CSCuw57184
|
Not keep URL entries in cache forever.
|
CSCuw73747
|
DST for Europe/Istanbul time zone is now on a different date
|
CSCux17501
|
SSL inspection blocks traffic with decryption errors for sites with 3072 bit key
RSA certificates
|
CSCux42313
|
Cisco ASA module captive portal redirect gets stuck
|
CSCux61395
|
UserIDs get lost if an error occurs while streaming to the sensor
|
CSCuy10223
|
ASA Security Zone cannot be used in Active Authentication identity rules
|
CSCuy18154
|
ADISubscriber shuts down before session receive in SFDataCorrelator
|
CSCuy21943
|
Firepower Threat Defense / Unable to deploy after restoring a backup
|
CSCuy56306
|
SCP Expect during backup to remote server times out and fails
|
CSCuy57310
|
Cisco Adaptive Security Appliance Traffic Flow Confidentiality Denial of Service
Vulnerability
|
CSCuz09515
|
Active/Passive authentication does not work with predefined objects
|
CSCuz85967
|
New added management interface does not have "management-only"
configuration
|
CSCuz92983
|
Policy deployment fails with mode 10 Gbit Full-Duplex for lag interface
|
CSCva21702
|
Traffic capture BPF validation
|
CSCva34909
|
DNS blacklist has an 81 character limit
|
CSCva36446
|
ASA Stops Accepting Anyconnect Sessions/Terminates Connections Right After
Successful SSL handshake
|
CSCva44278
|
Policy apply fails due to orphaned database objects
|
CSCvb13949
|
Readiness Check option should NOT be enabled for VDB updates
|
CSCvb28202
|
False warnings in DB Integrity Check for PlatformSettings object
|
CSCvc03899
|
Firepower Threat Defense managed by Management Center- High unmanaged disk usage
on /ngfw
|
CSCvc37876
|
Policy deploy fails due to inconsistency in Primary Threat Defense device pair in
the backend
|
CSCvc44535
|
Under rare circumstances captive portal is very slow and even unresponsive
|
CSCvc48180
|
Application categories and tags are missing in Version 6.1 or 6.2.1
|
CSCvc48768
|
Search Option does not work for network objects under NAP editor
|
CSCvc50598
|
Comparison reports for intrusion policy between two revisions is not working
correctly
|
CSCvc55341
|
Intermittent error 500 when trying to review an event from the packet view
|
CSCvc56921
|
Altering logging settings like disabling syslog causes IPS and File policies to
become disabled
|
CSCvc65909
|
ASDM:Importing access control policy leads to duplicate objects
|
CSCvc77913
|
Custom configuration for SFDataCorrelator should be checked on updates otherwise
it may remain down
|
CSCvc84585
|
Firepower sensor will not ingest users from ISE using EAP chaining
|
CSCvc91092
|
Cisco FireSIGHT System Software Arbitrary Code Execution Vulnerability
|
CSCvc92934
|
When SSL decryption is enabled, URL constraints in access control policy are not
applied correctly
|
CSCvd19749
|
Upgrade from 6.1.0 to 6.1.0.1 failed at 000_start/113_EO_integrity_check.pl
|
CSCvd28906
|
ASA traceback at first boot in 5506 due to unable to allocate enough LCMB
memory
|
CSCvd29303
|
Disk status health monitoring should be disabled for virtual ASA 5500-X
series
|
CSCvd32767
|
Unable to use objects inside IPS rules
|
CSCvd35049
|
Hard-coded query limit needed to prevent QueryEngine and Report Generation
failures
|
CSCvd39729
|
Firepower Enterprise Objects Missing References Causes Multiple Problems
|
CSCvd51066
|
URL cloud lookup has URL category as Uncategorized
|
CSCvd59044
|
Access Control Policy does not match condition with URL SI lists for HTTPS
traffic
|
CSCvd59268
|
possible to have data-interfaces + Firepower Management Center from cli_firstboot
wizard
|
CSCvd61462
|
Partial match of DNS Queries if DNS Feed or DNS List contains single word
entry
|
CSCvd72150
|
Deleted objects continue to show up as available to add to variable sets on the
Management Center UI
|
CSCvd83845
|
SafeSearch-specific codes get hit even if SafeSearch rule is disabled in
Firepower Management Center
|
CSCvd84471
|
Connections not blacklisted by Security Intelligence due to memory (memcap)
issues
|
CSCvd91889
|
Unable to change logical name of interface and add sub-interface
|
CSCve00330
|
Document details on what synchronizes between Firepower Management Centers in
High Availabilty
|
CSCve03600
|
SMTP traffic prematurely reaching SafeSearch engine rule.
|
CSCve11879
|
Ping traffic is dropped for 1 minute during high availability switchover
|
CSCve12096
|
Failure on deleting port object used in manual NAT rule
|
CSCve17433
|
Policy deployment failing on AWS Firepower Management Center
|
CSCve23827
|
Restore from backup fails when clock is behind on restore device
|
CSCve31929
|
Firepower Management Center does not show any network discovery data when using
security zones
|
CSCve42340
|
URL Database Updates Use IP for Proxy Connection in HTTP Header
|
CSCve42379
|
SCALE : Avoid queueing Sync Sybase to MySQL task if similar PENDING task already
there
|
CSCve42542
|
not allowed to choose Firepower Threat Defense as Secondary Peer during High
Availability creation
|
CSCve45573
|
Internal error message while loading access control policy in Japanese
environment
|
CSCve48087
|
Deploy policy tab failed to populate the device list from Firepower Management
Center
|
CSCve49433
|
Threat Defence Platform Settings Policy does not check the NTP input value
properly
|
CSCve49546
|
Policy apply failed at "FINALIZE" prevents future policy apply from
succeeding
|
CSCve49643
|
User logins with double byte characters are not recorded on Firepower Management
Center correctly
|
CSCve49722
|
Can't export if intrusion policy inherits intrusion layer from parent
domain
|
CSCve49778
|
Threat Defense ICMP platform settings security zones with multiple interfaces not
handled properly
|
CSCve55618
|
DNS policy generates DNS responses for already generated responses, if it is seen
over the wire
|
CSCve56743
|
Firepower Threat Defense pair: Snort is dropping traffic inspite of having a
trust rule.
|
CSCve57521
|
For NGFW rules processing, always use first packet of flow to determine initiator
direction
|
CSCve57858
|
Sites with large certificate not loading with SSL policy turned on even with
"Do not decrypt" action
|
CSCve60167
|
Upgrade framework needs to review onbox scripts NEVER_SKIP
|
CSCve61540
|
Cisco Adaptive Security Appliance Application Layer Protocol Inspection DoS
Vulnerabilities
|
CSCve73129
|
DB query does not terminate when upgrade to 6.2.1 fails
|
CSCve77286
|
Intrusion policy rule filter is not working properly
|
CSCve79555
|
ASA/Threat Defense traceback when clearing capture-assertion "0"
failed: mps_hash_table_debug.c file
|
CSCve84791
|
Capturing asp-drop causes unexpected ASA failure
|
CSCve87945
|
Cannot install new https certificate
|
CSCve88764
|
Don't restore Primary Firepower Management Center backup to secondary
|
CSCve90384
|
high availability break/Config Deployment fails on 2100 platforms when in
secondary is Active
|
CSCve98443
|
User Identity count tracking may be incorrect
|
CSCve98877
|
Dashboard Drilldown Does Not Match Top Level Report
|
CSCve99511
|
Traceback and reload in thread name: sfr-vpn-status-watcher when unit takes
active role
|
CSCve99818
|
Time window setting for Connection events gets reset to different range
|
CSCvf01839
|
vFMC getting logged out for "An unauthorized action has been detected"
after some idle time
|
CSCvf04102
|
Error generating report preview for Vulnerabilities section
|
CSCvf06031
|
After adding a secondary Firepower Threat Defense to cluster, deploy can fail
|
CSCvf12392
|
Security Intelligence category may be incorrect in alert response from
correlation policy
|
CSCvf12828
|
Device stuck at HA state progression failed due to App sync issue on QP FTD HA
pair
|
CSCvf15067
|
Sync hostname to ASA when device is managed by Firepower Management Center/no
manager
|
CSCvf18641
|
Connection events are not generated for unmonitored hosts in ND rules
|
CSCvf18966
|
Adding Port Group Object to Extended Access Control Entry causes ERROR: Invalid
Protocol
|
CSCvf25032
|
FMC: Ownership of sydb.out changes to root and prevents vmsDbEngine/dbsrv16 to
start
|
CSCvf25058
|
Firepower Threat Defense Security Intelligence DNS memcap exceeded health
alert
|
CSCvf25444
|
Copying Realm and replacing users in SSL policy criteria corrupts policy
|
CSCvf27979
|
Unable to view access control policy with the error "End value is less than
start value"
|
CSCvf34791
|
Install 6.2.2-1290 on an ASA with Firepower Services-- ASA fails
unexpectedly.
|
CSCvf35266
|
Deployment failure if group policy is unassigned from connection profile and
deleted in advanced tab
|
CSCvf41793
|
High memory usage of ids_event_processor/ids_event_alerter when threshold.conf
file is not pruned
|
CSCvf42199
|
Core seen while running snort restart automated regression suite for more than 14
hours.
|
CSCvf45952
|
high availability progression failed for secondary when pair is rebooted due to
App-sync failure
|
CSCvf46168
|
"no capture <name> stop" doesn't change capture status from
Stopped
|
CSCvf46886
|
Security Analyst User Role not permitted to download file from malware event
|
CSCvf49737
|
Add state-checking options on H323 policy inspect map
|
CSCvf53734
|
access control rules and Categories duplication on Firepower Management Center
UI
|
CSCvf55897
|
Disable Intrusion Policy controls on Default action in Access Policy Page
|
CSCvf56476
|
DNS Flexconfig removed after enabling LDAPS on Firepower 2120 device
|
CSCvf56533
|
Cannot re-register Firepower 9300 cluster to a different Firepower Management
Center
|
CSCvf57862
|
Snort install silently fails and automatic deploy after Snort is installed is
skipped
|
CSCvf60738
|
Elektra Registration failures due to RPC call failures
|
CSCvf61157
|
Firepower Management Center DB corruption name mismatch
|
CSCvf64643
|
ERROR on Firepower Threat Defense device: Captive-portal port not available. Try
again
|
CSCvf64882
|
Deployment Failing on high availability pair due to Cluster Hold Request Timed
Out by ASA
|
CSCvf64914
|
updates to local URL filtering database and/or cloud dispositions need to
supersede cached data
|
CSCvf65014
|
Having custom "End Time" in "Intrusion Events" Analysis
returns a blank page with no events
|
CSCvf65226
|
OSPF Redistribution command not getting deleted on Firepower Threat Defense
device
|
CSCvf65245
|
Monitor rule does not log large sessions (such as file transfers)
|
CSCvf68502
|
Unable to assign FQDN for hostname in Certificate Signing Request
|
CSCvf71365
|
Log appropriate message if SFDataCorrelator exits during startup due to empty VDB
tables
|
CSCvf73465
|
re-registration failed due to stale entry in ID_MAPPING table post device
delete
|
CSCvf74023
|
Smart License registration failures when Proxy Authentication is configured on
Management Center
|
CSCvf74113
|
Firepower Intrusion rule UI policy deploy fails when threshold seconds of rules
set to 00, 08, 09
|
CSCvf75062
|
Deployment failed with 'ERROR: Trustpoint not enrolled'
|
CSCvf77836
|
FTD HA - both devices go into unknown state when HA break is performed
|
CSCvf78629
|
Custom Fingerprint GUI offers "Defense Center" instead of
"Firepower Management Center" option
|
CSCvf81725
|
syncd uses high memory and exits when loading firewall_rule_cache table
|
CSCvf82315
|
IP address for 10G interfaces cannot be changed from GUI.
|
CSCvf91371
|
Invalid certificate error seen when internal CA is used for SSL Decrypt-Resign
rule
|
CSCvf95633
|
Management Center: Interface "mac-address-table" command not sent to
the Firepower Threat Defense
|
CSCvf98386
|
FDM pre-shared key changed to random value after upgrade
|
CSCvg02051
|
Large user/group tables due to duplicated entries when group names are not
ASCII
|
CSCvg03671
|
FMC policy deployment slows down due to multiple failed attempts by Snort to load
SI data
|
CSCvg04309
|
Micro-Engine failure due to TCAM leads to bb-heath not generating
auto-troubleshoot.
|
CSCvg06811
|
Add captive_portal.log to logrotate.d
|
CSCvg09316
|
Cisco Firepower Threat Defense Software Policy Bypass Vulnerability
|
CSCvg20782
|
Identified Vulnerabilities associated with the CVEs from Oracle MySQL Patch
Updates
|
CSCvg21939
|
Parts of Firepower Management Center GUI not loading in Firefox 56
|
CSCvg23945
|
ASA panic/crash spin_lock_fair_mode_enqueue: Lock (mps_shash_bucket_t) is held
for a long time
|
CSCvg24416
|
FTW inline interfaces do not go into hardware bypass during Firepower 4100
Series
|
CSCvg24892
|
6.2.3 Snort configuration validation failed due to ERROR: SMTP: Could not
allocate SMTP mempool.
|
CSCvg27431
|
Applying large access control policy fails on AWS - 6.2.2.1
|
CSCvg27511
|
Network Object - getting 'missing entry' while trying to delete an
existing object
|
CSCvg27590
|
Daily Change reconciliation report lacks details and users on Firepower 6.2.2
|
CSCvg29442
|
When IPSec is enabled, high availability goes in Active-Failed state
|
CSCvg29791
|
FlexConfig - System variable should contain subinterface ID
|
CSCvg30947
|
more than one default route with same metric allows on Threat Defense
device's routing table
|
CSCvg32590
|
6.1-6.2.3 upgrade: FTD upgrade failed with /ngfw/var/lib/mysql/sfsnort: not
accessible error
|
CSCvg37391
|
Migrated access control policy deploy fails since it has FQDN objects
|
CSCvg37456
|
Deployment to high availability pair successful on active unit; standby unit will
be updated message
|
CSCvg38612
|
Upgrade failure from 6.2.0 -> 6.2.3-10646 on FDM
|
CSCvg38789
|
Nested entities not deleted when deploying an object
|
CSCvg39981
|
Firepower Management Center not displaying Firepower Threat Defense cluster names
correctly
|
CSCvg43759
|
URL filter matching fails - Two SSL Certificate CNs Concatenated
|
CSCvg45236
|
Lower-than-expected 256 byte block count with fast-path pre-filter SSL policy
|
CSCvg46466
|
Cisco FMC and Firepower System Software SF Tunnel Control Channel Command
Execution Vulnerability
|
CSCvg47696
|
Not able to create RA VPN after removing DfltGrpPolicy
|
CSCvg48363
|
With verbose SSL logging enabled, logs can consume all available disk space
|
CSCvg50707
|
Firepower Threat Defense high availability policy deploy fails with Found more
than one NGFW Policy
|
CSCvg52545
|
9300 pair NGFWs in inlineIPS mode do not trigger SNAP packet updates with proper
VLAN tags
|
CSCvg58777
|
Multiple Vulnerabilities in Apache tomcat
|
CSCvg58825
|
Report generated from access control policy using object group in sub-domain is
blank/0 bytes
|
CSCvg61624
|
Deployment fails when Secondary-Active Primary-Disabled (by doing suspend
operation in device)
|
CSCvg61737
|
Deployement failed due to "Snort validation failed due to Unable to open
rules file snort.conf file"
|
CSCvg61760
|
Not all the syslog messages on Firepower Threat Defense are available for
editing
|
CSCvg61799
|
Sysopt permit-vpn behavior change to prevent unintended clear-text traffic
|
CSCvg62337
|
Memory calculation in Snort incorrect for Firepower Threat Defense devices
|
CSCvg66727
|
sysopt connection tcpmss 0 not removed after removing jumboframe
|
CSCvg67377
|
Malware correlation rule is missing Device condition
|
CSCvg71501
|
ASA/FTD device needs to be rebooted after adding Base license with
export-controlled function
|
CSCvg73042
|
SSL Cache missing session info leading to ERR_SSL_PROTOCOL_ERROR in the browser
for SSL websites
|
CSCvg76789
|
MASTER_KEY_INVALID flow error on FMC shown when having DND on few websites
|
CSCvg76907
|
Repeated SFDaco crashes if current_user_ip_map references invalid realm, somehow
caused by RA-VPN?
|
CSCvg78622
|
Deployment failed in policy and object collection
|
CSCvg80346
|
Init Process Respawning on FMCv/FTDv/NGIPSv
|
CSCvg83924
|
Traffic not hitting the access control rule which has deprecated Application in
it
|
CSCvg85613
|
Smart call home does not work properly with HTTP Proxy, when Authentication is
turned on
|
CSCvg86139
|
After breaking Firepower Threat Defense high availability pair, policy deploy
fails
|
CSCvg86366
|
Change Reconciliation Report not generated after upgrade
|
CSCvg87754
|
Unable to disable certain VPN related Syslog IDs from Management Center (like
402114 or 402119)
|
CSCvg90403
|
Blocks of size 80 leak observed when IRB is used in conjunction with multicast
traffic
|
CSCvg93202
|
Dashboard custom analysis flow_chunk queries block event processing for hours
|
CSCvg93556
|
Deployment on a healthy KP HA pair failed with message
"ssp_ha_state_improper"
|
CSCvg94796
|
Security Intelligence Connection Events showing '0' for Initiator
User
|
CSCvg95046
|
Customer Success Network fails after upgrade of high-availability Firepower
Management Centers
|
CSCvg98609
|
Management Center REST API - Threat Defense pairare not reported as targets on
GET policyassignments
|
CSCvg98640
|
Cluster-Hold-Abort and Cluster-Hold-Timeout during policy deployment not handled
correctly
|
CSCvg99285
|
