of certs, Getting public key from signersCert. CRYPTO_PKI:Failed to set key info for get public key obj, status: 542, keylen: 294 CRYPTO_PKI: Verify chain of certs failed to get pubkey from signer.
Root, intermediate and ID certs are installed in separate Trustpoints in ASA. We have also tried installing intermediate and ID cert in single Trustpoint which results in same failure.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.1), 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.2), 100.15(3.50), 100.15(6.33), 100.15(8.13), 9.4(1.112) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07462 | Title: | Cannot bootup ASAv-KVM when deployed via RHEL (7.1) / OpenStack (Juno) | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASAv attempts to verify its image during bring up, but ends up failing with a console message of...
The digital signature of the booted image file did not verify successfully. 57 (Unable to get the platform key storage size or key is corrupted) Rebooting now...
Conditions: Failure occurs when deploying the ASAv on a KVM hypervisor with a host that is running with a RHEL OS distribution. The problem was noticed on RHEL version 7.1 and OpenStack (Juno).
Workaround: A workaround to reach the ASAv CLI prompt is to remove the virt-install variable setting --cpu host. You can also set the variable to --cpu none. However, setting --cpu to 'none' may have an impact on the performance characteristics of the ASAv.
Further Problem Description: A case has been opened with Red Hat (https://access.redhat.com/support/cases/#/case/01431506).
As a workaround you can update /etc/nova/release file from the compute node and restart openstack-nova-compute service:
[root@compute]# cat /etc/nova/release [Nova] vendor = Red Hat <=== product = OpenStack package = 19.el7ost
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.200) | |
Known Fixed Releases: * | 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20), 100.15(0.9), 100.15(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut96928 | Title: | ASA : Password creation date is decrementing by one with every reboot | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA " Local User" password creation date is decrementing by one day with every reboot
Conditions: ASA configured with Command : password-policy lifetime
Workaround: No workaround
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.23), 100.14(7.22), 100.15(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv07126 | Title: | ikev2 enable added to config when zones are used despite ERROR msg | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: If an interface is added to a zone, it is not possible to enable both webvpn and IKEv1, however it is not the case for ikev2 despite an ERROR message.
Conditions: -- Traffic Zones used. -- Attempt to enable ikev2
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.82), 100.14(0.56), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12), 100.15(4.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu19489 | Title: | ASA inspection-MPF ACL changes not inserted into ASP table properly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: New ACL changes not taking effect for inspection policies.
When adding new rules to the top of an existing ACL which is mapped to an inspection policy, the ASA installs this rule incorrectly at the bottom of its ASP table. This is applicable for any inspection policy that has an ACL bound to it.
Conditions: There should be an ACL bound to an inspection policy.
Workaround: Remove and re-apply the service-policy or remove and re-apply the effected class-map in the policy-map.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.54), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu16983 | Title: | ASA: failover logging messages appear in user context | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Failover syslog messages should appear in the admin context, but they appear in user context.
Conditions: ASA in multi-context mode.
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5.19), 9.2(2.8) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.18), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw33713 | Title: | IKEv2: crypto iskamp identity auto doesn't work - DN not IKE ID but IP. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Despite the "crypto isakmp identity auto" the ASA does not send DN as IKE ID. It consistently sends IPv4 address.
As a result the peer identity verification fails.
Conditions: 1. IKEv2 L2L VPN
2. Certificate hierarchy:
ECDSA key root ECDSA key sub ECDSA key identity
OR
RSA key root ECDSA key sub ECDSA key identity
3. "crypto isakmp identity auto" enabled
Workaround: Disable peer id validation under the tunnel group:
tunnel-group x.x.x.x ipsec-attributes peer-id-validate nocheck
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3), 100.16(1.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu76651 | Title: | Traps are not sent after hyperlite bootsup with all data interfaces shut | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: SNMP traps are not transmitted from the ASA
Conditions: Saleen and Kenton platforms.
The ASA boots with all of its data interfaces administratively shutdown.
Workaround: admin-up a data interface.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(29.11) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.84), 100.13(29.101), 100.13(29.34), 100.14(0.63), 100.14(16.2), 100.14(5.24), 100.14(7.46), 100.15(1.29), 100.15(10.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut64846 | Title: | To-the-box UDP traffic not getting inspected and getting dropped on ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: To-the-box UDP traffic not getting inspected and getting dropped on ASA even when the default floating route exists.
Conditions: +There should be 2 default routes with different metrics. +UDP polling only works on the interface which has better metric and fails on other interface.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(7.23), 9.1(6), 9.2(3), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.74), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv02619 | Title: | Standby ipv6 address setting is not replicated to standby | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Replicating of standby ipv6 settings is not replicated correctly.
Conditions: In L2 firewall mode and multiple context mode.
Workaround: 'write standby' twice on the active unit.
Further Problem Description: none
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6.6) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.136), 100.13(0.90), 100.14(0.67), 100.15(0.21), 100.15(1.40), 100.15(10.4), 100.15(15.4), 100.15(4.24), 100.15(8.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu09302 | Title: | ASAv: RSA key pair needs to be automatically generated with 2048 bits | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: RSA keys generated automatically on ASAv use 1024-bit length.
Conditions:
Workaround: crypto key generate rsa general-keys modulus 2048
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(21.11), 100.14(5.10), 9.4(1) | |
Known Fixed Releases: * | 100.13(0.71), 100.13(21.13), 100.13(29.28), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20), 100.15(0.9), 100.15(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32176 | Title: | IPv6 Complete Packet Fragment Reassembly Check Bypass | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: It is possible for a crafted IPv6 packet to bypass the fragment reassembly check of the Cisco Adaptive Security Appliance (ASA).
Conditions: Cisco ASA configured for IPv6.
Workaround: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/4.3: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:C&version=2.0 CVE ID CVE-2012-5736 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.11(0.63), 100.12(0.143), 100.12(0.146), 100.13(0.100), 100.13(0.95), 100.14(0.71), 100.14(0.73), 100.15(0.24), 100.15(0.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu96492 | Title: | 'terminal pager' does not clear when authorization auto-enable is used | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Terminal pager lines will not re-initiates the pager value from the running config even after the sessions terminates, unless we use a login or enable in the EXEC mode.
But when this is used along with aaa authorization, the user will not be prompted for the password when entering privileged EXEC mode. aaa authorization exec authentication-server auto-enable
So, if any of the user enters the terminal pager command, it is affecting other user sessions when logged in using aaa with privilege credentials.
Conditions: terminal pager is used and the following command is enabled. aaa authorization exec authentication-server auto-enable
Workaround: We can clear the terminal pager instead of logging in with enable or login command. clear terminal pager
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5.240) | |
Known Fixed Releases: * | 100.13(0.85), 100.14(0.66), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.63), 100.15(3.16), 100.15(4.20), 100.15(5.23), 9.4(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67315 | Title: | ASA :Top 10 Users status is not getting enabled from ASDM. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Top 10 Users status is not getting enabled from ASDM.
Conditions: ASA running code 9.3.2
Workaround: Downgrade ASA to 9.1.5 to get this feature working.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.66), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut71347 | Title: | PBA: Generate syslogs for port block allocation related failures | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: No syslogs generated when no more blocks can be allocated from the pool or when a user has already reached the configured maximum-per-host limit.
Conditions: Either no more blocks can be allocated from the pool or when a user has already reached the configured maximum-per-host limit.
Workaround: Currently we do generate debug messages which can be enabled as "debug nat 255"
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(4.31), 100.14(6.20) | |
Known Fixed Releases: * | 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15), 100.15(2.47), 100.15(3.6), 100.15(4.10), 100.15(5.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut39169 | Title: | WebVPN:Rewrite issue with 'eval' expressions inside JS on Peoplesoft app | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Some content on a Peoplesoft based application may fail to be displayed or accessible through clientless webvpn
Conditions: The application is processed by the webvpn rewriter
Workaround: Use Smart-tunnel
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.17), 100.14(26.7) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut85049 | Title: | Issue with downloading images from Sharepoint | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Image cannot be downloaded from Sharepoint
Conditions: After cookies and cache are cleared from browser
Workaround: Right click on the image and do a 'Save As' and select local disk
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(3.8), 9.4(1.112) | |
Known Fixed Releases: * | 100.12(0.137), 100.13(0.93), 100.14(0.13), 100.14(10.23), 100.14(5.15), 100.14(6.7), 100.14(7.6), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv32789 | Title: | ASA using IKEv2 rejects more than 10 NAT_DETECTION_SOURCE_IP payloads | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Acting as the IKEv2 responder, ASA receives initial IKEv2 packet that contains more than 10 payloads for NAT_DETECTION_SOURCE_IP from initiator. ASA rejects the connection, enumarates 10 payloads and prints "INVALID_SYNTAX" afterwards.
Conditions: -ASA acts as IKEv2 responder. -ASA receives more than 10 payloads for "NAT_DETECTION_SOURCE_IP" from the initator.
Workaround: Use IKEv1
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(2.8) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.141), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.62), 100.15(16.1), 100.15(17.1), 100.15(3.36), 100.15(6.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv60724 | Title: | Cisco ASA Unicast Reverse Path Forwarding (uRPF) Bypass Vulnerability | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A vulnerability in the Unicast Reverse Path Forwarding (uRPF) feature in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to bypass the uRPF validation checks.
The vulnerability is due to incorrect uRPF validation where IP packets from an outside interface whose IP address is both in the ASA routing table and associated with an internal interface are not dropped. An attacker could exploit this vulnerability by sending spoofed IP packets to the ASA in a subnet range which should be dropped. An exploit could allow the attacker to bypass uRPF validation on the ASA and the packet will be incorrectly forwarded on the internal network.
Conditions: The ASA has the command ''ip verify reverse-path interface '' configured on an outside interface which has a default route.
Workaround: None.
Further Problem Description: This problem was introduced by ASA software version 9.3(3).
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2015-4321 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(1.50), 9.3(2.100), 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.140), 100.13(0.95), 100.14(0.70), 100.15(0.24), 100.15(1.60), 100.15(16.1), 100.15(17.1), 100.15(3.32), 100.15(6.19), 100.15(6.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw32125 | Title: | ASA stacktrace in vpn client disconnect that had dACL applied | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: On the console of an ASA, the following stacktrace is seen.
Aug 12 14:54:50 10.0.7.81 %ASA-0-711001: -Traceback: 000000000042A63E 0000000001187B31 00000000011A7195 00000000011A75B3 00000000011AFBDD 00000000011B1738 0000000000531469 0000000000532D1E 0000000000540F86 0000000000531F1F 00000000004286D5
It decodes to the following:
Version:arsenal/9.0.4.17 Image Type: asa Executable: smp Symbol File: smp.sort 000000000042A63E 0000000001187B31 00000000011A7195 00000000011A75B3 00000000011AFBDD 00000000011B1738 0000000000531469 0000000000532D1E 0000000000540F86 0000000000531F1F 00000000004286D5
The stack trace decode suggest that it occurs when a client disconnects that had a dACL applied.
Conditions: ASA 5580-40 running version asa904-17-smp-k8
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.45), 100.15(17.20), 100.15(3.69), 100.15(8.17), 100.16(0.3), 100.16(1.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw03407 | Title: | DHCPD Search domain shorter than 10 characters is corrupted | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When the ASA is acting as a DHCPD server, it may corrupt the DHCP OFFER and DHCP ACK packets if the domain name configured in the DHCPD section is shorter than 10 characters long.
Conditions: This is seen when the DHCPD cofiguration has an interface specific DNS search suffix that is less than 10 characters long:
dhcpd address 192.168.1.40-192.168.1.40 guest dhcpd dns 10.0.0.100 interface guest dhcpd domain abc.ca interface guest <<<<<<<<<<<<<<<< dhcpd enable guest
This will result in the DNS search domain being sent out as a combination of the configured domain and 'cisco.com'. This can be checked using packet captures of the DHCP traffic.
