<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell' in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520519#M1085851</link>
    <description>&lt;P&gt;As I understand the vulnerability it requires the device to be accessed via an open interface to exploit it. So as long as your FTD isn't set to allow management via the outside interface (which is generally not recommended) then the vulnerability is only exposed via the management interface which is almost always on an internal protected network.&lt;/P&gt;
&lt;P&gt;By the way Cisco has updated the security advisory and is now projecting a hotfix for FDM-managed FTD devices to be released next week as follows:&lt;/P&gt;
&lt;TABLE style="border: inset 1px black; padding=3px; empty-cells: show;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;Cisco Firepower Threat Defense (FTD) managed by Firepower Device Manager (FDM)&lt;/TD&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwa46963" target="_blank"&gt;CSCwa46963&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;6.2.3 hotfix (23 Dec 2021)&lt;BR /&gt;6.4.0 hotfix (23 Dec 2021)&lt;BR /&gt;6.6.5 hotfix (23 Dec 2021)&lt;BR /&gt;7.0.1 hotfix (23 Dec 2021)&lt;BR /&gt;7.1.0 hotfix (23 Dec 2021)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Dec 2021 12:38:45 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-12-17T12:38:45Z</dc:date>
    <item>
      <title>FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4518833#M1085797</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have anyone known about Log4JShell exploit?&lt;/P&gt;&lt;P&gt;This exploit got effected the devices tomcat based as far as I know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our company has 3 FTDs and 1 ASA, and just knew that FTD 6.2.3 os is vulnerable.&lt;/P&gt;&lt;P&gt;We are trying to upgrade the version as soon as we can, but not sure which version is reliable for this exploit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone tell me about this?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 17:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4518833#M1085797</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-12-14T17:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4518866#M1085802</link>
      <description>&lt;P&gt;FTD managed by FMC is not vulnerable.&lt;/P&gt;
&lt;P&gt;FTD managed by FDM or CDO is vulnerable and there is no patch as of the time of this posting.&lt;/P&gt;
&lt;P&gt;The vulnerabilities are tracked in this document which is currently being updated multiple times per day with new information about products confirmed vulnerable or not, the BugID in the former case and - where a patch or pending patch release is identified - the version with the patch.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 18:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4518866#M1085802</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-14T18:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519236#M1085815</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;Random question but is there a way to turn log4j off, disable the expoited mechanism, or indeed do anything other than wait for your FTD firewalls to get expoited in the meantime?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Oscar&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 10:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519236#M1085815</guid>
      <dc:creator>OscarS</dc:creator>
      <dc:date>2021-12-15T10:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519348#M1085818</link>
      <description>&lt;P&gt;Hello OscarS,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to share this cause we have same concerns. Please see the released article below.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-log4j-2-16-0-released/" target="_blank" rel="noopener"&gt;https://www.zdnet.com/article/second-log4j-vulnerability-found-apache-log4j-2-16-0-released/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our security engineer considered that released Apache version 2.16.0 and sooner will patch for Unifi controller. For the Cisco FTD / ASA deployement, we will wait a little more.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope sooner Cisco release the upgraded ios. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 14:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519348#M1085818</guid>
      <dc:creator>eeebbunee</dc:creator>
      <dc:date>2021-12-15T14:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519830#M1085827</link>
      <description>&lt;P&gt;Is your FTD firewall FDM-managed? If so, the patch is not yet released (as of 16 December 2021).&lt;/P&gt;
&lt;P&gt;If they are FMC-managed (as most are) then they are not vulnerable.&lt;/P&gt;
&lt;P&gt;For traffic transiting the firewalls, Cisco released rule updates almost immediately to detect and block attempts to exploit the vulnerability. See this detailed writeup for how to leverage that protection even more:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blogs.cisco.com/security/protecting-against-log4j-with-secure-firewall-secure-ips" target="_blank"&gt;https://blogs.cisco.com/security/protecting-against-log4j-with-secure-firewall-secure-ips&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 11:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4519830#M1085827</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-16T11:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520317#M1085837</link>