[ERROR] Failed to init octeon -- FATAL ERROR: Can't initialize DAQ oct_ssl
(-1)
|
CSCvh01213
|
An ASA may Traceback and reload when processing traffic
|
CSCvh03962
|
Cisco Firepower Management Center Command Injection Vulnerability
|
CSCvh05658
|
NAT policy assignment by device group does not update UI after moving device to
different group
|
CSCvh05897
|
Firepower Threat Defense Cluster Registration with Group may fail
|
CSCvh07577
|
Cannot remove "management-access" configuration via flexconfig
|
CSCvh12923
|
Need to update docs that Firepower Threat Defense in cluster mode does not
support Remote Access VPN
|
CSCvh14447
|
Rule parsing error was ignored in 602_log_package.pl.log during Snort update
|
CSCvh14478
|
policy deployment fails with QoS policy on firewall rulechecker
|
CSCvh15228
|
Firepower Threat Defense Traffic Zone Member Causes Traffic Interruption
|
CSCvh16252
|
ASA may traceback and reload in Thread Name: fover_rep during conn
replication
|
CSCvh19991
|
User/Group Download fails when an Included Group is missing from the AD
Server
|
CSCvh20742
|
Cisco Adaptive Security Appliance Clientless SSL VPN Cross-Site Scripting
Vulnerability
|
CSCvh23085
|
Cisco Adaptive Security Appliance Application Layer Protocol Inspection DoS
Vulnerabilities
|
CSCvh25000
|
custom user role unable to generate CSV reports without "health"
privileges enabled
|
CSCvh25562
|
Cannot modify an access control rules / "An internal error occurred"
error
|
CSCvh25977
|
blank space must be remove at the end of device name - cannot find events
|
CSCvh26084
|
SFDataCorrelator core in deserialization of corrupt flow event
|
CSCvh28733
|
Firepower Management Center allows wrong NAT rule when switching policy from
Static to Dynamic
|
CSCvh31939
|
Firepower Management Center allows deleting Interface Object being used in SLA
monitor object
|
CSCvh47069
|
Firepower Management Center Data purge causes managed sensor to wipe out user
sessions upon reboot
|
CSCvh49388
|
Cisco FireSIGHT System VPN Policy Bypass Vulnerability
|
CSCvh49748
|
Malware.exe getting downloaded in the first try bypassing file detection due to
unknown app-id
|
CSCvh53414
|
Access control policy deployment failing when object description contains
"?" character
|
CSCvh53597
|
Policy deploy fails if SSL Policy has deprecated AppDetector
|
CSCvh53901
|
SFDataCorrelator cores when reading invalid fingerprint type from database
|
CSCvh59772
|
Deployment fails after S2S/RA VPN is deleted/unassigned following some edits and
testing on it.
|
CSCvh59884
|
Notifications about pruned events contains invalid date/time (Thu Jan 1 00:00:01
1970)
|
CSCvh62164
|
ASA standby stuck in Bulk-Sync state with high CPS traffics on active
|
CSCvh63896
|
ASA/FTD traceback in threadname CP Processing
|
CSCvh67237
|
Policy deployment failing due to incomplete copying of deployment package
|
CSCvh67930
|
Management Center doesn't allow site to site tunnel with both IPv4 and IPv6
protected networks
|
CSCvh68253
|
Creation of two S2S VPN topologies with the same endpoints (nodes) leads to
unpredictable results
|
CSCvh68311
|
Cisco Firepower System Software Cross-Origin Domain Protection Vulnerability
|
CSCvh68521
|
On 8000 series stack, with "Maint on sec fail" setting enabled, stack
health is in compromised state
|
CSCvh70474
|
SFDataCorrelator/SFDCNotificationd connection log spam after expiring many
hosts
|
CSCvh73463
|
Documentation and logs specify Firepower remote storage via SSH uses SCP, when it
actually uses SFTP
|
CSCvh77456
|
Cisco Firepower Threat Defense Software FTP Inspection Denial of Service
Vulnerability
|
CSCvh77845
|
SSL errors on session resume when server IP address changes
|
CSCvh78133
|
Firepower 2100 process_stderr.log getting flooded with errors causing /ngfw high
disk
|
CSCvh79172
|
Phase-1 solution for momentary traffic drop during ASA policy apply rollback
tracked w/ CSCvc56570
|
CSCvh83145
|
ASA interface IP and subnet mask changes to 0.0.0.0 0.0.0.0 causing outage of
services on interface
|
CSCvh84511
|
Cisco FireSIGHT System URL-based Access Control Policy Bypass Vulnerability
|
CSCvh85246
|
ssl inspection can be limited by a "do not decrypt" rule specifying one
or more common names
|
CSCvh85580
|
ids_event_alerter core when processing connection events
|
CSCvh89340
|
Cisco Firepower Threat Defense SSL Engine High CPU Denial Of Service