In the above example, the ASA will pad the configured domain with the letters from cisco.com to reach 'abc.caom'.
Workaround: Do not configure this field or use a longer domain if feasible.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.99), 100.14(0.73), 100.15(0.26), 100.15(1.81), 100.15(16.3), 100.15(17.1), 100.15(3.49), 100.15(6.31), 100.15(8.13), 9.5(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut48571 | Title: | Incorrect cert chain sent to connecting IPSec clients | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA might not send the correct certificate chain to connecting IPSec clients.
Conditions: This may occur if the ASA has more than one version (same DNs, but different public keys) of any one of the chain certificates in its configuration.
Workaround: It may be possible to work around this by repositioning the affected certificates and trustpoints in the configuration
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.17), 100.14(26.7), 100.14(3.5), 100.14(4.25) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu13345 | Title: | Drop reasons missing from asp-drop capture | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Drop reasons missing from asp-drop capture.
Conditions: Viewing capture with "show capture -or- Downloading via HTTP with https:///capture/
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0 | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.12(0.128), 100.13(0.77), 100.13(0.78), 100.13(21.15), 100.13(21.16), 100.14(0.27), 100.14(0.35), 100.14(10.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv88898 | Title: | WEBVPN Rewriter: Stops mangling after hex code of Period on Bookmark URL | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When the hex code of the characters on a URL is used on the bookmark for Clientless webvpn, the URL mangling stops after the Hex equivalent of "period" is seen. For example : For http://www.cisco.com we use "http://www.cisco.com" The mangled URL looks like this https://ASA IP/+CSCO+0h756767633A2F2F6A6A6A++/.cisco.com
The mangling stops at . which is the Hex equivalent for "period"
Conditions: HEX code is used on the Bookmark URL
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.106), 100.14(0.76), 100.15(0.39), 100.15(17.14), 100.15(3.63), 100.15(8.16), 100.16(0.2), 100.16(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw40468 | Title: | DHCP proxy overrites chosen DHCP server in multiple DHCP server scenario | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Anyconncet clients stop connecting to the ASA because they are no longer able to get an address from the DHCP server.
Conditions: - multiple DHCP servers configured on the ASA - either DHCP server is behaving incorrectly where it sees the REQUEST (with the other server's IP) and still replies with an OFFER, or the OFFER was sent by the non-selected DHCP server before it sees the REQUEST
Workaround: configure only one DHCP server
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.150), 100.13(0.110), 100.14(0.78), 100.15(0.44), 100.15(17.18), 100.15(3.68), 100.15(8.17), 100.16(0.2), 100.16(1.5) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua32157 | Title: | Remove Code for Type 0 Routing Headers | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: This is a modification on the product to adopt new secure code best practices to enhance the security posture and resiliency of the product.
Conditions: Device configured with default configuration.
Workaround: Not applicable or available.
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2(4.5) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.54), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut67779 | Title: | Investigate impact of jumbo-frame reservation on low-end ASA platforms | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Low-end ASA models, like ASA5512-X or ASA5515-X may fail to boot if Jumbo frames are enabled (jumbo-frame reservation) and additional interface card, like ASA-IC-6GE-CU-A card is present in the chassis.
Conditions: This issue was seen in 9.2(3) and 9.3(1) software.
Workaround: Try to load 9.3(2) software, run "no jumbo-frame reservation" and reload.
Further Problem Description: Even though 9.3(2) software boots up, the ASA cannot service ASDM connections if Jumbo frames are enabled. This happens due to low volume of free DMA memory. Use "show memory detail" command to check.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.139), 100.13(0.94), 100.14(0.70), 100.15(0.23), 100.15(1.56), 100.15(16.1), 100.15(2.86), 100.15(3.31), 100.15(6.19) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv72055 | Title: | Linux Kernel splice() System Call Parameters Validation Local Denial o | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-7822
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.9:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:TF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-7822 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 6.0, 9.3(2), 9.3(2.200), 9.4(1), 9.5(1.200), 9.5(2), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut69675 | Title: | Radius Acct-Terminate-Cause for L2TP over IPSec is incorrect. | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Radius Acct-Terminate-Cause for L2TP over IPSec session is incorrect. The value in Accounting-Request always be User-Request even if the disconnected reason is loss of service
Note: The session-timeout,idle-timeout, etc. was covered by (CSCus88626), now in verified state.
Conditions: none
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(7.23), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.12(0.122), 100.13(0.66), 100.13(21.13), 100.13(28.2), 100.14(0.8), 100.14(0.9), 100.14(1.7), 100.14(10.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut54218 | Title: | ASA tunnel-group"password-expire-in-days"not prompting a password change | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "password-expire-in-days" option of "password-management" is not prompting the users for password change
Conditions: Use of anyconnect remote access and WebVPN tunnel-group "password-management"
Workaround: Revert to version 9.3.1
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.120), 100.13(0.62), 100.13(21.12), 100.13(28.2), 100.13(29.28), 100.14(0.7), 100.14(1.6), 100.14(10.10), 100.14(11.11), 100.14(2.21) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu33321 | Title: | Two Dynamic PAT with and without block-allocation | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Was able to configure wrong NAT CLI
Conditions: ASA allows Two or more dynamic PAT which has same Mapped address should have same "block-allocation" option either enable all disable all.
Workaround: Delete and re add the wrong rule.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(6.29), 100.15(5.4) | |
Known Fixed Releases: * | 100.14(0.19), 100.14(10.23), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.10), 100.15(2.35), 100.15(3.3), 100.15(4.5), 100.15(5.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu48813 | Title: | WebVpn: portal is not displayed after re-login | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When logging in to webvpn after once logging out from it, ASA goes to access a different page than the portal.
Conditions: It started to happen after 9.1(5)16 and up
Workaround: 1. Roll back to 9.1(5), if acceptable. 2. Restart the browser after logging out and before logging-in again.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5.160), 9.1(5.190), 9.1(6) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut49724 | Title: | Corrupted host name may occur with DHCP | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Corrupted host name may occur with DHCP
Conditions: Timing issue which can happen because the hostname pointer is shared by both webvpn and IP address subsystem.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw36596 | Title: | GTP: Responses w/ cause != Request Accepted should not be dropped | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Reponses with a cause value which is not request accepted maybe dropped by the ASA.
Conditions: This occurs when the request is not accepted by the receiver.
Workaround: Configure permit-errors to allow the packet through.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.5(1) | |
Known Fixed Releases: * | 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.3), 100.15(8.18), 100.16(0.4), 100.16(1.10), 9.5(1.170), 9.5(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv62204 | Title: | "show ipv6 neighbor" command not available in system space | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "show ipv6 neighbor" command is not available in the system execution space
Conditions: ASA in multiple mode.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.3) | |
Known Fixed Releases: * | 100.13(0.97), 100.15(0.25), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30), 100.15(8.13), 9.4(1.107), 9.4(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux22635 | Title: | diameter inspection should be tied to GTP/Carrier license | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The class-map and policy-map clis are accepted even the Carrier license is disabled. Expected Behavior: ASA should not accept the config
Conditions: ASA 9.5.2 image with Carier license disabled
Workaround: Workaround
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.5(1.109) | |
Known Fixed Releases: * | 100.15(0.97), 100.15(8.35), 100.16(0.11), 100.16(1.50), 100.16(15.7), 9.5(1.111), 9.5(1.194), 9.5(2), 96.1(1.4), 96.1(6.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCup89922 | Title: | ASA DNS lookups always prefer IPv6 response | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A DNS server configured on the ASA will always use IPv6 DNS requests (type=AAAA) if any of the interfaces are configured with IPv6. There is no way to prevent this behaviour, or make the ASA prefer and sending type=A requests.
Conditions: This only occurs if IPv6 is enabled on any interface of the ASA, even if no Globally Unique Address is assigned. If IPv6 is enabled, then the ASA only makes Type=AAAA DNS requests. This will always result in an IPv6 DNS response, and potentially cause features that depend on DNS to fail (ie. Smart Call Home).
Workaround: Disable all IPv6 addresses on the ASA.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(0.2), 9.1(1), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.127), 100.13(0.77), 100.13(21.15), 100.14(0.24), 100.14(10.23), 100.14(5.17), 100.14(7.32), 100.15(0.13), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc16662 | Title: | HTML/Java File Browser- created file or folder shows 9 months offset | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Create a new folder or file on the FTP or CIFS server over webvpn, the date created shown has 9 months offset.
Conditions: 1. Create a new folder or file on the FTP or CIFS server. 2. The date has 9 months offset. 3. Checked the date on the share server it looks fine. 4. Could be a display issue
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.3(1), 9.0(0.113) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.75), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu08031 | Title: | ASA QoS Priority Queue tx-ring-limit 512 causes high impact to LLQ | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: There is very big difference between tx-ring-limit 512 vs tx-ring-limit 511.
More specifically we see that with tx-ring-limit 512 packets the LLQ traffic is having packet loss, while we don't see any Tail Drops for BE traffic. With tx-ring-limit 512, the bigger the average packet size for BE traffic, the bigger the packet loss for LLQ traffic.
With tx-ring-limit 511 packets, LLQ traffic has no packet loss anymore while we start seeing many Tail Drops for BE traffic which is actually expected.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(7.26) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut37042 | Title: | Secondary ASA stuck in config sync while upgrading to 8.4.x | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In a situation where we are doing a "zero-downtime upgrade" of the firewall from 8.2(5)48 to 8.4.x, we see the following repeated messages appear on the console of the secondary unit (the primary has not yet been upgraded). Even after waiting for several hours the logs keep on appearing.
WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 10.0.0.0 255.0.0.0 eq 9998 log WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 172.20.0.0 255.252.0.0 eq 9998 log WARNING: MIGRATION: ACE converted to real IP/port values based on dynamic/static Policy NAT. The new ACE(s) need to be checked for enforcing poli permit tcp host 155.16.54.36 192.168.0.0 255.255.0.0 eq 9998 log : :
Conditions: While upgrading to 8.4(6) or 8.4(7)3 or 8.4(7)23.
Workaround: The issue does not occur for standalone ASA.
Manually upgrade (no zero-downtime upgrade) wherein we can arrange a downtime to upgrade the primary and secondary at the same time so that they don't get into syncing configuration.
Further Problem Description: If we refer the flow towards getting these warning messages, it looks like this starts occurring when at the "replication" phase than the "upgrade" phase (upgrade occurs successfully).
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(6), 8.4(7), 8.4(7.230) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.119), 100.13(0.59), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.16), 100.14(26.6) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui37201 | Title: | Misleading error msg for pat-pool with mapped object | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Wrong error message thrown while configuring dynamic PAT
Conditions: Issue is seen with dynamic PAT.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(2.5) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.82), 100.14(0.56), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.18), 100.15(1.25), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu54660 | Title: | ASA Remote Access - Phase 1 terminated after xauth | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: IPSEC remote access clients are intermittently not able to connect. The user is prompted for password and then the connection fails.
From the ASA debugs we can see the Phase 1 and X-auth + config mode are passing fine. Then the ASA deletes the Phase 1, sends delete information to the client and discards QM1 packet sent by the client.
Conditions: MacOS / iOS bult in IPSEC VPN client. Clients behind NAT. More detailed triggers unknown.
Workaround: Reload the ASA.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.12(0.128), 100.13(0.78), 100.13(21.16), 100.14(0.33), 100.14(5.17), 100.14(7.35), 100.15(0.14), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw82198 | Title: | Default inspection engines enabled on Standby but not on Active ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Standby ASA can have some default inspection engines running on custom contexts while the same are not enabled on the Active unit.
Conditions: > Pair of ASA units running in Failover pair (Act/Stb or Act/Act)
Steps to reproduce:
> Load context configuration file ONLY into Primary ASA flash memory > Initialize the context on Primary configuring the context statements and point the config-url with the file loaded on the Primary flash > Run the "write mem all" or "write memory" on the context created > Check the file with the context config on the Secondary ASA flash using the command "more disk0:/ | b policy-map" > Default inspection engines should be displayed.
Workaround: Running the "write standby" command on Active unit of affected context fixes the problem.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6.8), 9.4(1.6) | |
Known Fixed Releases: * | 100.13(0.120), 100.14(0.83), 100.15(0.86), 100.15(20.17), 100.15(8.29), 100.16(0.9), 100.16(1.34), 9.5(1.193), 9.5(1.99), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv13998 | Title: | ASA : Unable to save configuration or copy files on ASA flash | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Issues with copying or saving files on ASA flash instead of enough available space on flash
Conditions: You must be reaching the limit of 255 files on the root directory
Workaround: No workaround for this issue.
NOTE:- Even after the upgrade to pick up the fix , ASA flash needs to be formatted for the changes to take effect.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.15(2.49) | |
Known Fixed Releases: * | 100.13(0.90), 100.14(0.68), 100.15(0.22), 100.15(1.43), 100.15(15.4), 100.15(2.76), 100.15(3.26), 100.15(4.25), 100.15(8.9), 9.4(1.99) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw59382 | Title: | Rewriter errors when access IEEE website search feature through portal | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Search feature does not work when the following Internet page is opened through WebVPN: http://ieeexplore.ieee.org/Xplore/home.jsp
Conditions: When the page is opened and any keyword is searched
Workaround: Use smart-tunnel
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(2), 9.4(2.1), 9.5(0.191), 9.5(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.118), 100.14(0.81), 100.15(0.73), 100.15(17.33), 100.15(20.12), 100.15(8.23), 100.16(0.7), 100.16(1.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw08183 | Title: | ipAdEntNetMask is not gettable using snmpget with failover IP address | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ipAdEntNetMask is not gettable using snmpget with failover IP address.
Conditions: When try to get the ipAdEntNetMask value of failover interface using snmpget.
Workaround: Use the snmpwalk for this value.
Further Problem Description: none
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.0(1), 9.0(4.35), 9.1(6.6) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.34), 100.15(16.8), 100.15(17.12), 100.15(3.60), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut75202 | Title: | PKI: potential pki session handle leak in IKEv2 L2L configurations | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The ASA may become unable to establish certificate enabled LAN-to-LAN IKEv2 tunnels due to the exhaustion of pki session handles
Conditions: In IKEv2/IPSec L2L configurations that are secured with digital certificates, the ASA may leak pki session handles as connections are established. This will only occur in rare conditions where both tunnel peers initiate the tunnel at effectively the same time. Connection failures will occur when 1000 session handles are either leaked or in use. Leaked handles can be recovered by rebooting the ASA.
Workaround: The problem can be worked around by converting the LAN-to_LAN tunnel configurations to IKEv1
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20), 100.15(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv86227 | Title: | ASA sending incorrect ACL hash for ASDM TopN ACL statistics on a cluster | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Error message under firewall dashboard "n/a config out of sync" for ASDM supporting ASA cluster.
Conditions: Running ASA cluster on ASDM with threat detection statistics turned on.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.145), 100.13(0.98), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus14568 | Title: | seamless upgrade on spyker A floods error messages to both asa units | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The following error message floods the console of both the primary during step of a seamless upgrade operation from any build 9.3.1 or older to 9.3.2 and newer:
Number of interfaces on Active and Standby are not consistent. If the problem persists, you should disable and re-enable failover on the Standby.
Conditions: There is a phase in the seamless upgrade operation when the primary asa has a different image on it than the secondary. During this phase, a stream of debug messages will continually get generated to the console.
It appears as though these messages are only a nuisance and they will subside once both units are returned to a state where they are both running the same image.
The event stream is somewhat of a flood but not bad enough to prevent basic control of the seamless upgrade procedure.
Workaround: No work around is needed because all operations remain functional throughout the process
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(1.24), 9.3(2) | |
Known Fixed Releases: * | 100.12(0.142), 100.13(0.95), 100.14(0.71), 100.15(0.24), 100.15(1.66), 100.15(16.1), 100.15(17.1), 100.15(3.35), 100.15(6.21), 100.15(8.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv02304 | Title: | EEM action not executed on absolute time when NTP is configured | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: EEM action is not executed on exact time of "absolute time" configured when NTP is configured. Command is executed with some delay or earlier than configured. On the following configuration, action should be executed on 10:30:00. But actually, it is not executed on time.(for example 10:29:58)
event manager applet eem-test event timer absolute time 10:30:00 action 0 cli command "show xxxxx" output file new ntp server x.x.x.x
Conditions: When NTP server is configured or if the clock time is changed.
Workaround: Re-configure the EEM applet absolute timer if NTP is configured or the time is changed by any other means (e.g. via the 'clock set' command if NTP is disabled). This will cause the timer to be re-synced with the current clock time.
Further Problem Description: The time difference is due to the internal clock drift. It is typically a few seconds.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCub30181 | Title: | ASA doesn't set ACE inactive when time-range expires | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In some scenarios, after a time-range expires, an ASA does not mark the ACE as inactive. This causes traffic to be incorrectly permitted or denied after the time range is no longer valid.
Conditions: This affects 8.4.1 - 8.4.4 version of ASA
Workaround: Make any change to the ACL policy that will force it to re-apply the configuration. For example, move the start time of the time-range forward by 1 minute. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.5: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:W/RC:C&version=2.0 CVE ID CVE-2012-3925 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.7(13.93), 8.4(1) | |
Known Fixed Releases: * | 100.11(0.64), 100.12(0.151), 100.13(0.115), 100.14(0.79), 100.15(0.58), 100.15(17.25), 100.15(19.2), 100.15(20.4), 100.15(8.18), 100.16(0.4) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu18564 | Title: | ASA WebVPN : jQuery based Calendar table fails to load; Empty frame | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The Calendar Frame may not be displayed on the Web-page when accessed through the ASA's WebVPN portal.
Conditions: ASA running on 9.3(3)1 acting as SSLVPN Server. Users access a site through the WebVPN portal, and this site contains a Calendar month displayed in a frame using jQuery JavaScript.
Workaround: Use Smart-Tunnel feature
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.75), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut64327 | Title: | L2TP/IPsec traffic dropped due to "vpn-overlap-conflict" | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: After upgrading the code from 911 to 912/916 l2tp/Ipsec users are not able to access inside resources.
Inside hosts can reach connected l2tp/Ipsec client fine
Set up: ******* 10.48.100.0/24-----[inside] ASA [outside]---------ISP---------------Site-to-Site-VPN-peer----10.48.0.0/16 ( contains multiple subnets in 10.48.x.0/24 range, so it has been summarized to /16) | | |------------------l2tp/ipsec-vpn user (10.48.252.128-10.48.252.254)
NOTE: VPN pool falls under remote site to site network /16 range, to prevent it from matching static crypto map a deny entry has been added.
************* access-list test line 1 extended deny ip 10.48.100.0 255.255.255.0 10.48.252.0 255.255.255.0 access-list test line 3 extended permit ip 10.48.100.0 255.255.255.0 10.48.0.0 255.255.0.0 ************* Presence of either of two ACE shown above causes the drop/"vpn-overlap-conflict", only removal of both fixes the traffic issue and l2tp/Ipsec client can reach inside resources fine.
'sh asp drop' shows huge increments in 'vpn-overlap-conflict' counter.
Conditions: VPN pool falls under remote site to site network /16 range, to prevent it from matching static crypto map; a deny entry has been added to static map ACL.
access-list test line 1 extended deny ip 10.48.100.0 255.255.255.0 10.48.252.0 255.255.255.0 //** Deny vpn pool access-list test line 3 extended permit ip 10.48.100.0 255.255.255.0 10.48.0.0 255.255.0.0 //** site to site vpn ACE
Workaround: Use a different range/subnet for RA users.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(1), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu00733 | Title: | ASA: ECMP stopped working after upgrade to 9.3.2 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: After upgrade to 9.3.2, ASA for equal cost routes via the same interface:
O IA 172.25.225.0 255.255.255.0
[110/4012] via 172.22.247.4, 12:12:19, outside
[110/4012] via 172.22.247.3, 12:12:19, outside
send most of the traffic via first (sometimes second) gateway, instead of load balancing.
Conditions: Equal cost routes via the same interface on ASA
Workaround: Downgrade to 9.3.1
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.124), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.28), 100.14(7.28), 100.15(0.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv01022 | Title: | ASA:OSPF over L2L tunnels is not working with multiple cry map entries | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: OSPF over L2L tunnels is not working. Routes are installed into OSPF database successfully, but they are absent in the main routing table.
Conditions: Multiple crypto map sequences configured under single crypto map
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3.4) | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(3.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv52750 | Title: | Cannot change "management-only" for port-channel interfaces on 5500-X | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Once a port-channel interface is created, its management-only setting cannot be changed (enabled or disabled, whatever the initial management-only setting was when the interface was created). The following error is shown if an attempt to change the setting is made:
"It is not allowed to make changes to this option for management interface on this platform" This happens only with port-channel interfaces, and this behavior is not tied to the management-only state of the member interfaces.
Conditions: 5500-X models, excluding 5585-X
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.94), 100.14(0.69), 100.15(0.23), 100.15(1.53), 100.15(15.14), 100.15(16.1), 100.15(2.83), 100.15(3.30), 100.15(6.19), 100.15(6.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu92632 | Title: | ASA sets non-zero FA in OSPF for anyconnect redistrubuted network | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Re-distribution of anyconnect static routes on ASA 9.x doesn't work.
The output of the command "show ospf database external" shows the forward address being set to non-zero/incorrect value.
ciscoasa# show ospf database external 10.0.103.161
OSPF Router with ID (172.16.10.1) (Process ID 1)
Type-5 AS External Link States
LS age: 1503 Options: (No TOS-capability, DC) LS Type: AS External Link Link State ID: 10.0.103.161 (External Network Number ) Advertising Router: 172.16.10.1 LS Seq Number: 80000001 Checksum: 0xfff4 Length: 36 Network Mask:255.255.255.255 Metric Type: 2 (Larger than any link state path) TOS: 0 Metric: 20 Forward Address: 172.16.10.10 <---------------- External Route Tag: 0
Conditions: - ASA with OSPF enabled - redistributing Anyconnect VPN static addresses into OSPF - Anyconnect VPN terminates on the same interface where distribution is performed
Workaround: Route redistributed network to the Null0 interface
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.134), 100.13(0.86), 100.14(0.66), 100.15(0.20), 100.15(1.33), 100.15(10.3), 100.15(2.65), 100.15(3.16), 100.15(4.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus37840 | Title: | AnyConnect upgrade from AC 2.5 to AC 3.1 fails | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: AnyConnect upgrades fail from 2.5.X to 3.1.Y.
Conditions: ASA 9.2(1), AC upgrade from client 2.5.6005 to 3.1.5170. In general, any upgrades from AC 2.5 to 3.1 fail. Failure here means that the new version is not able to resume the tunnel initiated by the old version. The new version is still downloaded and installed.
Workaround: None.
Have client manually reconnect with the new version.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2 | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.13(29.28), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.21), 100.14(7.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu61981 | Title: | http servershows as enable in running config while not | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: When configuration command "http server enable" fails due to port usage conflict with AAA with error message ERROR: Port 443 is being used on interface public by an aaa authentication listener", the configuration is incorrectly updated to include "http server enable".
Conditions: When configuration "http server enable [port-number] is attempted but the designated port is already in use (e.g., by AAA).
Workaround: remove the conflict configuration before "http server enable"
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.108), 100.14(0.77), 100.15(0.54), 100.15(17.23), 100.15(3.76), 100.15(8.18), 100.16(0.4), 100.16(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut58935 | Title: | WebVPN: Tsweb fails to work through clientless portal | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: TSweb access through clientless VPN may fail when using a customized TSWeb portal. Users will see a blank window instead of the server logon screen
Conditions: ASA running 9.1.5.10 or later releases
Workaround: Use the rdp plugin or smart-tunnel the terminal services client.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5.10), 9.1(5.19), 9.1(5.21), 9.2(2.4), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.121), 100.13(0.63), 100.13(21.13), 100.13(28.2), 100.13(29.28), 100.14(0.8), 100.14(1.7), 100.14(10.11), 100.14(11.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu93339 | Title: | Cisco ASA Poodle TLS Variant | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptoms: Cisco ASA models 5506-X 5508-X and 5516-X include a version of SDK which is vulnerable to a variant of POODLE TLS where the first byte of the padding is not checked.
Additional information about this issue can be found at: https://vivaldi.net/en-US/blogs/entry/there-are-more-poodles-in-the-forest
Conditions: The Cisco ASA Software is affected by this vulnerability if a feature which use TLS is enabled. The exposure will be confined to that feature only. Examples of feature using TLS are, HTTP Secure server for Management, Clientless and AnyConnect SSL VPN, TLS Proxy, Phone Proxy etc...
Workaround: There are no workaround for this issue other then disabling the affected feature.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 2.6/2: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C&version=2.0 CVE-2015-4595 has been assigned to this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.2), 9.4(1.3) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.81), 100.13(29.28), 100.14(0.48), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(2.54) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu99349 | Title: | ASA-3-317012 and "No route to host" errors even though the route exists | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Certain sequence of configuration steps can lead to errors:
%ASA-3-317012: Interface IP route counter negative - Management0/0
and
No route to host
when traffic is sent from the ASA to a remote IP address and a valid route exists to reach the destination.
Conditions: This was found in transparent firewall mode in 9.3(2).
Workaround: This is a rare situation. Reboot the ASA.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.61), 100.14(16.1), 100.14(5.24), 100.14(7.45), 100.15(1.26), 100.15(19.1), 100.15(2.58) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv72826 | Title: | object-group-search access-control enabled, nested object group issue | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: asa denied traffic after moving an group object to another group object
Conditions: object-group-search access-control enabled
Workaround: reapply access-list to the interface
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6), 9.2(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.56), 100.15(8.15), 100.16(0.2), 100.16(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu75675 | Title: | kenton: For ASA5516, ASAOS should support SSLVPN of 300 instead of 250 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: For ASA5516, ASAOS supports 250 SSLVPN sessions, based on marketing data, it should increase to 300 sessions.
Conditions: ASA5516
Workaround: none
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(6) | |
Known Fixed Releases: * | 100.13(0.81), 100.14(0.49), 100.14(16.1), 100.14(5.23), 100.14(7.42), 100.15(0.17), 100.15(1.22), 100.15(19.1), 100.15(2.54), 100.15(3.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv35243 | Title: | ASA: Not able to remove ACE with "log default" keyword | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA: Unable to remove ACE with "log default" keyword enabled
Conditions: "log default" should be added at the end of the ACE
Workaround: Do not use the "log default" keyword at the end of the ACE.
In case of CSM , use the ACL Parameter as "traffic" rather than "speed"
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.94), 100.14(0.70), 100.14(16.8), 100.14(5.32), 100.15(0.23), 100.15(1.66), 100.15(16.1), 100.15(17.1), 100.15(3.35), 100.15(6.22) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsl74827 | Title: | Error messages on console due to QoS configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Due to QoS configuration on the ASA, errors like below might be seen on the console:
Message #941 : ERROR: Problem with interface 8 Message #942 : ERROR: Problem with interface 9 Message #943 : ERROR: Problem with interface 10
It is believed that these errors are cosmetic, and do not indicate a problem with the operational state of the ASA.
Conditions: QoS must be configured to encounter this problem
Workaround: None known
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.0(2), 8.1(0.135), 9.4(1.3) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.146), 100.13(0.100), 100.14(0.73), 100.15(0.26), 100.15(1.92), 100.15(16.5), 100.15(17.7), 100.15(3.51), 100.15(8.14) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu18527 | Title: | ASA WebVPN: HTTP 302 Location URL rewritten incorrectly | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: In some corner conditions, if the Backend Server responds with HTTP "302 Found" where in the Location URL the fqdn and the URI are not separated by "/", but are separated instead by a "?", ASA appends the same URI prefix as the one it got redirected from resulting in a "HTTP 404" condition.
For example: Client Performs: GET /abcd/login.php Backend Server Responds with HTTP 302 Found: Location: http://server.company.com?email=bsg73kdpo1098 At this stage, ASA rewrites this HTTP header as: HTTP 302 Found: Location: http://server.company.com/abcd/?email=bsg73kdpo1098
Here, notice that the ASA appends /abcd/ from the original URI
Conditions: ASA acting as Clientless SSLVPN Server, and the users access Intranet Websites through the WebVPN portal. The WebSites are served through ASA's Rewriter engine
Workaround: Use Smart-Tunnel feature
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3.1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.23), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.15) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu81932 | Title: | ASA tunnel-group-map cannot contain spaces | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA can not use spaces in tunnel-group-map even though tunnel group can use it.
Conditions: spaces are used in tunnel-group-map such as tunnel-group-map TEST 5 "TEST CISCO"
Workaround: NOT use spaces at now
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(5) | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(16.1), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu02635 | Title: | Remove demo and eval warning for sfr monitor-only | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A warning is produced when configuring the SFR module to monitor-only mode. Example:
ciscoasa(config)# policy-map global_policy ciscoasa(config-pmap)# class sfr ciscoasa(config-pmap-c)# sfr fail-open monitor-only WARNING: Monitor-only mode should be used for demonstrations and evaluations only. This mode prevents SFR from denying or altering traffic.
Conditions: This policy map sfr monitor-only mode is supported for production which makes the "should be used for demonstrations and evaluations only" incorrect and confusing.
Workaround: None. Ignore the "should be used for demonstrations and evaluations only" portion of the warning.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(3), 9.3(1) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.126), 100.13(0.76), 100.13(21.14), 100.14(0.17), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv90156 | Title: | All Remarks in ACLs are pushed to the end of each ACL after upgrade | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: All remarks in a ACLs are bundled together and pushed to the end of each ACL after running an upgrade
Conditions: This happens when the command "object-group-search access-control" is present in the configuration when you upgrade
Workaround: Remove the "object-group-search access-control" command before the upgrade and re-apply it after the upgrade.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3, 9.4, 9.5 | |
Known Fixed Releases: * | 100.12(0.145), 100.13(0.98), 100.15(0.25), 100.15(1.78), 100.15(16.3), 100.15(17.1), 100.15(3.46), 100.15(6.30), 100.15(8.13), 9.4(1.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88548 | Title: | Ampersand (&) not encoded in packet tracer phase 'extra' field | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASDM is unable to run packet tracer when traffic traverses and interface with an ampersand (&) in the name. ASDM will show an error indicating 'Error while forming XML'
Conditions: This is seen when the packet path traverses an interface with an ampersand character in the name.
Workaround: Change the interface name to not include an ampersand.
Further Problem Description: This is caused by the ASA not encoding the ampersand as & when generating the XML payload. You can verify you are hitting this issue by running the packet tracer command on the CLI and looking for an unencoded ampersand character. For example:
ASA# packet-tracer input inside tcp 192.168.100.200 12345 10.10.0.100 80 xml ::output truncated::
2 ROUTE-LOOKUP Resolve Egress Interface ALLOW
found next-hop 10.10.10.254 using egress ifc DMZ&Servers <<<< Unencoded ampsersand
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.130), 100.13(0.80), 100.14(0.44), 100.14(16.1), 100.14(5.21), 100.14(7.41), 100.15(0.16), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88607 | Title: | Doubling counting flow bytes for decrypted packets | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Some of statistics and syslogs related to flow bytes may be inflated due to the double counting of decrypted packets.
Conditions: Traffic involving decrypted packets.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3 | |
Known Fixed Releases: * | 100.12(0.131), 100.13(0.82), 100.14(0.54), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.24), 100.15(2.57), 100.15(5.20) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu31281 | Title: | AAA Authorization HTTP sends username in password field of authorization | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASDM access may be denied to all users even if their passwords are correct, and they are in the correct groups for authorization. This occurs because after a change in asdm authorization in 9.4.1, administrators must configure a new command, "aaa authorization http console" to authorize HTTP/ASDM logins (this was not the case in pre-9.4 code). With that command entered, the ASA sends a second packet to the authentication server but the attempt causes a failure because the ASA puts the username in the password field of the packet.
Conditions: - ASA 9.4.1 or greater - "aaa authorization http console aaa-group" configured for ASDM authorization - Has been observed with the LDAP protocol and the RADIUS protocol, but may apply to others as well
Workaround: - Disable HTTP authorization by removing "aaa authorization http console" command from configuration (NOTE: This will allow all users to login to ASDM if their credentials are valid) - Downgrade to 9.3 or lower
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.13(0.76), 100.13(21.14), 100.14(0.19), 100.14(10.20), 100.14(5.16), 100.14(7.30), 100.15(0.12), 100.15(1.10), 100.15(2.35), 100.15(3.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut80316 | Title: | Ikev2 Session with bogus assigned IP address stays on ASA | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Ikev2 EAP-TLS Connection with Win 8.1 Phone
Conditions: Ikev2 EAP-TLS Connection with Win 8.1 Phone with continuous connect/disconnect
Workaround: - Remove bogus externally assigned IP address to avoid issue /or - Wait for sometime before connecting again as address becomes available again
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.230) | |
Known Fixed Releases: * | 100.12(0.124), 100.13(0.72), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.24), 100.14(7.23), 100.15(0.9), 100.15(1.3) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu99902 | Title: | Saleen Alarm LED lit when BMC SEL log is full | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Alarm LED turned on
Conditions: SEL in BMC is full
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.6(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.132), 100.13(0.82), 100.14(0.58), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.18), 100.15(1.25), 100.15(2.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu07308 | Title: | "ssh scopy enable" deleted from configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "ssh scopy enable" deleted from configuration
Conditions: Seen in multi context ASA
ssh scopy enable is turned on.
Command may be removed when making ASA system context changes. Confirmed command will disappear after deleting a context.
Workaround: simply re-add command to configuration to continue use of ssh scopy
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.75), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.37), 100.14(7.30), 100.15(0.11) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw88405 | Title: | BGP not working when admin context is in transparent mode | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: BGP not working when admin context is in transparent mode
Working: ! ciscoasa# show context Context Name Class Interfaces Mode URL *admin default Management0/0 Transparent disk0:/admin.cfg USER1 default GigabitEthernet0/0 Transparent disk0:/USER1.txt USER2 default GigabitEthernet0/1 Routed disk0:/USER2.txt ! ciscoasa(config-router)# show run router router bgp 1 bgp log-neighbor-changes ! Non-working: ! ciscoasa# show context Context Name Class Interfaces Mode URL *admin default Management0/0 Transparent disk0:/admin.cfg USER1 default GigabitEthernet0/0 Transparent disk0:/USER1.txt USER2 default GigabitEthernet0/1 Routed disk0:/USER2.txt ! ciscoasa(config)# router bg? ERROR: % Unrecognized command
Conditions: When Admin is in transparent mode
Workaround: Make admin in routed mode
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3 | |
Known Fixed Releases: * | 100.12(0.153), 100.13(0.119), 100.14(0.82), 100.15(0.78), 100.15(20.14), 100.15(8.24), 100.16(0.8), 100.16(1.27), 9.5(1.99), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu73087 | Title: | Standalone AnyConnect fails to connect due to empty DAP user message | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Standalone AnyConnect client fails with the following message: 'The VPN configuration received from the secure gateway is invalid. Please contact your network administrator.'
Conditions: 1) The AnyConnect client version 2.5.6005 or lower is referenced on the ASA. 2) The DAP record being hit - not the Default DAP record - has no user message. 3) ASA version is 9.3.2 and above.
Workaround: 1) Configure a User Message for the DAP record. 2) Use the AnyConnect client version 3.0.x/3.1.x/4.x on the ASA.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2), 9.3(3.1), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.129), 100.13(0.79), 100.14(0.41), 100.14(16.1), 100.14(5.20), 100.14(7.38), 100.15(0.15), 100.15(1.20), 100.15(2.53), 100.15(3.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur56038 | Title: | RPC error in request config after replicated a large configuration | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptoms: RPC error when configuration is replicated in a cluster environment
Conditions: ASA configured for firewall cluster
Workaround: none
PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.2(1) | |
Known Fixed Releases: * | 100.11(0.55), 100.11(0.57), 100.12(0.111), 100.12(0.118), 100.13(0.17), 100.13(0.58), 100.13(19.9), 100.13(21.11), 100.13(21.6), 100.14(0.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCty36034 | Title: | ASA: Active/Active failover group stuck in Bulk Sync with SIP inspect | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom:
Under rare conditions, an ASA Active/Active failover pair may show one of the failover groups stuck in the Bulk Sync state due to HA state progression failures.
Conditions:
The ASA must have SIP inspection enabled.
Workaround:
There is no known workaround at this time. Reloading both ASAs in the failover pair may clear the problem, but this is currently unconfirmed. | |
Last Modified: | 15-JAN-2016 | |
Known Affected Releases: | 8.2(5) | |
Known Fixed Releases: * | 100.7(13.62), 100.7(18.14), 100.7(20.4), 100.7(6.67), 100.8(0.87), 100.8(11.13), 100.8(24.42), 100.8(27.2), 100.9(0.1), 100.9(2.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux59851 | Title: | Anyconnect IKEv2 with Host Scan can't connect with SSL disabled | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Anyconnect is able to connect via IKEv2 with host scan enabled and SSL Access allowed. After disabling SSL access I can't connect and get the message "Posture Assessment Failed: Unable to get the available CSD version from the secure gateway."
Conditions: Version 9.5.2
Workaround: 1. Downgrade to 9.5.1 2. Do an enable on the interface [ conf t-> webvpn -> enable ]
Further Problem Description:
| |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: * | 100.15(0.109), 100.16(0.19), 100.16(1.98), 96.1(1.52) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCun32897 | Title: | Data path: ASA traceback in CTM message handler | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA crash
Conditions: Large amount of IPSec based traffic when a crypto reset occurs.
Workaround: None
Further Problem Description:
| |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: | 9.1(2) | |
Known Fixed Releases: * | 100.10(9.6), 100.11(0.2), 100.8(38.127), 100.8(40.65), 100.8(56.34), 100.8(63.2), 100.8(64.7), 100.8(65.4), 100.8(66.7), 9.0(4.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCto36047 | Title: | ASA drops traffic due to vpn-user with no vpn filter applied | |
Status: | Terminated | |
Severity: | 3 Moderate | Description: * | Symptom:
When traversing over IPsec VPN user traffic is dropped by access-list (vpn-filter) although none is configured.
Conditions: First seen in ASA 8.3 as headend terminating ezvpn in client mode.
Workaround: Reload the ASA to clear the situation.
Further information To understand if you're affected by this bug following details need to be gathered: - trace detail capture from ingress and egress interface e.g. ------------ capture TRACE_INSIDE interface inside access-list MY_ACCESS_LIST packet 1512 trace detail ------------ perform the test and do : ------------ show capture TRACE_INSIDE trace detail ------------ - show uauath - Traffic capture in PCAP format - packet-tracer output for dropped flow
| |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: | 8.3 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux65627 | Title: | 100G EPM traffic slowly ramp up to 80 Gbps for single blade | |
Status: | Open | |
Severity: * | 3 Moderate | Description: | Symptom: 100G EPM traffic slowly ramp up to 80 Gbps for single blade
Conditions: Using 100G EPM only to run traffic
Workaround: Use 8x10G on board ports instead.
Further Problem Description: N/A
| |
Last Modified: | 21-JAN-2016 | |
Known Affected Releases: | 96.1(1.24), 99.1(4.908) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux63770 | Title: | IPAA needs improved debugging - Part 2- add Syslogs 737034-737036 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: Hard to troubleshoot errors during DHCP assigning addresses with IPAA
Conditions: Error path conditions
Workaround: None
Further Problem Description:
| |
Last Modified: | 21-JAN-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: * | 100.13(0.124), 100.15(0.109), 100.16(0.19), 9.0(4.212), 9.1(6.117), 96.1(1.53), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux38633 | Title: | PLR: ASAv10 uses an ASAv30 entitlement | |
Status: | Open | |
Severity: * | 3 Moderate | Description: | Symptom: When licensing an ASAv with PLR after switching between ASAv models, an ASAv10 can sometimes reserve an ASAv30 license.
Conditions: Begin with a licensed ASAv10 that is in PLR mode. Return the ASAv license entitlement Change the ASAv10 to an ASAv30 in the VMWare settings Load the ASAv30 Check the ASAv VM status by issuing 'show vm' to verify it is an ASAv30 Power down the ASAv30, and change settings back to an ASAv10 Check the ASAv VM status by issuing 'show vm' to verify it is an ASAv10 License the ASAv10 again with PLR. It sometimes reserves an ASAv30 license.
Workaround: After changing models and booting up with a new model, reboot before issuing PLR commands.
Return the PLR license and re-license.
Further Problem Description:
| |
Last Modified: | 22-JAN-2016 | |
Known Affected Releases: | 100.15(8.38) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux27028 | Title: | L2TP/IPSec fails with Multilink PPP enabled on Win client | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: L2TP/IPSec fails with Multilink PPP enabled on Win client
Conditions: ASA running version 9.4 and Multilink PPP setting is enabled on Windows Client.
Workaround: Disable Multilink PPP on end client -
1. Open the Network Connections folder and view available connections. 2. Right-click the L2TP connection, and then click Properties. 3. On the Options tab, click PPP Settings. 4. Uncheck the Negotiate multi-link for single-link connections check box.
Further Problem Description:
| |
Last Modified: | 24-JAN-2016 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: * | 100.13(0.125), 100.15(0.110), 100.16(0.20), 96.1(1.52), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux41876 | Title: | ASA IPSEC crypto map set df-bit copy-df/clear-df does not take effect | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: The change of "df-bit" setting in crypto map is not taking effect. The global setting is used.
E.g.:
show run all | inc df-bit crypto ipsec df-bit copy-df inside crypto ipsec df-bit copy-df outside crypto map vpnmap 1 set df-bit clear-df
show crypto ipsec sa Crypto map tag: vpnmap, seq num: 1, local addr: 203.0.113.1 ... PMTU time remaining (sec): 0, DF policy: copy-df
OR
show run | inc df-bit crypto ipsec df-bit clear-df outside crypto map vpnmap 1 set df-bit copy-df
show crypto ipsec sa Crypto map tag: vpnmap, seq num: 1, local addr: 203.0.113.1 ... PMTU time remaining (sec): 0, DF policy: clear-df
Conditions: - L2L VPN on ASA. - Different df-bit setting is needed for different tunnels in the same crypto map, sourced from the same interface.
Workaround: No workaround - the only option is to use the same global setting for all the tunnels.
Further Problem Description: crypto map set df-bit options do not take effect. Instead global ipsec configuration for an interface is considered for choosing DF policy. This behavior has been modified so that crypto map settings are given preference over global ipsec configuration. In other words, if crypto map is configured with df-bit setting, then it will override the global IPsec configuration. If neither, global or crypto map are configured, then, same as earlier, copy-df bit will be used.
| |
Last Modified: | 24-JAN-2016 | |
Known Affected Releases: | 9.0(2), 9.2(3.4), 9.3(2), 9.5(2) | |
Known Fixed Releases: * | 100.13(0.125), 100.15(0.110), 100.16(0.20), 96.1(1.52), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux98333 | Title: | Global inspection policy is getting deleted during APIC audit | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: * | Symptom: Global inspection policy is getting deleted during APIC audit process
Conditions: Configure Global inspection policy using OOB configuration
Workaround: The work around is to rename default policy-map from "global_policy" to "global_app_inspect_policy" as shown below. ======================== policy-map global_policy class inspection_default inspect dns preset_dns_map ... service-policy global_policy global
------------------------------------------- policy-map global_app_inspect_policy class inspection_default inspect dns preset_dns_map .... service-policy global_app_inspect_policy global
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 1.2(3.11) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux99061 | Title: | ASA - SSH keys lost after reload on selected contexts | |
Status: | Open | |
Severity: | 3 Moderate | Description: | Symptom: Unable to SSH to device after reload. Crypto keys (e.g. used for SSH connection) are gone after reload on selected contexts; keys on other contexts are saved properly.
Conditions: Multiple context mode.
Workaround: Connect to ASA in alternative way (console, telnet or ASDM) and generate new keys.
Further Problem Description: | |
Last Modified: | 26-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux86065 | Title: | Delete PDP Context Response should not be dropped if TEID is NULL | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: A Delete PDP Context Response could be dropped by the ASA with the following syslog:
%ASA-3-324001: GTPv1 packet parsing error for message Delete PDP Context Res from outside:12.0.0.2/2123 to inside:10.0.0.2/23451, TEID: 0x00000000, Reason: Null TID
Conditions: When the GSN cannot find the corresponding PDP context to process the Delete Request.
Workaround:
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 9.5(1.172) | |
Known Fixed Releases: * | 9.5(1.176), 96.1(1.58), 96.2(1.109) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv35050 | Title: | ASA - slow NFSv3 transfer with sunrpc inspection | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: ASA 9.1.x - slow NFSv3 transfer.
Conditions: ASA running 9.1.x with sunrpc inspection enabled.
Workaround: Disable inspection or configure TCP state bypass, decrease sunrcp timeout to much lower value so that secondary data connection times out.
Further Problem Description:
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.1(3) | |
Known Fixed Releases: * | 100.11(0.66), 100.12(0.155), 100.13(0.121), 100.15(0.106), 100.16(0.16), 100.16(1.82), 100.16(14.1), 100.8(40.112), 96.1(1.34), 96.1(6.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux99214 | Title: | ASA5516 SSD reports incorrect OID in Entity MIB | |
Status: | Open | |
Severity: | 3 Moderate | Description: * | Symptom: Wrong OID returned for ASA5516 SSD in Entity MIB
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux14935 | Title: | AnyConnect profile updates are not deployed properly against ASA-9.5.2 | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: AnyConnect profile updates are not deployed properly against ASA-9.5.1
Conditions: ASA-9.5.1.101
Workaround: Downgrade ASA version - 9.4.1 in my case
Further Problem Description:
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 9.5(1.101) | |
Known Fixed Releases: * | 100.15(0.94), 100.15(8.33), 100.16(0.10), 100.16(1.44), 100.16(14.1), 100.16(15.5), 9.5(1.107), 9.5(1.193), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux90740 | Title: | "backup" command does not include anyconnect client profile files | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: "backup" command via CLI does not contain AnyConnect client profile files.
Conditions: backup ASA configuration via CLI
Workaround: Backup ASA configuration via ASDM
Further Problem Description:
| |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.13(0.127) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus08552 | Title: | show traffic protocol stats show large counter values-enhanced pkt stats | |
Status: | Fixed | |
Severity: | 3 Moderate | Description: | Symptom: show traffic protocol statistics show huge counter values after enhanced packet stats are enabled .
Conditions: After enhanced packet statistics are enabled with the command "sysopt traffic detailed-statistics", some of the counter values arevery large as displayed wiht "show traffic" command.
