<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104678#M1112428</link>
    <description>&lt;P&gt;Simply try "connect asa" from this CLI (which is a module CLI).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2024 07:01:48 GMT</pubDate>
    <dc:creator>tvotna</dc:creator>
    <dc:date>2024-05-15T07:01:48Z</dc:date>
    <item>
      <title>Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104617#M1112421</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;We were impacted by the vulnerability &lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h&lt;/A&gt;, and following recommendations from the TAC, I had to update my pair of ASAs from version 9.14.3.18 to version 9.14.4.24. We followed all the update procedures, but when I went to access the "connect module 1 console", my asa did not load the vpn settings, and entered a "module" similar to FXOS. I contacted Cisco on the same ticket, but they are still taking a long time to give me feedback, has anyone had this problem?&lt;/P&gt;&lt;P&gt;Could you share some process for me to recover the CLI of my ASA?&lt;BR /&gt;Everything in the GUI is functional, with the status ok, however, in the CLI, I can no longer access the ASA settings:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: We checked version compatibility, however, the image I was recommended to install was the &lt;STRONG&gt;Cisco Adaptive Security Appliance CSP package for the Cisco Firepower Series.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cisco-asa.9.14.4.24.SPA.csp&lt;/P&gt;&lt;P&gt;&lt;A href="https://software.cisco.com/download/home/286287252/type/280775065/release/9.14.4%20Interim" target="_blank"&gt;https://software.cisco.com/download/home/286287252/type/280775065/release/9.14.4%20Interim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 01:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104617#M1112421</guid>
      <dc:creator>joandwifi</dc:creator>
      <dc:date>2024-05-15T01:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104678#M1112428</link>
      <description>&lt;P&gt;Simply try "connect asa" from this CLI (which is a module CLI).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 07:01:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104678#M1112428</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-05-15T07:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104756#M1112434</link>
      <description>&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt; mentioned, connecting the the ASA cli from the fxos cli is a two step process. First you connect to the security module and then to the logical device (ASA in your case) running on the security module.&lt;/P&gt;
&lt;P&gt;The ASA should also have a separate physical interface assigned to it for management. You should be able to log into it directly using the ASA management address.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 08:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104756#M1112434</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-05-15T08:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104873#M1112445</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the quick response, but unfortunately the command does not work,&lt;/P&gt;&lt;P&gt;The ASA CLI address is local, it is not remotely accessible via the VPN (firewall rules).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="joandwifi_0-1715768090187.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218379i1516CE41A90AB8BB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="joandwifi_0-1715768090187.png" alt="joandwifi_0-1715768090187.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;SE01#&lt;BR /&gt;SE01# &lt;STRONG&gt;connect&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;adapter&lt;/STRONG&gt; Mezzanine Adapter&lt;BR /&gt;&lt;STRONG&gt;cimc&lt;/STRONG&gt; Cisco Integrated Management Controller&lt;BR /&gt;&lt;STRONG&gt;fxos&lt;/STRONG&gt; Connect to FXOS CLI&lt;BR /&gt;l&lt;STRONG&gt;ocal-mgmt&lt;/STRONG&gt; Connect to Local Management CLI&lt;BR /&gt;&lt;STRONG&gt;module Security&lt;/STRONG&gt; Module Console&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SE01# &lt;STRONG&gt;connect module 1 console&lt;/STRONG&gt;&lt;BR /&gt;Telnet escape character is '~'.&lt;BR /&gt;Trying 127.5.1.1...&lt;BR /&gt;Connected to 127.5.1.1.&lt;BR /&gt;Escape character is '~'.&lt;/P&gt;&lt;P&gt;CISCO Serial Over LAN:&lt;BR /&gt;Close Network Connection to Exit&lt;/P&gt;&lt;P&gt;Firepower-module1&amp;gt;&lt;BR /&gt;Firepower-module1&amp;gt;en&lt;BR /&gt;No such command&lt;BR /&gt;en&lt;BR /&gt;Firepower-module1&amp;gt;config&lt;BR /&gt;coredump disk maxRestart memory process restartCounters restartTimeInterval turboBoost&lt;BR /&gt;Firepower-module1&amp;gt;show&lt;BR /&gt;cgroups coredump cpu cpuinfo disk diskusage faults hosts interfaces maxRestart memory memoryusage netstat ntp platform process processes route services slot tech-support time turboBoost uptime users version vnicmap&lt;BR /&gt;Firepower-module1&amp;gt;show tech-support&lt;BR /&gt;Version information&lt;BR /&gt;================================================================================&lt;BR /&gt;Linux Firepower-module1 4.18.45-yocto-standard #1 SMP Sat Oct 15 05:19:14 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux&lt;BR /&gt;Image type : Release&lt;BR /&gt;Key Version : A&lt;/P&gt;&lt;P&gt;Firepower Extensible Operating System Platform 2.12(0.450) (1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Firepower Extensible Operating System (FX-OS) Software.&lt;BR /&gt;TAC support: &lt;A href="http://www.cisco.com/tac" target="_blank"&gt;http://www.cisco.com/tac&lt;/A&gt;&lt;BR /&gt;Copyright (c) 2009-2016, Cisco Systems, Inc. All rights reserved.&lt;/P&gt;&lt;P&gt;The copyrights to certain works contained in this software are owned by other third parties and&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 10:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104873#M1112445</guid>