Vulnerability
|
CSCvh90092
|
AQ task selection ignores few groups when large no of groups present causing 8 hr
delays in deploy
|
CSCvh92840
|
Failing to deploy after adding a URL literal from REST API
|
CSCvh95396
|
Policy deployment failure due to Invalid preprocessor normalize_tcp option
'ftp'
|
CSCvh95456
|
Cisco Adaptive Security Appliance Application Layer Protocol Inspection DoS
Vulnerabilities
|
CSCvh95807
|
SSL FLow Errors reported when accessing ECDSA signed websites
|
CSCvh95960
|
Using the "match" keyword in capture command causes IPv6 traffic to be
ignored in capture
|
CSCvh97258
|
unable to render any of monitoring screens in any browser
|
CSCvh97594
|
ssl inspection cache can become unbalanced, leading to premature removal of
recently used items
|
CSCvh97782
|
KP traceback illegal memory access inside a vendor Modular Exponentiation
implementation
|
CSCvh98781
|
ASA/FTD Deployment ERROR 'Management interface is not allowed as Data is in
use by this instance'
|
CSCvh98897
|
Data interfaces on Firepower devices shut down on upgrade failure, causing
management interruptions
|
CSCvi02989
|
Access control policy not able to be edited or deployed after upgrade to Version
6.2.2.1
|
CSCvi09340
|
Policy deployment failed on multiple devices because of large size of policy
deployment DB
|
CSCvi31174
|
FTD:Deployment takes lot of time when node in cluster is down/unreachable from
FMC
|
CSCvi39938
|
Traffic outage while downloading large number of users and groups
|
CSCvi43661
|
Static Route:Proper Interface is not being assigned while configuring the route,
causing problem.
|
CSCvi44246
|
Port-channel's subinterfaces share same MAC address on both unit of Threat
Defense pair
|
CSCvi44365
|
After an upgrade the Firepower 4100 hostname is different than SFCLI hostname
|
CSCvi54162
|
"ha-replace" action not working when peer not present
|
CSCvi58729
|
6.2.3 Upgrade Resume Fails on KP-Onbox at
200_pre/600_ftd_onbox_data_export.sh
|
CSCvi59968
|
Firepower 2100 Incorrect reply for SNMP get request 1.3.6.1.2.1.1.2.0
|
CSCvi74560
|
6.2.3 does not properly deploy variables in variable sets and causes deploy
failure
|
CSCvi74623
|
6.2.3 upgrade resets home_net variable to default "any"
|
CSCvi77527
|
upgrade to 6.2.3 fails with post install database integrity check error
|
CSCvi79043
|
Add warning to configure manager delete/add command
|
CSCvi80012
|
CD state incorrect if failover happens during snort policy application on Active
FTD
|
CSCvi80849
|
Cisco Firepower 2100 Series POODLE TLS security scanner alerts
|
CSCvj00363
|
ASA may traceback and reload with combination of packet-tracer and captures
|
CSCvj05640
|
Traceback at snmp address not mapped when snmp-server not enabled
|
CSCvj13327
|
Upgrade to 6.2.3 fails at 600_schema/100_update_database.sh - oom killer
invoked
|
CSCvj18111
|
FTD: Flow-preserve N1 flag shouldn't apply for IPS interfaces
|
CSCvj42450
|
ASA traceback in Thread Name: DATAPATH-14-17303
|
CSCvj47119
|
"clear capture /all" might crash
|
CSCvj50373
|
Doc: Table 1 has incorrect information on Configuration Guide Version 6.2.3
|
CSCvj58342
|
Multicast dropped after deleting a security context
|
CSCvj62504
|
Cisco Firepower 2100 Series Security Appliances Denial of Service
Vulnerability
|
CSCvj65581
|
Excessive logging from ftdrpcd process on 2100 series appliances
|
CSCvj72309
|
FTD does not send Marker for End-of-RIB after a BGP Graceful Restart
|
CSCvj74210
|
Traceback at "ssh" when executing 'show service-policy inspect gtp
pdp-context detail'
|
CSCvj82652
|
Deployment changes are not pushed to the device due to disk0 mounted on
read-only
|
CSCvj85516
|
Packet capture fails for interface named "management" on Firepower
Threat Defense
|
CSCvj89470
|
Cisco Adaptive Security Appliance Direct Memory Access Denial of Service
Vulnerability
|
CSCvj98499
|
Linux Kernel cdrom_ioctl_media_changed Function Kernel Memory Read Vul
|
CSCvj98512
|
Doc: Procedure of changing FTD management IP address should be corrected.
|
CSCvj99658
|
ASA/Lina HA failover interface testing rendering control channel unresponsive
|
CSCvk02250
|
"show memory binsize" and "show memory top-usage" do not show
correct information (Complete fix)
|
CSCvk04592
|
Flows get stuck in lina conn table in half-closed state
|
CSCvk07522
|
webvpn: Bookmark fails to render on Firefox and Chrome. IE fine.
