Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 45
Version 5.2.0.6
Sourcefire 3D System Release Notes
20
Issues Resolved in Version 5.2.0.6
4. Select System > Updates.
The Product Updates tab appears.
5. Click the install icon next to the uninstaller that matches the update you want 
to remove.
The Install Update page appears. 
6. Select the Defense Center and click Install, then confirm that you want to 
uninstall the update and reboot the device.
The uninstallation process begins. You can monitor the uninstallation 
progress in the task queue (System > Monitoring > Task Status).
WARNING!
Do not use the web interface to perform any other tasks until 
the uninstallation has completed and the Defense Center reboots. Before the 
uninstallation completes, the web interface may become unavailable and the 
Defense Center may log you out. This is expected behavior; log in again to 
view the task queue. If the uninstallation is still running, do not use the web 
interface until the uninstallation has completed. If you encounter issues with 
the uninstallation (for example, if the task queue indicates that the update has 
failed or if a manual refresh of the task queue shows no progress for several 
minutes), do not restart the uninstallation. Instead, contact Support.
7. After the uninstallation finishes, clear your browser cache and force a reload 
of the browser. Otherwise, the user interface may exhibit unexpected 
behavior.
8. Log in to the Defense Center.
9. Select Help > About and confirm that the software version is listed correctly: 
Version 5.2.0.5.
10. Verify that the appliances in your deployment are successfully communicating 
and that there are no issues reported by the health monitor.
Issues Resolved in Version 5.2.0.6
The following issues are resolved in Version 5.2.0.6:
Security Issue 
Addressed multiple cross-site scripting (XSS) vulnerabilities.
Security Issue
 Addressed multiple cross-site request forgery (CSRF) 
vulnerabilities.
Security Issue
 Addressed multiple injection vulnerabilities, including HTML 
and command line injections.