      <description>&lt;P&gt;So are we saying that we believe FDM managed firewalls can be compromised over their Internet facing port using this vulnerability and there is no work around?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 01:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520317#M1085837</guid>
      <dc:creator>alexbaldwin</dc:creator>
      <dc:date>2021-12-17T01:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520519#M1085851</link>
      <description>&lt;P&gt;As I understand the vulnerability it requires the device to be accessed via an open interface to exploit it. So as long as your FTD isn't set to allow management via the outside interface (which is generally not recommended) then the vulnerability is only exposed via the management interface which is almost always on an internal protected network.&lt;/P&gt;
&lt;P&gt;By the way Cisco has updated the security advisory and is now projecting a hotfix for FDM-managed FTD devices to be released next week as follows:&lt;/P&gt;
&lt;TABLE style="border: inset 1px black; padding=3px; empty-cells: show;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;Cisco Firepower Threat Defense (FTD) managed by Firepower Device Manager (FDM)&lt;/TD&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCwa46963" target="_blank"&gt;CSCwa46963&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="border: inset 1px black; padding-left: 3px; padding-right: 3px;"&gt;6.2.3 hotfix (23 Dec 2021)&lt;BR /&gt;6.4.0 hotfix (23 Dec 2021)&lt;BR /&gt;6.6.5 hotfix (23 Dec 2021)&lt;BR /&gt;7.0.1 hotfix (23 Dec 2021)&lt;BR /&gt;7.1.0 hotfix (23 Dec 2021)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 12:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520519#M1085851</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-17T12:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520756#M1085870</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply, that is helpful and reasonable.&amp;nbsp; I've tried feeding this answer to Cisco TAC for confirmation but they haven't been willing to state that the box cannot be compromised using the public facing interface.&amp;nbsp; &amp;nbsp;Do you mind me asking what evidence you have seen that the box is not vulnerable on the public side, assuming it is not managed via the public interface?&amp;nbsp; &amp;nbsp; I'm trying to put minds at ease, but Cisco isn't helping me much here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 20:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520756#M1085870</guid>
      <dc:creator>alexbaldwin</dc:creator>
      <dc:date>2021-12-17T20:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520836#M1085873</link>
      <description>&lt;P&gt;Caveat - I'm not a pen tester or a developer but am reasonable experienced with managing Cisco firewalls and other security products. So the following is my personal understanding...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CISA guidance is found here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" target="_blank"&gt;https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It states in part:&lt;/P&gt;
&lt;P&gt;"&lt;STRONG&gt;Immediate Actions to Protect Against Log4j Exploitation&lt;/STRONG&gt;&lt;BR /&gt;• &lt;FONT color="#FF0000"&gt;&lt;U&gt;Discover all internet facing assets that allow data inputs&lt;/U&gt; &lt;/FONT&gt;and use Log4j Java library anywhere in the stack.&lt;BR /&gt;• Discover all assets that use the Log4j library.&lt;BR /&gt;• Update or isolate affected assets. Assume compromise, identify common post-exploit sources and activity, and hunt for signs of malicious activity.&lt;BR /&gt;• Monitor for odd traffic patterns (e.g., JDNI LDAP/RMI outbound traffic, DMZ systems initiating outbound connections)."&lt;/P&gt;
&lt;P&gt;(my emphasis added)&lt;/P&gt;
&lt;P&gt;We check for an ASA or FTD device's listening ports with "show asp table socket". If it reports no listening ports then it is generally safe to assume that data input is not accepted via any of the data plane (i.e. non-management) interfaces.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Dec 2021 01:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4520836#M1085873</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-18T01:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521266#M1085899</link>
      <description>&lt;P&gt;Thanks that sounds right and shows a good answer (no ports).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While I was writing this, I noticed what I think is an update because I didn't see this before in the bug confirming your understanding too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa46963" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa46963&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Only the FTD-API associated with Firepower Device Manager is vulnerable. This is exposed by default on the management interface and the inside data interface (typically port 2) on devices in the on-device manager mode. This API interface can be disabled by configuration from data-plane interfaces. VPN and other features outside of Firepower Device Manager are not vulnerable. Firepower Management Center managed FTD devices are not vulnerable. &lt;/SPAN&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;SPAN&gt; Access Control can be added to both the management and data-plane interfaces to limit who can call this FTD-API interface removing the risk from external actors. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Dec 2021 22:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521266#M1085899</guid>