|
CSCvk18330
|
Active FTP Data transfers fail with FTP inspection and NAT
|
CSCvk18578
|
Enabling compression necessary to load ASA SSLVPN login page customization
|
CSCvk20381
|
Traceback loop seen on fresh ASAv Azure, KVM and VMWare deployments
|
CSCvk25729
|
Large ACL taking long time to compile on boot causing outage
|
CSCvk30228
|
ASAv and FTDv deployment fails in Microsoft Azure and/or slow console
response
|
CSCvk31035
|
KVM (FTD): Mapping web server through outside not working consistent with other
platforms
|
CSCvk44166
|
Cisco ASA and FTD TCP Proxy Denial of Service Vulnerability
|
CSCvk45443
|
ASA cluster: Traffic loop on CCL with NAT and high traffic
|
CSCvk47253
|
Flow offload for UDP/TCP traffic is not working
|
CSCvk50732
|
AnyConnect 4.6 Web-deploy fails on MAC using Safari 11.1.x browsers
|
CSCvk51181
|
FTD IPV6 traffic outage after interface edit and deployment part 1/2
|
CSCvk57516
|
Low DMA memory leading to VPN failures due to incorrect crypto maps
|
CSCvk66732
|
Cisco Adaptive Security Appliance Software IPsec Denial of Service
Vulnerability
|
CSCvk67239
|
FTD or ASA traceback and reload in "Thread Name: Logger Page fault: Address
not mapped"
|
CSCvm06114
|
RDP bookmark plugin won't launch
|
CSCvm23370
|
ASA: Memory leak due to PC cssls_get_crypto_ctxt
|
CSCvm27111
|
FTD Lina traceback while removing OSPF configuration.
|
CSCvm31905
|
OpenSSH Bailout Delaying User Enumeration Vulnerability
|
CSCvm32267
|
Not blocking EICAR files through HTTPS connection with SSL policy in place
|
CSCvm53531
|
Cisco Adaptive Security Appliance Software Privilege Escalation Vulnerability
|
CSCvm64400
|
IKEv2: IKEv2-PROTO-2: Failed to allocate PSH from platform
|
CSCvm70274
|
tcp proxy: ASA traceback on DATAPATH
|
CSCvm72145
|
Cisco ASA Software and FTD Software MOBIKE Denial of Service Vulnerability
|
CSCvm80011
|
FTD Cluster in transparent mode; Inline set: FTP/SCP flows get stalled and never
recover.
|
CSCvm86658
|
FTD traceback and reload in snap_get_retaddr_mips at snap.h:285
|
CSCvm91893
|
FMC does not update time and display events when using sliding time window option
for event analysis
|
CSCvn09322
|
FTD device rebooted after taking Active State for less than 5 minutes
|
CSCvn09612
|
ASA/FTD Connection Idle Timers Not Increasing For Inactive Offloaded Sessions
|
CSCvn09640
|
FTD: Need ability to trust ethertype ACLs from the parser. Need to allow BPDU to
pass through
|
CSCvn23254
|
SNMPv2 pulls empty ifHCInOctets value if Nameif is configured on the
interface
|
CSCvn31390
|
Computing Processor PortSmash Side-Channel Information Disclosure Vuln
|
CSCvn33943
|
Standby node traceback in wccp_int_statechange() with HA configuration sync
|
CSCvn46358
|
overloading of the lina msglyr infra due to the sending of VPN status
messages
|
CSCvn55563
|
Port group objects not listed while creating extended access list ( FMC GUI )
|
CSCvn56095
|
selective acking not happening with SSL crypto hardware offload
|
CSCvn69213
|
ASA traceback and reload due to multiple threads waiting for the same lock -
watchdog
|
CSCvn69270
|
Add troubleshooting for VPN Client Assignment
|
CSCvn75368
|
IPsec VPN goes down intermittently during a re-key
|
CSCvn76023
|
Firepower:when deplopy policy, device list is empty with error message
"failed to fetch device list"
|
CSCvn78174
|
Cisco ASA and Cisco FTD Software TCP Timer Handling Denial of Service
Vulnerability
|
CSCvn78593
|
Control-plane ACL doesn't work correctly on FTD
|
CSCvn86777
|
Deployment on FTD with low memory results on interface nameif to be removed -
finetune mmap thresh
|
CSCvo11077
|
Cisco ASA Software and FTD Software IKEv1 Denial of Service Vulnerability
|
CSCvo12985
|
ASA: EIGRP neighborship formation delayed after failover due to delay in sending
out Hello packet
|
CSCvo39356
|
Traceback at Thread Name: IP Address Assign
|
CSCvo41572
|
FMC shows connection events with packet count as 0
|
CSCvo43679
|
FTD Lina traceback, due to packet looping in the system by normaliser
|
CSCvo47562
|
VPN sessions failing due to PKI handles not freed during rekeys
|
CSCvo48838
|
Lina does not properly report the error for configuration line that is too
long
|
CSCvo56675
|
ASA or FTD traceback and reload due to failover state change or xlates
cleared
|
CSCvo58847
|
Enhancement to address high IKE CPU seen due to tunnel replace scenario
|
CSCvo62031
|
ASA Traceback and reload while running IKE Debug
|
CSCvo68184
|
management-only of diagnostic I/F on secondary FTD get disappeared
|
CSCvo72462
|
Do not decrypt rule causes traffic interruptions.