      <dc:creator>joandwifi</dc:creator>
      <dc:date>2024-05-15T10:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104941#M1112450</link>
      <description>&lt;P&gt;In this case TAC would say the following: "if it doesn't work, provide corresponding output, otherwise this has never happened".&lt;/P&gt;&lt;P&gt;So far I don't see how you tried "connect module 1 console" and _then_ "connect asa" from the "Firepower-module1&amp;gt;" prompt.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 12:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5104941#M1112450</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-05-15T12:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 9300 Vulnerability ArcaneDoor - ASA Update error</title>
      <link>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5105185#M1112465</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1342399"&gt;@tvotna&lt;/a&gt;&amp;nbsp; and &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was wrong, and I was wrong,&lt;BR /&gt;Thank you for insisting on correcting me. In fact, the process needs to be executed twice, and I despaired when it didn't work directly.&lt;BR /&gt;After I ran "connect asa", I was able to access the Firewall settings.&lt;BR /&gt;Cisco hasn't responded to me yet, but thank you very much;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="joandwifi_0-1715794720816.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218411i6839C8FDB3EC66DF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="joandwifi_0-1715794720816.png" alt="joandwifi_0-1715794720816.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SEG01#&lt;BR /&gt;SEG01# connect module 1 console&lt;BR /&gt;Telnet escape character is '~'.&lt;BR /&gt;Trying 127.5.1.1...&lt;BR /&gt;Connected to 127.5.1.1.&lt;BR /&gt;Escape character is '~'.&lt;/P&gt;&lt;P&gt;CISCO Serial Over LAN:&lt;BR /&gt;Close Network Connection to Exit&lt;/P&gt;&lt;P&gt;Firepower-module1&amp;gt;connect asa&lt;BR /&gt;Connecting to asa(SEG01-ASA) console... hit Ctrl + A + D to return to bootCLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WARNING: DH group 5 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: DES is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: DH group 2 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: DES is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: DES is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: DH group 2 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: interface Ethernet1/1 security level is 0.&lt;BR /&gt;WARNING: Configure rate limit on syslog messages to avoid impact on other operations in case of high syslog rate&lt;BR /&gt;WARNING: HMAC-MD5 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: HMAC-SHA1-96 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;WARNING: HMAC-MD5-96 is considered insecure. This option is deprecated and will be removed in a later version.&lt;BR /&gt;End configuration replication from mate.&lt;BR /&gt;WARNING: Pool (10.) overlap with existing pool.&lt;BR /&gt;WARNING: Pool (10.) overlap with existing pool.&lt;BR /&gt;WARNING: Pool (10.) overlap with existing pool.&lt;BR /&gt;WARNING: Pool (10.) overlap with existing pool.&lt;/P&gt;&lt;P&gt;Switching to Active&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;Beginning configuration replication: Sending to mate.&lt;BR /&gt;End Configuration Replication to mate&lt;BR /&gt;enable&lt;BR /&gt;Password:&lt;BR /&gt;Invalid password&lt;BR /&gt;Password: ******************************************************&lt;BR /&gt;Invalid password&lt;BR /&gt;Password:&lt;BR /&gt;Invalid password&lt;BR /&gt;Access denied.&lt;BR /&gt;SEG01-ASA/pri/act&amp;gt; en&lt;BR /&gt;Password:&lt;BR /&gt;Invalid password&lt;BR /&gt;Password:&lt;BR /&gt;Invalid password&lt;BR /&gt;Password:&lt;BR /&gt;Invalid password&lt;BR /&gt;Access denied.&lt;BR /&gt;SEG01-ASA/pri/act&amp;gt; en&lt;BR /&gt;Password: ********&lt;BR /&gt;SEG01-ASA/pri/act# sh run&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: FLM23&lt;BR /&gt;: Hardware: FPR9K-SM-44, 228786 MB RAM, CPU Xeon E5 series 2200 MHz, 2 CPUs (88 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.14(4)24 &amp;lt;system&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;hostname SEG01-ASA&lt;BR /&gt;enable password ***** pbkdf2&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 17:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-9300-vulnerability-arcanedoor-asa-update-error/m-p/5105185#M1112465</guid>
      <dc:creator>joandwifi</dc:creator>
      <dc:date>2024-05-15T17:42:27Z</dc:date>
    </item>
  </channel>
</rss>