Workaround: None
Further Problem Description:
| |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 100.12(0.101), 9.3(1.108) | |
Known Fixed Releases: * | 100.13(0.127), 96.1(1.59), 96.2(1.110) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua71298 | Title: | Help arp in context shows arp permit-nonconnected | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Help arp in admin and user contexts shows arp permit-nonconnected entry, which is only available in system context.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.149), 100.13(0.114), 100.14(0.79), 100.15(0.56), 100.15(17.24), 100.15(3.77), 100.15(8.18), 100.16(0.4), 100.16(1.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua66518 | Title: | Help arp SYNTAX section misses "permit-nonconnected" entry | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Help arp misses permit-nonconnected entry in SYNTAX section.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(4), 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.65), 100.12(0.154), 100.13(0.120), 100.13(0.121), 100.14(0.83), 100.14(0.84), 100.15(0.87), 100.15(0.90), 100.15(20.17), 100.15(20.18) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu88297 | Title: | SSP ASA OS reports incorrect sysObjectID value / reports it's a ASA5585 | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: The FirePower ASA blade reports an incorrect sysObject ID value, where it reports itself as an multicontext ASA5585.
Conditions: All
Workaround: None
Further Problem Description: With the fix for CSCuu88297, and once the new CISCO-PRODUCTS-MIB is available in August, 2015, the sysObjectOID will be one of the following: CISCO-PRODUCTS-MIB::ciscoFpr9000SM24 CISCO-PRODUCTS-MIB::ciscoFpr9000SM36
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1.80) | |
Known Fixed Releases: * | 100.14(0.63), 100.14(7.41), 100.15(1.33), 100.15(10.4), 100.15(6.4), 9.5(1.99), 9.5(2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCty30899 | Title: | fqdn command option is removed when deleting RSA key | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: If both fqdn and keypair commands are configured in trustpoint, and RSA key which is associated with the trustpoint is removed by crypto key zeroize, fqdn command's option is unexpectedly removed and remains blank.
Conditions: Both fqdn and keypair commands are configured in trustpoint.
Workaround: Reconfigure fqdn command with option in trustpoint configuration mode.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2, 8.4 | |
Known Fixed Releases: * | 100.13(0.60), 100.13(21.11), 100.13(28.2), 100.14(0.6), 100.14(1.5), 100.14(10.9), 100.14(2.18), 100.14(26.7), 100.14(3.6), 100.14(4.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq09430 | Title: | ASA "debug webvpn anyconnect 255" not showing empty certificate issue | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: "debug webvpn anyconnect 255" should be much more in situations of empty certificate being sent
Conditions: Empty cert sent
Workaround: Troubleshoot the problem using capture on different end.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.13(0.65), 100.13(21.13), 100.14(0.9), 100.14(10.11), 100.14(11.13), 100.14(26.10), 100.14(4.38), 100.14(5.13), 100.14(6.9), 100.14(7.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv96380 | Title: | Failover uptime sync failure | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: ASAs running in Failover, Failover up time doesn't sync up to match on both the ASAs.
Conditions: ASAs in failover with huge number of contexts in a multicontext setup.(108 context in my setup)
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(4), 9.1(4.5), 9.1(6) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.107), 100.14(0.77), 100.15(0.36), 100.15(17.12), 100.15(3.61), 100.15(8.15), 100.16(0.2), 100.16(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv62112 | Title: | show version and show tech show "BIOS Flash unknown" | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: You may see "BIOS Flash unknown @ 0x0, 0KB" in the show version and show tech outputs
Conditions: Affects ASA5506 appliances. Looking for bios flash information in show version or show tech output.
Workaround: None
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(3), 9.4(1) | |
Known Fixed Releases: * | 100.12(0.137), 100.13(0.94), 100.14(0.69), 100.15(0.23), 100.15(1.53), 100.15(15.15), 100.15(16.1), 100.15(2.83), 100.15(3.32), 100.15(6.19) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux67036 | Title: | ROMMON CLI for accessing FPGA SPI Flash in KilburnPark | |
Status: | Open | |
Severity: | 4 Minor | Description: | Symptom:N/A
Conditions:Workaround:More Info:This is a HW development debugging feature only.
| |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 0.1(0) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtr84992 | Title: | Possible to add multiple identical lines under certificate maps | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Identical config lines are allowed under crypto ca map
Conditions: ASA 8.4.1 with crypto ca map
Workaround: remove them manually
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.8(50.40), 8.4, 8.4(1) | |
Known Fixed Releases: * | 100.11(0.61), 100.12(0.135), 100.13(0.88), 100.14(0.67), 100.15(0.21), 100.15(1.37), 100.15(10.4), 100.15(15.2), 100.15(2.75), 100.15(4.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCty02525 | Title: | Last transaction time in 'show aaa-server' cmd changes. | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | # Release-note
Symptom: Last transaction time in the output of 'show aaa-server' command changes by a single seccond.
Conditions: none.
Workaround: none.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2(0), 8.4 | |
Known Fixed Releases: * | 100.13(0.67), 100.13(21.13), 100.14(0.9), 100.14(10.12), 100.14(11.13), 100.14(26.10), 100.14(4.41), 100.14(5.13), 100.14(6.11), 100.14(7.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuo65775 | Title: | Cisco ASA Information Disclosure Vulnerability | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: A vulnerability in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to disclose sensitive data. This information could be used for reconnaissance attacks.
The vulnerability is due to insufficient protections of sensitive data before authentication with the AnyConnect client. An attacker could exploit this vulnerability by attempting to authenticate to the device with AnyConnect which could disclose the sensitive information.
Conditions: Device running with default configuration running an affected version of software using the AnyConnect client.
The AnyConnect client can be running any version of software.
Workaround: None.
Further Problem Description: None.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 5/4.1: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:OF/RC:C&version=2.0 CVE ID CVE-2016-1295 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: * | 8.4, 9.1, 9.3, 9.4 | |
Known Fixed Releases: | 100.11(0.47), 100.12(0.48), 100.12(6.7), 100.13(0.3), 100.13(11.2), 100.13(12.3), 100.13(13.1), 100.13(14.2), 100.13(15.1), 100.13(16.1) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw75736 | Title: | ASA 9.4 - The source of CoA packet does not match tunnel-group config | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: -- change in configuration order resulted in failed CoA NAK, with the following error:
"The source of CoA packet does not match tunnel-group config."
Conditions: non-working configuration ====================== sh run aaa- aaa-server ACCT protocol radius accounting-mode simultaneous interim-accounting-update reactivation-mode timed aaa-server ACCT (inside) host 172.16.1.13 key ***** aaa-server ACCT (inside) host 172.16.1.14 key ***** aaa-server ISE protocol radius authorize-only interim-accounting-update dynamic-authorization aaa-server ISE (inside) host 172.16.1.13 key *****
Workaround: working configuration ====================== sh run aaa- aaa-server ISE protocol radius authorize-only interim-accounting-update dynamic-authorization aaa-server ISE (inside) host 172.16.1.13 key ***** aaa-server ACCT protocol radius accounting-mode simultaneous interim-accounting-update reactivation-mode timed aaa-server ACCT (inside) host 172.16.1.13 key ***** aaa-server ACCT (inside) host 172.16.1.14 key *****
Further Problem Description: N/A
| |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 9.4(1.5) | |
Known Fixed Releases: * | 100.13(0.127), 96.1(1.58), 96.2(1.110) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv29505 | Title: | EEM Action Sometimes Executed Multiple Times | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Sometimes an event manager absolute time (time-of-day) applet can run multiple times.
Conditions: NTP is configured, or the system clock has been manually modified.
Workaround: None
Further Problem Description: This happens if the actual system time-of-day is earlier than the configured absolute time when the event manager applet runs. When that happens, the applet is then re-armed and will execute again that day at the expected time.
The applet execution time can get out-of-sync due to automatic time adjustments done by NTP, or if the system clock is manually changed via the "clock set" CLI command.
The fix for CSCuv02304 "EEM action not executed on absolute time when NTP is configured" reduced the likelihood of this happening, but there is still a possibility that it could occur.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.12(0.133), 100.13(0.85), 100.14(0.66), 100.15(0.20), 100.15(1.32), 100.15(10.3), 100.15(2.62), 100.15(3.16), 100.15(4.20), 100.15(5.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur42057 | Title: | Smart Licensing: License config warning needs message classification | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: Incomplete smart licensing config will be reported as an error by ASDM.
Conditions: User configures only one part of smart licensing. There are two parts: feature tier and throughput. If the user specifies only one and then exits, the message that is displayed will be interpreted as an error by ASDM.
Workaround: Configure both parts of smart licensing before exiting smart licensing config.
Further Problem Description: This should be displayed as a warning by ASDM. The code should be modified to prepend "WARNING:" so that ASDM properly displays it as a warning.
| |
Last Modified: | 25-JAN-2016 | |
Known Affected Releases: | 100.12(6.24) | |
Known Fixed Releases: * | 100.16(0.20), 96.1(1.56), 96.2(1.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv93976 | Title: | NTP: Standby ASA sends NTP with source 0.0.0.0 if standby ip not set | |
Status: | Fixed | |
Severity: | 4 Minor | Description: | Symptom: A standby ASA in a failover pair may send NTP packets with a source IP of 0.0.0.0 if the interface those packets would normally leave from does not have a standby ip configured.
Conditions: This is seen in failover deployments where the NTP server facing interfaces does not have a standby IP in its configuration.
Workaround: Configure the standby ip address for that interface.
Further Problem Description:
| |
Last Modified: | 24-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 100.13(0.125), 100.15(0.110), 100.16(0.20), 96.1(1.53), 96.2(1.104) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux26909 | Title: | Doc: ASA5506 does not support Time-based Security Plus license | |
Status: | Fixed | |
Severity: | 4 Minor | Description: * | Symptom: This is a bug being opened for documentation update.
ASA5506 does not support Time-based Security Plus license.
This information needs to be updated on the applicable ASA5506/Licensing Docs:
Release 9.3: http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/intro-license.html
Release 9.4: http://www.cisco.com/c/en/us/td/docs/security/asa/asa94/configuration/general/asa-general-cli/intro-license.html
Conditions: ASA5506 Security Plus time-based license
Workaround: N/A
Further Problem Description:
| |
Last Modified: | 13-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtl51881 | Title: | Error not generated w/ duplicate ACE entry when containing object-group | |
Status: | Open | |
Severity: | 4 Minor | Description: * | Symptom: If duplicate ACE entry containing object-group is added, ASA doesn't generate Error for duplicate ACE. Error/warning message should be generated for invalid entry.
Conditions: Duplicate ACE entry with object-group is added to ASA.
Workaround: none. | |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: * | 8.0(5.22), 8.2(4.1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsi39394 | Title: | FO: Need to surpress the below messages on the standby | |
Status: | Open | |
Severity: * | 4 Minor | Description: |
Symptom: The Standby unit does not supress all error messages that are depicted on the active ASA
Conditions: Issuing specific commands on the active Failover unit may display some error messages on the standby unit
Workaround: NA
Further Problem Description:
| |
Last Modified: | 19-JAN-2016 | |
Known Affected Releases: | 8.0(0.248) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCur31916 | Title: | Possible DoS from libxml2 entity parsing (CVE-2014-3660) | |
Status: | Other | |
Severity: | 4 Minor | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-3660
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 4.3:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-3660 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 8.4(1), 8.5(1), 8.6(1), 8.7(1), 9.0, 9.1(1), 99.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCut12172 | Title: | Unable to observe any DHCP lease information using the show command | |
Status: | Open | |
Severity: * | 4 Minor | Description: | Symptom: Customer is unable to observe any lease information using the "show ip address dhcp lease" command on the ASA.
Conditions: The customer has a failover setup and the AC clients are connected to the ASA. There are 2 DHCP servers in the setup. When customer executed bulk sync on the ASA's, the customer was unable to observe any lease information on the console for the show command.
Workaround: None.
