Cisco Cisco Firepower Management Center 2000

Seite von 44
   
Firepower System Release Notes
Resolved Issues
 
23
Step 9
click Install. Confirm that you want to install the update and reboot the devices.
Step 10
The update process begins. You can monitor the update’s progress on the Tasks tab of the Message 
Center.
Note: 
Devices may reboot twice during the update; this is expected behavior.
Caution: 
If you encounter issues with the update (if messages in the Tasks tab of the Message Center show 
no progress for several minutes or indicate that the update has failed), do not restart the update. Instead, 
contact Support.
Step 11
Select Devices > Device Management and confirm that the devices you updated have the correct 
software version: 6.0.1.1213. 
Step 12
Verify that the appliances in your deployment are successfully communicating and that there are no 
issues reported by the health monitor.
Step 13
Redeploy policies to all managed devices.
Click the Deploy button and select all available devices, then click Deploy.
Resolved Issues
You can view defects resolved in this release using the Cisco Bug Search Tool 
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required.
The following issues are resolved in Version 6.0.1:
Security Issue
 Addressed multiple vulnerability issues that generated denial of service in NTP, and other third 
parties as described in CVE-2015-7704, CVE-2015-7705, CVE-2015-7853, and CVE-2015-7855.(
Security Issue
 Addressed multiple arbitrary script injection vulnerabilities allowing unauthenticated, remote 
attackers to exploit or overwrite functionality as described in CVE-2015-7703.
Security Issue 
Addressed a vulnerability in the third party product NTP as described in CVE-2015-7852.
Security Issue
 Addressed an arbitrary HTTP header injection vulnerability allowing unauthenticated, remote 
attackers to exploit managed devices as described in CVE-2016-134.
Resolved an issue where, if you configured Open Shortest Path First (OSPF) in the Dynamic Routing tab of the 
Virtutal router page (Devices > Devices Management > Virtual routers > Dynamic Routing) and added an 
Area, then changed the value of the Cost column and deployed changes, the system did not update the OSPF. 
(CSCus31735)
Improved the stability of Snort functionality. (CSCut75876)
Resolved an issue where you could not manually set the time zone on an ASA Firepower module managed by 
ASDM. (CSCuu70250)
Resolved an issue where, if you attempted to update the system with less than the required amount of free 
space, the update failed and the system incorrectly appeared to have a negative amount of space available. 
(CSCuv43019)
Resolved an issue where, in some cases, registered devices generated extraneous logs and the system 
experienced issues. (CSCuw84304)
Resolved an issue where, if you registered an ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, ASA 
5555-X, ASA 5585-X-SSP-10, ASA 5585-X-SSP-20, ASA 5585-X-SSP-40, or ASA 5585-X-SSP-60 device 
running Firepower services to a Firepower Management Center and enabled Clientless VPN tunnel group
then deployed an access control policy with the default action set to Allow all traffic, the system incorrectly 
dropped packets. (CSCuw38561)
Improved inspection of encrypted FTP traffic using recently updated FTP standards. (CSCux02171)