02-06-2018 12:11 PM - edited 03-08-2019 05:46 PM
Hi Everyone,
Recently we were made aware of a TETRA AV definition update which caused the Windows AMP for
Endpoints service to crash.
Note: Customers who do NOT have TETRA enabled are not affected by this issue.
While we have already removed the problematic definition set, which was available for ~30 minutes (see further notes below), affected systems will need to be fixed manually by uninstalling/re-installing the Connector (instructions below). Once the connector has been re-installed, a non-affected definition set will be downloaded and resolve the issue.
How to determine if you are impacted:
The issue causes the AMP for Endpoints service to crash or hang. The best way to determine if you have an affected system is to determine if any Connectors have been offline since the bad definition set was published.
To get the Last Seen Timestamp from the AMP Console, go to the Management tab and select Computers. From here you can download a CSV file using the "Export to CSV" option. The CSV will contain the Last Seen Timestamp. You can sort and filter on Connectors that have not been seen since 16:00 UTC February 06 2018 – these are likely Connectors that have been affected by this issue.
Resolution:
We urge all customers who are affected by this issue to open a TAC case immediately.
Resolving this issue does involve uninstalling and reinstalling the Connector.
Uninstall via Add/Remove Programs:
a) Uninstall the connector (choose "No" when asked if you plan to install the Connector again)
b) Re-install connector
Uninstall via Command Line:
<installer> /R /S /stopservicecoe 1 /remove 1
Uninstall via Command Line with Connector Protection Enabled:
<installer> /R /S /stopservicecoe 1 /remove 1 /uninstallpassword <INSERT YOUR PASSWORD>
Affected Software Versions:
All Windows Connector versions with TETRA enabled are affected on both 32bit and 64bit versions of Windows 7/8/10, Windows Server 2008R2 and Server 2012
Notes:
TETRA Definition Sets:
Faulty TETRA definition revision (16:20 UTC)
32bit = 101032, 64bit = 70876
Updated TETRA definition revision (16:50 UTC)
32bit = 101034, 64bit = 70878
A Root Cause Analysis (RCA) document will be prepared and shared with affected customers.
02-07-2018 01:40 PM
02-07-2018 03:55 PM
Which version of the Connector are you running?
Are you running the Command Prompt as Administrator?
Uninstall via Command Line:
<installer path> /r /S /stopservicecoe 1 /remove 1
Uninstall via Command Line with Connector Protection Enabled:
<installer path> /r /S /stopservicecoe 1 /remove 1 /uninstallpassword <password>
If those do not work, try running <path, likely C:\Program Files\Cisco\AMP\>sfc.exe -k <password>
02-07-2018 06:20 PM
02-07-2018 06:27 PM
Can I get a clarification please? You said they are set to the 5.1.13 but most were running the 6.0.5. Can you confirm the version that the affected clients were actually running at the time of issue? We are looking to update to the 5.1.13 so we can see the clients information correctly in the console but if you can confirm even the 5.1.13 connectors are potentially compromised we will probably give this longer to settle down. Thank you for putting your information out there. Communities like this work when people contribute.
02-07-2018 06:39 PM
02-07-2018 12:34 PM
So after a bit of digging on our part, we found that only clients with the 6.0.5.10636 version of the connector are affected at our locations. Can anyone else out there confirm if this is the case for you as well?
02-07-2018 01:16 PM
That seems to be the case for us as well. So far we do not have a resolution. Once uninstalling, and trying to reinstall it states the service is running, when it is not running. It no longer exists.
02-07-2018 01:39 PM
02-07-2018 07:15 PM
I have found, with Password protected connectors, the only process that works is running the connector install executable with the following switches to uninstall the entire client, reboot, then re-install, and reboot again.
%INST%\install\XXXX_Detection_Group_FireAMPSetup.exe /S /remove 1 /uninstallpassword XXXXXXXXX
This uninstall scrip seems to work, as long as you reboot after.
I've deployed 2 SCCM scripts, one to remove the connector and reboot, one to install it all over again and reboot, beginning at 2:00 am. We found using a rough guide of any connector who hasn't checked in since the Feb 6, 2018 00:016 UTC gave us a rough number, but we expect it to be off +/- at least 10-20 pc's.
02-08-2018 11:32 AM
Has anybody been to remediate this all thru a huge corporate environment? We have been trying to find big companies that have adopted AMP that has moved from McAfee. We are not having good vibes about going to AMP. We got with this update as well and still no real solution to fix these machines on a bulk basis. Basically we are running exposed because AMP broke itself.
02-08-2018 01:12 PM
Anyone knows the name of the file responsible for the crash (corrupted update file) ?
02-08-2018 01:18 PM
We were able to correct with a login batch file, check if the file c:\windows\temp\BitDefender Threat Scanner.dmp exists, if it does, then the machine has the problem.
Delete the amp file and then
Run the following
call FireAMPSetup.exe /S /remove 1 /uninstallpassword yourpasswordhere
The Fireampsetup.exe is the installation file, your name may be different.
then have the script do a shutdown /r command.
This will uninstall and then you can reinstall. Our script installs automatically
if %PROGRAMS_HOME%\Cisco\AMP\local.xml does not exist then install.
02-08-2018 01:19 PM
02-08-2018 01:36 PM
02-13-2018 11:42 AM
Cisco gave me this window batch file to use:
@echo off
:: replace CiscoAMP%% with immunetprotect%% for earlier versions of A4E
:: adjust your installation directory if necessary as well for older connector versions using the sourcefire branding
:: run this as admin
:: this script won't be able to stop the A4E service if connector protection is enabled
wmic service where "name like 'CiscoAMP%%'" call stopservice > nul
timeout 10 > nul
del "C:\Program Files\Cisco\AMP\tetra\Plugins\*" /q
del "C:\Program Files\Cisco\AMP\update\Plugins\*" /q
timeout 5 > nul
wmic service where "name like 'CiscoAMP%%'" call startservice > nul
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide