Cisco Cisco Firepower Management Center 2000
Firepower System Release Notes
Resolved Issues
23
Step 9
click Install. Confirm that you want to install the update and reboot the devices.
Step 10
The update process begins. You can monitor the update’s progress on the Tasks tab of the Message
Center.
Center.
Note:
Devices may reboot twice during the update; this is expected behavior.
Caution:
If you encounter issues with the update (if messages in the Tasks tab of the Message Center show
no progress for several minutes or indicate that the update has failed), do not restart the update. Instead,
contact Support.
contact Support.
Step 11
Select Devices > Device Management and confirm that the devices you updated have the correct
software version: 6.0.1.1213.
software version: 6.0.1.1213.
Step 12
Verify that the appliances in your deployment are successfully communicating and that there are no
issues reported by the health monitor.
issues reported by the health monitor.
Step 13
Redeploy policies to all managed devices.
Click the Deploy button and select all available devices, then click Deploy.
Resolved Issues
You can view defects resolved in this release using the Cisco Bug Search Tool
(
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required.
The following issues are resolved in Version 6.0.1:
Security Issue
Addressed multiple vulnerability issues that generated denial of service in NTP, and other third
parties as described in CVE-2015-7704, CVE-2015-7705, CVE-2015-7853, and CVE-2015-7855.(
Security Issue
Addressed multiple arbitrary script injection vulnerabilities allowing unauthenticated, remote
attackers to exploit or overwrite functionality as described in CVE-2015-7703.
Security Issue
Addressed a vulnerability in the third party product NTP as described in CVE-2015-7852.
Security Issue
Addressed an arbitrary HTTP header injection vulnerability allowing unauthenticated, remote
attackers to exploit managed devices as described in CVE-2016-134.
Resolved an issue where, if you configured Open Shortest Path First (OSPF) in the Dynamic Routing tab of the
Virtutal router page (Devices > Devices Management > Virtual routers > Dynamic Routing) and added an
Area, then changed the value of the Cost column and deployed changes, the system did not update the OSPF.
(CSCus31735)
Virtutal router page (Devices > Devices Management > Virtual routers > Dynamic Routing) and added an
Area, then changed the value of the Cost column and deployed changes, the system did not update the OSPF.
(CSCus31735)
Improved the stability of Snort functionality. (CSCut75876)
Resolved an issue where you could not manually set the time zone on an ASA Firepower module managed by
ASDM. (CSCuu70250)
ASDM. (CSCuu70250)
Resolved an issue where, if you attempted to update the system with less than the required amount of free
space, the update failed and the system incorrectly appeared to have a negative amount of space available.
(CSCuv43019)
space, the update failed and the system incorrectly appeared to have a negative amount of space available.
(CSCuv43019)
Resolved an issue where, in some cases, registered devices generated extraneous logs and the system
experienced issues. (CSCuw84304)
experienced issues. (CSCuw84304)
Resolved an issue where, if you registered an ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, ASA
5555-X, ASA 5585-X-SSP-10, ASA 5585-X-SSP-20, ASA 5585-X-SSP-40, or ASA 5585-X-SSP-60 device
running Firepower services to a Firepower Management Center and enabled Clientless VPN tunnel group,
then deployed an access control policy with the default action set to Allow all traffic, the system incorrectly
dropped packets. (CSCuw38561)
5555-X, ASA 5585-X-SSP-10, ASA 5585-X-SSP-20, ASA 5585-X-SSP-40, or ASA 5585-X-SSP-60 device
running Firepower services to a Firepower Management Center and enabled Clientless VPN tunnel group,
then deployed an access control policy with the default action set to Allow all traffic, the system incorrectly
dropped packets. (CSCuw38561)
Improved inspection of encrypted FTP traffic using recently updated FTP standards. (CSCux02171)