      <dc:creator>alexbaldwin</dc:creator>
      <dc:date>2021-12-19T22:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521314#M1085904</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/858412"&gt;@alexbaldwin&lt;/a&gt; thanks for highlighting the updated BugID. That officially confirms what I had surmised with the added bit that the VPN service is not vulnerable. Those bits should help alleviate a lot of concern while we wait for a more comprehensive fix via a patch.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 01:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521314#M1085904</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T01:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521639#M1085933</link>
      <description>&lt;P&gt;Normally mgmt interface should be accessing internet to get smartnet license syncing !! please correct me if im wrong!&lt;/P&gt;&lt;P&gt;also im be able to access my FTDASA device remotely but over our secured vpn connection only !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so whats my status now ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW&amp;nbsp; im running 2 ftd device managed by fdm :&lt;/P&gt;&lt;P&gt;Cisco ASA5516-X Threat Defense (75) Version 6.2.2 (Build 81)&lt;BR /&gt;Cisco ASA5516-X Threat Defense (75) Version 6.6.1 (Build 91)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;please need support to work around and keed my NW safe ? what can i do t?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 15:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521639#M1085933</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2021-12-20T15:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521651#M1085934</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; the management interface does access the Internet for Smart license sync, SI updates etc. However it should not be open to incoming traffic initiated from the Internet. That's the primary vector of concern.&lt;/P&gt;
&lt;P&gt;The secondary and less concerning vector is from any compromised internal hosts or malicious insiders. You can either accept that risk or implement access control for your management interface while awaiting the pending patch for FTD.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 15:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521651#M1085934</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T15:21:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521660#M1085935</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the management interface does access the Internet for Smart license sync, SI updates etc. However it should not be open to incoming traffic initiated from the Internet. That's the primary vector of concern.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;May i asked you how to make sure that incoming traffic from internet to mgmt ifc is disabled or block ? how to block incoming and from understanding you keep outgoing traffic for smartnet license and updates!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and as i said i do remote access on ASA using mgmt ifc via company vpn connection! is that consider as incoming traffic to mgmt ifc ?!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2nd thing what shall i do now till patch is released as i can see they released already hotfix&amp;nbsp;&lt;SPAN class=""&gt;6.4.0 hotfix (Available) ? how to upload this patch on ASA device? or still not hotfix available till now?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;also from inside , i dont have any local asset connect to internet that using apache except&amp;nbsp;ASA DEVICES!? SO IS THAT FINE ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;last this i run this command as per ur recommendations with no result shown as below and what does mean ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; show asp table socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Protocol&amp;nbsp; &amp;nbsp;Socket&amp;nbsp; &amp;nbsp; &amp;nbsp;State&amp;nbsp; &amp;nbsp; Local Address&amp;nbsp; &amp;nbsp; &amp;nbsp; Foreign Address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;also how to&amp;nbsp;&lt;SPAN&gt;implement access control for your management interface ??steps please&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 15:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521660#M1085935</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2021-12-20T15:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521668#M1085936</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/361173"&gt;@amralrazzaz&lt;/a&gt; you can restrict access to the management interface as explained in the configuration guide here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptd-fdm-system.html#concept_6FFA959431C84299B9EDCF19160266AD" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptd-fdm-system.html#concept_6FFA959431C84299B9EDCF19160266AD&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The access to be most concerned about would be from the public Internet - not for you on your VPN connection. Your VPN traffic appears to the management interface after being unencrypted from the VPN tunnel (and still with the inner layer of SSL/TLS encryption used to access FDM).&lt;/P&gt;