Further Problem Description: The problem details are available in the case SR 633070885 (http://www-tac.cisco.com/Teams/ks/c3/casekwery.php?Case=633070885&noheader=1)
| |
Last Modified: | 17-JAN-2016 | |
Known Affected Releases: | 9.1(4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv29083 | Title: | ASA packet-tracer shows wrong output with PBR and policy NAT | |
Status: | Open | |
Severity: | 5 Cosmetic | Description: * | Symptom: - Consider topology where ASA has two default routes (e.g. one primary ISP, one backup ISP). - Furthermore on ASA there is policy NAT configured for the backup ISP. - On ASA there is PBR configured for specific traffic which 'forces' it to select the backup link. - The real traffic is indeed routed based on PBR to backup ISP bypassing the route lookup. - The packet-tracer output though shows that the traffic is routed based on route lookup which is wrong. - The same applies for capture with trace detail option. It shows wrong egress interface (ISP1 instead of ISP2) - The trigger for this packet-tracer misbehavior is the policy NAT configuration.
Conditions: ASA has policy NAT configured that uses service as condition e.g. nat (inside,NET2) source static obj-10.0.0.1 interface service UDP_69 UDP_69
Workaround:
Further Problem Description: | |
Last Modified: | 08-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux81063 | Title: | ASA: Incorrect counters in show resource usage output | |
Status: | Open | |
Severity: | 5 Cosmetic | Description: * | Symptom: ASA shows incorrect counter in show resource usage output.
Conditions: ASA in multiple context with resource class configured for a specific ASA context.
Workaround: None at this time.
Further Problem Description:
| |
Last Modified: | 13-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuc02113 | Title: | ISAKMP debugs display incorrect Message ID and length data | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: ISAKMP debugs display the MessageID and Length values incorrectly in the BEFORE ENCRYPTION section when sending a packet.
Conditions: Cisco ASA running release 7.2.4 or 8.2.5. ISAKMP debugs are enabled at level 255.
Workaround: Use "capture type isakmp interface "
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 7.2(4), 8.2(5.31) | |
Known Fixed Releases: * | 100.11(0.58), 100.12(0.124), 100.13(0.71), 100.13(21.13), 100.14(0.11), 100.14(10.16), 100.14(5.15), 100.14(6.22), 100.14(7.21), 100.15(0.9) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCum67159 | Title: | ENH : Unclear warning while enabling AC essentials license | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: When a key with anyconnect license enabled is activated, the warning message is not clear enough to understand that the clientless webvpn and hostscan features will not work anymore as the anyconnect-essentials gets configured under the webvpn configuration. Below is the message that comes up on cli as of now.
ASA# activation 0xdf1cc57f 0x94835e6a 0x3d4271bc 0xe0900464 0x$ Validating activation key. This may take a few minutes...
********************************************************************** WARNING: AnyConnect Essentials license active. Basic VPN support is in effect. For specific details, please refer to Cisco AnyConnect VPN Client Administrator Guide. **********************************************************************
The Warning should be extended to let the administrator know that:
Anyconnect essentials gets enabled under this part of the configuration:
webvpn anyconnect-essentials
Conditions: 1. Activating license key which has anyconnect essentials enabled on an ASA that acts as AnyConnect, Clientless SSLVPN Server with/without CSD. 2. Use CLI to activate the license.
Workaround: If Clientless SSLVPN and CSD functionalities are required, we would need to disable "anyconnect-essentials" manually: webvpn no anyconnect-essentials
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(4) | |
Known Fixed Releases: * | 100.12(0.132), 100.13(0.84), 100.14(0.64), 100.14(16.2), 100.14(5.24), 100.14(7.46), 100.15(1.34), 100.15(2.73), 100.15(3.17), 100.15(4.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua66557 | Title: | arp permit-nonconnected not indented in help arp multiplei mode | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: Help arp in multiple mode has incorrect indentation for "arp permit-nonconnected" entry.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(4.2) | |
Known Fixed Releases: * | 100.11(0.62), 100.12(0.144), 100.13(0.96), 100.14(0.71), 100.15(0.24), 100.15(1.77), 100.15(16.3), 100.15(17.1), 100.15(3.45), 100.15(6.30) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus22893 | Title: | Extra space after newline in some syslogs | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: There is an extra whitespace character after the newline character in syslogs:
733104 733105 734001 717012 717011 717010 717009 717008 717007 717006 717005 717004 717003
Conditions: This is seen in all versions of ASA code. Refer to the bug details for more information on fixed version.
Workaround: None, this is purely cosmetic.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5), 9.2(3), 9.3(2) | |
Known Fixed Releases: * | 100.11(0.59), 100.12(0.125), 100.13(0.73), 100.13(21.13), 100.14(0.12), 100.14(10.19), 100.14(5.15), 100.14(6.28), 100.14(7.28), 100.15(0.10) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu99716 | Title: | CISCO-PROCESS-MIB::cpmCPUTotalPhysicalIndex 1st/last entries should be 0 | |
Status: | Fixed | |
Severity: | 5 Cosmetic | Description: | Symptom: The first and last entries in the CISCO-PROCESS-MIB::cpmCPUTotalPhysicalIndex table are '1'. They should be zero.
Conditions: all
Workaround: none
Further Problem Description: The first entry corresponds to the context-average. The last entry corresponds to the system average. Since these represent more than one physical entity and are not represented in the ENTITY-MIB, according to the definition of the cpmCPUTotalPhysicalIndex from CISCO-PROCESS-MIB.my, the values for cpmCPUTotalPhysicslIndex should be zero.
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.14(0.51), 100.14(16.1), 100.14(5.23), 100.14(7.43), 100.15(0.17), 100.15(1.24), 100.15(2.57), 100.15(3.12), 100.15(5.20), 100.15(8.5) | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCuy05878 | Title: | ASA: dir command should allow for pipe commands | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: On the ASA, the directory command "dir" is not able to use the pipe command "|". This enhancement is a request to be able to use the pipe command to be able to filter out info.
Conditions: ASA firewall and using the directory command from the CLI.
Workaround: You can use the pipe with "show flash".
Example: show flash | inc filename
Further Problem Description:
| |
Last Modified: | 30-JAN-2016 | |
Known Affected Releases: | 9.5(2), 9.6(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCtz82865 | Title: | SNMP MIB: Equivalent of "show xlate count" command | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Need SNMP MIB support to allow polling to get the equivalent to the "show xlate count" command.
Conditions: Cisco ASA running release 8.4.4 with SNMP enabled.
Workaround: None.
Additional Information: Will add cnatAddrBindNumberOfEntries and cnatAddrBindSessionCount OID's to support xlate_count and max_xlate_count. | |
Last Modified: | 31-JAN-2016 | |
Known Affected Releases: | 100.7(6.77), 9.1(5) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.118), 100.13(0.127), 100.13(0.58), 100.13(28.2), 100.13(29.28), 100.14(0.13), 100.14(0.5), 100.14(1.4), 100.14(10.23) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv83951 | Title: | ASA webvpn: Citrix SSO for Storefront 2.6 does not work | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: SSO for Citrix Storefront 2.6 does not work. This is an enhancement request to support the same.
Conditions: Using SSO for Storefront version 2.6
Workaround: none
Further Problem Description:
| |
Last Modified: | 29-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: * | 100.16(1.16), 100.16(14.1), 96.1(1.54), 96.1(1.57) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus79188 | Title: | Support SHA2/TLS 1.2 in 9.1.x code for ASA Benetton platforms | |
Status: | Terminated | |
Severity: | 6 Enhancement | Description: * | Symptom: Support SHA2/TLS 1.2 in 9.1 Code
Conditions: SHA2 support was introduced in ASA 9.3.2 code, however, 9.1 is the last version that runs on the 5510,5520, 5540, and 5550 platforms. This is an enhancement request to support SHA2 in 9.1.
Workaround: None
Further Problem Description: The cavium crypto hardware in the 5510, 5520, 5540, and 5550 models do not support TLSv1.1 or TLSv1.2
| |
Last Modified: | 28-JAN-2016 | |
Known Affected Releases: | 9.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuw03419 | Title: | SPYD PIM BSR 1K mcast group UDP 64B PPS is 50% more lower than no PIM | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: SPYD PIM BSR UDP 64B PPS is 50% lower than without PIM
Conditions: -Topology: Source-RP-router-(inside)ASA(outside)-destination client.
Workaround: Do not use PIM
Further Problem Description: N/A
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux96525 | Title: | Need to support "cut-through" SGT use-case | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: ASA lacks the capability to propagate untagged SGT packets as untagged while at the same time propagating tagged packets as tagged.
Conditions: All
Workaround: Noe
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | EVERCLEAR | |
Known Fixed Releases: * | 96.2(1.109) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq58646 | Title: | L2 cluster slave unit exiting cluster while sending multicast traffic | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: L2 cluster slave unit exiting cluster while sending multicast traffic
Conditions: send ixia traffic directly to ASA
Workaround:
Further Problem Description:
| |
Last Modified: | 27-JAN-2016 | |
Known Affected Releases: | 100.12(10.32), 9.1 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux46195 | Title: | Hyperlite Support for SD Card | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: SD Card Play and Play would not work. SD card plag and play would work fine in all other devices with HW Version greater or equal to 2.1
Conditions: Cisco SKU (ISA3000-4C, ISA3000-2C2F) with HW Version less than 2.1 as seen in output "show modules".
Workaround: None. Box needs to be RMA-ed so that SD card Microcontroller firmware can be upgraded.
Further Problem Description:
| |
Last Modified: | 26-JAN-2016 | |
Known Affected Releases: | 100.15(21.12) | |
Known Fixed Releases: * | 96.1(1.28), 96.1(1.57), 96.1(5.2), 96.1(5.3), 96.2(1.107) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsu46132 | Title: | AD msNPAllowDialin to be set without ldap-attrib-map for VPN access ctrl | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom:Enhance the ASA to automatically trigger the control of VPN remote access, when the Active Directory Dial-in remote Acces VPN attribute (msNPAllowDialin) is received the during an LDAP authentication/authorization exchange,; without the need for an ldap-mapping such as in http://www.cisco.com/en/US/partner/docs/security/asa/asa80/configuration/guide/extsvr.html#wp1661796.
Conditions:
Workaround:None..Use the LDAP-attribute-mapping mechanism to control authorization attributes from AD/LDAP.
Further Problem Description:
| |
Last Modified: | 26-JAN-2016 | |
Known Affected Releases: * | 8.0, 8.1, 8.2 | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux55274 | Title: | ASA Syslog: log for reacching some percent of license usage | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom: ASA platforms
Conditions: Using licensees that are countable
Workaround: none
Further Problem Description:
| |
Last Modified: | 20-JAN-2016 | |
Known Affected Releases: | 8.4(7), 9.0(1), 9.1(6), 9.2(1), 9.4(1) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux87646 | Title: | DOC: ASA Data Sheets Max Scansafe connection limit | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Data sheet does not contain hard-coded Max Scansafe connection limit for ASA units ASA5505 2000 ASA5510 10000 ASA5520 20000 ASA5540 40000 ASA5550 50000 ASA5580 100000 5585-SSP10 200000 5585-SSP20 400000 5585-SSP40 400000 5585-SSP60 400000 ASA5515 20000 ASA5525 100000 ASA5545 150000 ASA5555 200000
Conditions: -
Workaround: -
Further Problem Description: | |
Last Modified: | 17-JAN-2016 | |
Known Affected Releases: | 9.0(4) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv71763 | Title: | ASAv does not increment broadcast packet count | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: The "broadcasts" counter is not getting incremented correctly in the ASAV "show interface" command
Conditions: Only occurs on virtual platforms, first observed on 9.3.2
Workaround: None
Further Problem Description:
| |
Last Modified: | 15-JAN-2016 | |
Known Affected Releases: | 100.14(5.26), 9.3(2), 9.4(1.200) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuq38206 | Title: | ENH: ASA show tech should include 'dir all-filesystems' | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Enhancement to add 'dir all-filesystems' to show tech output
Conditions: n/a
Workaround: n/a
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5) | |
Known Fixed Releases: * | 100.11(0.63), 100.12(0.148), 100.13(0.105), 100.14(0.76), 100.15(0.31), 100.15(16.7), 100.15(17.11), 100.15(3.57), 100.15(8.15), 100.16(0.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus19373 | Title: | IPv4 connected & Local route addition & deletion at mgmt-only interface | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: mgmt traffic using data path route
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(0.8) | |
Known Fixed Releases: * | 100.13(27.1), 100.14(0.13), 100.14(10.23), 100.14(4.9), 100.14(5.15), 100.14(6.11), 100.14(7.12), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuu22517 | Title: | ASA - SNMPv3 Traps not Generated for PC Link State in Multi-Context Mode | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: On an ASA running in multi-context mode with port-channels allocated to individual contexts, SNMP traps will not be generated when member interfaces of the port-channel go down although the following syslogs are seen in the context itself:
%ASA-6-426002: PORT-CHANNEL:Interface GigabitEthernet0/2 unbundled from EtherChannel interface Port-channel1 %ASA-6-426001: PORT-CHANNEL:Interface GigabitEthernet0/2 bundled into EtherChannel interface Port-channel1
Conditions: 1. Must be using an ASA in multi-context mode 2. Must have port-channels allocated to contexts with at least two member interfaces 3. Must be attempting to monitor the status of the member interfaces via SNMPv3 within the context
Workaround: it is possible to generate traps via the syslogs by using the 'snmp-server enable traps syslog' in conjunction with the 'logging history informational' command, however this causes a very large amount of traps to be generated. There is an ongoing investigation to determine if there are other, more suitable workarounds.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 9.1(5), 9.2(2.4) | |
Known Fixed Releases: * | 100.12(0.146), 100.13(0.98), 100.14(0.73), 100.15(0.26), 100.15(1.83), 100.15(16.4), 100.15(17.3), 100.15(3.50), 100.15(6.33), 100.15(8.13) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCui69677 | Title: | SNMP: ENTITY-SENSOR-MIB returns wrong values for 5585 | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: Some of the ENTITY-SENSOR-MIB OID's return the wrong values for the 5585. Particularly for Power supply input and sensors it returns entPhySensorType as truthvalue for all 4. For the Power supply Fan sensor, this should be rpm
Conditions: Cisco ASA running release 8.4.6.