|
CSCvo88762
|
FTD inline/transparent sends packets back through the ingress interface
|
CSCvo90998
|
LACPDUs should not be sent to snort for inline-set interfaces
|
CSCvp16536
|
ASA traceback and reload observed in Datapath due to SIP inspection.
|
CSCvp18878
|
ASA: Watchdog traceback in Datapath
|
CSCvp19549
|
FTD lina cored with Thread name: cli_xml_server
|
CSCvp24728
|
Random SGT tags added by FTD
|
CSCvp25236
|
FTD Lina traceback -Thread Name: cli_xml_server
|
CSCvp30505
|
FDM Error: There were some connectivity problems while loading archived
backups.
|
CSCvp36425
|
Cisco ASA & FTD Software Cryptographic TLS and SSL Driver Denial of Service
Vulnerability
|
CSCvp43150
|
FP9300 Cluster - Master unit does not update all the route changes to slaves
|
CSCvp45149
|
Traceback while Reverting the primary system as active
|
CSCvp47525
|
Upgrade times out after 1 hour for slow FMC-to-sensor bandwidth
|
CSCvp49576
|
FTD traceback due to watchdog on xlate_detach
|
CSCvp53637
|
Flows are getting offloaded on inline-sets
|
CSCvp55880
|
Fail-Closed FTD passes packets through on Snort processes down
|
CSCvp55901
|
LINA traceback on ASA in HA Active Unit repeatedly
|
CSCvp57643
|
FP9300 Cluster - Master unit does not update all the route changes to slaves
|
CSCvp67392
|
ASA/FTD HA Data Interface Heartbeat dropped due to Reverse Path Check
|
CSCvp70699
|
ASA Failover split brain (both units active) after rebooting a Firepower
chassis
|
CSCvp81083
|
ASA/Lina Traceback related to TLS/VPN
|
CSCvq27010
|
Memory leak observed when ASA-SFR dataplane communication flaps
|
CSCvq44665
|
FTD/ASA : Traceback in Datapath with assert snp_tcp_intercept_assert_disabled
|
CSCvq54034
|
WRL6 and WRL8 commit-id update in CCM Layer (sprint 65)
|
CSCvq70775
|
FPR2100 FTD Standby unit leaking 9K blocks
|
CSCvq75634
|
Management interface configuration leads to immediate traceback and reload
|
CSCvq79042
|
FQDN ACL entries incomplete due to DNS response from server is large and
truncated
|
CSCvq80735
|
Cannot add neighbor in BGP when the neighbor is on the same subnet as one
interface
|
CSCvq93640
|
WRL6 and WRL8 commit id update in CCM layer (sprint 67)
|
CSCvr21803
|
Mac address flap on switch with wrong packet injected on ingress FTD
interface
|
CSCvr23986
|
Cisco ASA & FTD devices may reload under conditions of low memory and
frequent complete MIB walks
|
CSCvr25954
|
FTD/LINA Standby may traceback and reload during logging command replication from
Active
|
CSCvr27445
|
App-sync failure if unit tries to join HA during policy deployment
|
CSCvr68146
|
Unable to auto-rejoin FTD cluster
|
CSCvs01422
|
Lina traceback when changing device mode of FTD
|
CSCvs03023
|
Clustering module needs to skip the hardware clock update to avoid the timeout
error and clock jump
|
CSCvs26402
|
NAT policy configuration range limit to be imposed for non service cmds as
well
|
CSCvs59056
|
ASA/FTD Tunneled Static Routes are Ignored by Suboptimal Lookup if Float-Conn is
Enabled
|
CSCvs80536
|
FP41xx incorrect interface applied in ASA capture
|
CSCvs81504
|
WR6 and WR8 commit id update in CCM layer(sprint 77)
|
CSCvt06606
|
Flow offload not working with combination of FTD 6.2(3.10) and FXOS
2.6(1.169)
|
CSCvt28182
|
sctp-state-bypass is not getting invoked for inline FTD
|