&lt;P&gt;The (lack of any) output of "show asp table socket" indicates there is not any listening port on the data interfaces.&lt;/P&gt;
&lt;P&gt;The just-released hotfix for 6.4.0 only applies to 6.4.0. Other FTD versions will require their own hotfixes which will be released shortly as noted in the security advisory.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 16:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521668#M1085936</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T16:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521684#M1085938</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show version&lt;BR /&gt;-------------------[ Firepower2 ]-------------------&lt;BR /&gt;Model : Cisco ASA5516-X Threat Defense (75) Version 6.2.3.3 (Build 76)&lt;BR /&gt;&amp;gt; show version&lt;BR /&gt;---------------[ Firepower1 ]----------------&lt;BR /&gt;Model : Cisco ASA5516-X Threat Defense (75) Version 6.6.1 (Build 91)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have another question please regarding the OS that is running for both ASA device which mentioned on below&lt;BR /&gt;i can see one of them listed on cisco impacted list and one is not !&lt;BR /&gt;so according to below impacted list from cisco and&amp;nbsp; my device which running 6.6.1 which is not listed is safe&lt;BR /&gt;and nothing to do on it ? or 6.6.1 can be considered as 6.6.0?!&lt;BR /&gt;7.1.0&lt;BR /&gt;7.0.0&lt;BR /&gt;6.7.0&lt;BR /&gt;6.6.0&lt;BR /&gt;6.5.0&lt;BR /&gt;6.4.0&lt;BR /&gt;6.3.0&lt;BR /&gt;6.2.3&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 16:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521684#M1085938</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2021-12-20T16:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521692#M1085939</link>
      <description>&lt;P&gt;As of this posting, all current 6.6.x releases without the hotfix are vulnerable.&lt;/P&gt;
&lt;P&gt;Upgrade to 6.6.5 and then to 6.6.5.1 and then finally install the hotfix for 6.6.5.1 for the best coverage as of this posting.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 16:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521692#M1085939</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T16:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521697#M1085940</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;sorry for asking again !&lt;/P&gt;&lt;P&gt;i just dont have time as im outside office for sometime &amp;amp; busy !so can i keep using the current os versions (&lt;SPAN&gt;6.2.3.3 &amp;amp; 6.6.1)&amp;nbsp;&lt;/SPAN&gt;for now and install the hotfixes for them once released next 23th of December ! at least to fix this&amp;nbsp;&lt;SPAN&gt;vulnerable&amp;nbsp;&lt;/SPAN&gt; issue and later on i ll update both os version ! is that okay ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also is there simple steps to follow once this hotfix released ? how to import on ASA device ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as it seems for 6.6.1 that i have is not included on impacted list im not sure if they will release hotfix for it or not !&amp;nbsp;&lt;/P&gt;&lt;P&gt;may i ask you if ill upgrade from 6.6.1 to 6.6.5 or 6.6.5.1 whats the steps to follow and without losing any setup or configurations !!?&lt;/P&gt;&lt;P&gt;is the update from version to version within same 6.6.x make different in the process comparing if i will jump from 6.6.1 to 7.0 for example?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and which one to choose from below :&lt;/P&gt;&lt;P&gt;ASA FirePOWER upgrade&lt;BR /&gt;Cisco_Network_Sensor_Upgrade-6.6.5-81.sh.REL.tar&lt;/P&gt;&lt;P&gt;ASA FirePOWER module install package&lt;BR /&gt;asasfr-sys-6.6.5-81.pkg&lt;/P&gt;&lt;P&gt;ASA FirePOWER module boot image&lt;BR /&gt;asasfr-5500x-boot-6.6.5-2.img&lt;/P&gt;&lt;P&gt;thanks a lot for help dear&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 18:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521697#M1085940</guid>
      <dc:creator>amralrazzaz</dc:creator>
      <dc:date>2021-12-20T18:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: FTD/ASA upgrade version to prevent Exploit 'Log4JShell'</title>
      <link>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521751#M1085946</link>
      <description>&lt;P&gt;Hotfix and upgrade instructions are the same and are linked in the earlier document I posted.&lt;/P&gt;
&lt;P&gt;Neither one will cause the devices to lose any configuration. If you have an HA pair, you can do it with no downtime but should still work within an approved maintenance window if you are supporting production customers. If there is no HA pair, an upgrade will require an outage when the device enters maintenance mode to replace system files and run various scripts as part of the upgrade. The outage duration is typically 30-60 minutes per device.&lt;/P&gt;
&lt;P&gt;To upgrade, use the file with the word upgrade in it. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Dec 2021 19:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-asa-upgrade-version-to-prevent-exploit-log4jshell/m-p/4521751#M1085946</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-20T19:18:01Z</dc:date>
    </item>
  </channel>
</rss>