Workaround: None.
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.4(6) | |
Known Fixed Releases: * | 100.11(0.57), 100.12(0.117), 100.13(0.55), 100.13(21.10), 100.14(0.13), 100.14(0.4), 100.14(1.4), 100.14(10.23), 100.14(10.8), 100.14(11.8) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus43455 | Title: | ASA IPV6 Policy-Based Routing (PBR) support | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: ASA doesn't support IPV6 Policy-Based Routing (PBR)
Conditions: -
Workaround: -
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.14(4.2), 9.1 | |
Known Fixed Releases: * | 100.14(0.13), 100.14(10.23), 100.14(4.1), 100.14(5.15), 100.14(6.11), 100.14(7.12), 100.15(0.11), 100.15(1.12), 100.15(1.2), 100.15(2.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus07884 | Title: | Cli's for management-only interface | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: mgmt traffic using data path route
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(0.8) | |
Known Fixed Releases: * | 100.13(27.1), 100.14(0.13), 100.14(10.23), 100.14(4.9), 100.14(5.15), 100.14(6.11), 100.14(7.12), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus33123 | Title: | NP Table changes for management-only interface | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: mgmt traffic using data path route
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(0.8) | |
Known Fixed Releases: * | 100.13(27.1), 100.14(0.13), 100.14(10.23), 100.14(4.9), 100.14(5.15), 100.14(6.11), 100.14(7.12), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus32313 | Title: | IPv4 Route addition and deletion through EIGRP on management interface | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: mgmt traffic using data path rout
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 100.13(0.8) | |
Known Fixed Releases: * | 100.13(27.1), 100.14(0.13), 100.14(10.23), 100.14(4.9), 100.14(5.15), 100.14(6.11), 100.14(7.12), 100.15(0.11), 100.15(1.12), 100.15(1.2) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCta36873 | Title: | BTF: DNS query response with EDNS0 option does not get added to DNSRC | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | <B>Symptom:</B> When DNS snooping is enabled with the Botnet Traffic Filter feature, it is supposed to watch for DNS query response packets that come through the ASA, and add it to the DNS Reverse Cache (DNSRC). An issue was found in which if the DNS query response packet has additional Resource Record (RR) with EDNS0 option used, the ASA would pass the DNS query response packet through BUT does not add it to the DNSRC. This mechanism would cause the Botnet Traffic Filter not being able to flag the malicious traffic for the domain names that is in the A record response.
When this issue is seen, a 'debug dynamic-filter dns-snooping' would print "rr off end".
<B>Conditions:</B> DNS snooping is enabled.
<B>Workaround:</B> None
Further Problem Description: PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base and Temporal CVSS scores as of the time of evaluation are 4.3/4.1: http://tools.cisco.com/security/center/cvssCalculator.x?vector=AV:N/AC:M/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C&version=2.0 CVE ID CVE-2013-5520 has been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.2 | |
Known Fixed Releases: * | 100.14(0.13), 100.14(10.23), 100.14(2.3), 100.14(5.15), 100.14(6.4), 100.14(7.7), 100.15(0.11), 100.15(1.12), 100.15(1.2), 100.15(2.26) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCua55270 | Title: | Issue warning when executing 'write standby' command on active firewall | |
Status: | Fixed | |
Severity: | 6 Enhancement | Description: | Symptom: There is confusion over the functionality of the 'write standby' command and its impact to a failover pair. Many believe that it 'saves' the config on the standby device. This is not the case. This bug is to track a possible change/warning that could be displayed when issuing 'write standby'.
ASA/act# write standby NOTE: 'write standby' forces a complete re-replication of the configuration from the Active unit to the Standby unit. It does not save the configuration to the startup configuration on the Standby unit. To save the configuration changes to the startup configuration on the Standby, simply use the 'copy running-config startup-config' command or 'write memory' on the Active unit. The command will be replicated to the peer unit and the configuration saved to the startup configuration on both devices.
Conditions:
Workaround:
Further Problem Description:
| |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: | 8.0(4), 8.2(5), 8.4(4), 9.0 | |
Known Fixed Releases: * | 100.14(0.30), 100.14(10.23), 100.14(5.17), 100.14(7.34), 100.15(0.13), 100.15(1.15), 100.15(2.47), 100.15(3.6), 100.15(4.10), 100.15(5.12) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCuv10516 | Title: | Security alert:Python JSON Module Vulnerability | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptoms:
This product includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2014-4616
This bug was opened to address the potential impact on this product.
Conditions:
Device with default configuration.
Workaround:
Not currently available.
Further Problem Description:
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The highest Base and Temporal CVSS scores of all vulnerabilities tracked by this bug as of the time of evaluation are 5.0:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&vector=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:W/RC:C
The Cisco PSIRT has assigned this score based on information obtained from multiple sources. This includes the CVSS score assigned by the third-party vendor when available. The CVSS score assigned may not reflect the actual impact on the Cisco Product.
CVE ID CVE-2014-4616 have been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html | |
Last Modified: | 14-JAN-2016 | |
Known Affected Releases: * | 1.1(2), 1.1(3), 1.1(4), 6.0, 9.5(2), 9.5(2.200), 99.1, 99.1(2) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCub34054 | Title: | L2 Clustering:OSPFv2, Eigrp and OSPFv3 RIB not replicated to slave node | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Master unit may not always sync OSPFv2, EIGRP, and OSPFv3 RIB to Slave unit.
Conditions: ASA Cluster configuration
Workaround: When table is not in sync, clear routing process/neighbor for sync to occur from Master to Slave .
Further Problem Description:
| |
Last Modified: | 13-JAN-2016 | |
Known Affected Releases: * | 100.12(10.45), 100.12(8.16), 100.12(8.23), 100.16(1.64), 100.8(0.217), 8.3, 9.0(1), 9.3(0.101) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCus85257 | Title: | ASA Connector - Provide Higher Layer Health Checks for CWS Tower | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: The ASA may not failover to the backup CWS tower when the CWS tower is in a degraded state but remains responsive to ASA TCP health checks. This may cause traffic interruption in the network environment when the ASA continues to redirect web traffic to the degraded tower. This is an enhancement request to provide more granular health checking between the ASA and the CWS tower.
Conditions: This can occur if the CWS tower is degraded (not down) but is still able to complete the 3-way TCP handshake with the CWS tower.
Workaround: Manually point the ASA to the backup CWS tower
Further Problem Description:
| |
Last Modified: | 13-JAN-2016 | |
Known Affected Releases: | 9.3(2) | |
Known Fixed Releases: * | 9.2(3.160), 9.2(3.161) | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux13150 | Title: | ASDM: Backup/Restore does not work with policy-map global_policy | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: | Symptom: When part of default inspection setting is removed from global_policy, backup/restore does not work with it. For example, when "inspect esmtp" is disabled on policy-map global_policy and backup/restore configuration after that, "inspect esmtp" is enabled.
In backup, configuration is like following.
policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp <<<--- inspect esmtp was disabled inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options
But after restoring from backup, "inspect esmtp" is enabled though configured "no inspect esmtp". It is not only the case with esmtp but also others like tftp or ip-options or anything.
Conditions:
Workaround: Manually disable these inspection setting after restoring
Further Problem Description:
| |
Last Modified: | 08-JAN-2016 | |
Known Affected Releases: | 9.2(0) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux74953 | Title: | DHCP-Proxy leases shouldn't be renewed during a failover | |
Status: | Open | |
Severity: * | 6 Enhancement | Description: * | Symptom: During an Active/Standby failover event ,all DHCP-Proxy leases are renewed by the new active ASA.This is not desireable since this may cause ASA and DHCP performance/IP allocation issues.
Request:The standby ASA must keep track of leases so when it becomes active all leases are known and therefore without need to renew possible 1000s of leases , for example in the case of the ASA servicing 1000s of VPN Clients with DHCP address assignment.
Conditions: Active/Standby Failover and DHCP-Proxy address assignment.
Workaround: None
Further Problem Description:
| |
Last Modified: | 07-JAN-2016 | |
Known Affected Releases: | 9.0(4), 9.0(4.213), 9.1(6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCsv29942 | Title: | .NET framework is not working with non-web application/smart-tunnel-list | |
Status: | Open | |
Severity: | 6 Enhancement | Description: * | Symptom: Specific homegrown .NET framework application is not working with webvpn- smartunnel: config for non-web applications (smart-tunnel-list) .
Conditions: ASA running 8.0.3.9 or any 8.x code or 9.x code Homegrown .NET framework application is used, user start the application from the start menu. Webvpn-smartunnel: config for non-web applications (smart-tunnel-list) is configured Auto-start Smart Tunnels is configured in the group policy using "exe" .exe and app.exe
Workaround: The use of the Anyconnect client should be used to access .NET framework applications.
Further Problem Description:
| |
Last Modified: | 07-JAN-2016 | |
Known Affected Releases: * | 8.0(3.9), 9.1(6) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | New | Bug Id: | CSCux74639 | Title: | ENH: Add support for SHA-2 certificate with ASA as local CA | |
Status: | Open | |
Severity: | 6 Enhancement | Description: | Symptom: Cisco ASA configured for Local CA server
Conditions: Cisco ASA 5500-X series firewall running code 9.5.2
Workaround: None
Further Problem Description: | |
Last Modified: | 06-JAN-2016 | |
Known Affected Releases: | 9.5(2.240) | |
Known Fixed Releases: | | |
|
| | | | |
Alert Type: | Updated * | Bug Id: | CSCux40506 | Title: * | Unable to launch OSx 10.11 Citrix desktop on Citrix Receiver 12 | |
Status: | Other | |
Severity: | 6 Enhancement | Description: | Symptom: Unable to launch Citrix desktop on Citrix Receiver 12
Conditions: Launching a Citrix client to a Citrix server through webvpn
Workaround: none
Further Problem Description:
| |
Last Modified: | 04-JAN-2016 | |
Known Affected Releases: | 9.5(2) | |
Known Fixed Releases: | | |
|
| |
|
没有评论:
发表评论