<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure FTD - Patching Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/azure-ftd-patching-issue/m-p/4145909#M1073563</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;we applied the FTD update version 6.4.0.10-2 to patch the recent Cisco vulnerability and after it was done, I went back into the updates just to verify they were all applied.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;To our surprise, both FTD appliances, are still on version 6.4.0.9-62 even though when we applied .10-2 it shows it applied them correctly and it rebooted the appliance.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I even went ahead and tried to apply it a second time to the Azure FTD, it seemed to be successful but it did not apply it.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;If we go back into the Updates and select Install for that patch, the 2 appliances still show as unpatched.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I even SSH into the Azure FTD to confirm and it shows the previous version .9-62 as well.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Currently ALL our sensors and FTDs are in version 6.4.0.9-62 but the FTDs are missing the security patch.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;We do not see any pre-requisite patch to apply and it is not complaining about missing anything during the install. Any assistance would be greatly appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 03 Sep 2020 16:39:35 GMT</pubDate>
    <dc:creator>Quintin.Mayo</dc:creator>
    <dc:date>2020-09-03T16:39:35Z</dc:date>
    <item>
      <title>Azure FTD - Patching Issue</title>
      <link>https://community.cisco.com/t5/network-security/azure-ftd-patching-issue/m-p/4145909#M1073563</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;we applied the FTD update version 6.4.0.10-2 to patch the recent Cisco vulnerability and after it was done, I went back into the updates just to verify they were all applied.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;To our surprise, both FTD appliances, are still on version 6.4.0.9-62 even though when we applied .10-2 it shows it applied them correctly and it rebooted the appliance.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I even went ahead and tried to apply it a second time to the Azure FTD, it seemed to be successful but it did not apply it.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;If we go back into the Updates and select Install for that patch, the 2 appliances still show as unpatched.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I even SSH into the Azure FTD to confirm and it shows the previous version .9-62 as well.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Currently ALL our sensors and FTDs are in version 6.4.0.9-62 but the FTDs are missing the security patch.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;We do not see any pre-requisite patch to apply and it is not complaining about missing anything during the install. Any assistance would be greatly appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 16:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ftd-patching-issue/m-p/4145909#M1073563</guid>
      <dc:creator>Quintin.Mayo</dc:creator>
      <dc:date>2020-09-03T16:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Azure FTD - Patching Issue</title>
      <link>https://community.cisco.com/t5/network-security/azure-ftd-patching-issue/m-p/4154640#M1074049</link>
      <description>&lt;P&gt;I asked Cisco TAC this question re no indication of hotfix being applied, bith FMC &amp;amp; CLi "sho version" show 6.4.0.9 as the current version AFTER the hotfix is applied.&lt;/P&gt;&lt;P&gt;According to Cisco this is the correct behaviour !&amp;nbsp; Weird, as the hot fix has a version number.&amp;nbsp; Their advice is to do the following to check status.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Another way to check if hotfix is applied is from FTD CLI.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Log in to FTD cli , then gain root access by typing “sudo su”.&lt;/LI&gt;&lt;LI&gt;Navigate to the directory /ngfw/var/log/sf&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;cd /var/log/sf&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Navigate to the hotfix directory and check the status.log file.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In below example, I’m checking the status.log file of patch 6.4.0.9, you can check the hotfix 6.4.0.10-2 directory via same procedure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@firepower:/opt/cisco/csp/applications# cd /ngfw/var/log/sf/&lt;/P&gt;&lt;P&gt;root@firepower:/ngfw/var/log/sf# ls -la&lt;/P&gt;&lt;P&gt;total 260&lt;/P&gt;&lt;P&gt;drwxr-xr-x&amp;nbsp; 4 root root&amp;nbsp; 4096 Sep 20 04:02 .&lt;/P&gt;&lt;P&gt;drwxr-xr-x 13 root root&amp;nbsp; 8192 Sep 21 04:02 ..&lt;/P&gt;&lt;P&gt;drwxr-xr-x 12 root root&amp;nbsp; 4096 Jul&amp;nbsp; 9 16:39 &lt;STRONG&gt;Cisco_FTD_SSP_Patch-6.4.0.9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 www&amp;nbsp; www&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 46 Jul&amp;nbsp; 9 16:39 SW_update_info.txt&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root 17520 Sep 21 14:09 data_service.log&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root&amp;nbsp; 5761 Sep 20 03:33 data_service.log.1.gz&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root&amp;nbsp; 7744 Sep 14 03:41 data_service.log.2.gz&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root&amp;nbsp; 5990 Sep&amp;nbsp; 6 03:41 data_service.log.3.gz&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root&amp;nbsp; 7539 Aug 31 03:49 data_service.log.4.gz&lt;/P&gt;&lt;P&gt;-rw-r--r--&amp;nbsp; 1 root root&amp;nbsp;&amp;nbsp; 508 Jul&amp;nbsp; 9 16:37 db_manage.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@firepower:/ngfw/var/log/sf# cd Cisco_FTD_SSP_Patch-6.4.0.9/&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:root@firepower:/ngfw/var/log/sf/Cisco_FTD_SSP_Patch-6.4.0.9" target="_blank" rel="noopener"&gt;root@firepower:/ngfw/var/log/sf/Cisco_FTD_SSP_Patch-6.4.0.9#&lt;/A&gt; cat status.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from status.log file, you can confirm if the hotfix is applied."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 12:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/azure-ftd-patching-issue/m-p/4154640#M1074049</guid>
      <dc:creator>ida71</dc:creator>
      <dc:date>2020-09-21T12:51:54Z</dc:date>
    </item>
  </channel>
</rss>

