Guest

Preview Tool

Cisco Bug: CSCvu52422 - CIAM: PNUOS libgcrypt libssh openssl pcre CVEs

Last Modified

Oct 06, 2020

Products (1)

  • Cisco Firepower 9300 Series

Known Affected Releases

r291

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2003-0131 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0131
CVE-2006-2937 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
CVE-2006-2940 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
CVE-2006-3738 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
CVE-2007-4995 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4995
CVE-2007-5135 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135
CVE-2008-5077 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077
CVE-2009-3245 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245
CVE-2010-0742 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742
CVE-2010-3864 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864
CVE-2010-4252 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4252
CVE-2011-4109 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109
CVE-2012-2110 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110
CVE-2012-2333 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333
CVE-2013-6450 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450
CVE-2014-0160 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
CVE-2014-0195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
CVE-2014-0198 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
CVE-2014-0224 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
CVE-2014-3509 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509
CVE-2014-3512 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512
CVE-2014-3566 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
CVE-2014-3567 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
CVE-2014-8176 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
CVE-2015-0209 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209
CVE-2015-1788 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
CVE-2015-1789 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
CVE-2015-1790 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
CVE-2015-1791 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
CVE-2015-1792 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
CVE-2015-3195 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195
CVE-2016-0703 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703
CVE-2016-0704 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704
CVE-2016-0798 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798
CVE-2016-2106 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106
CVE-2016-2108 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108
CVE-2016-2109 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109
CVE-2016-2176 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176
CVE-2016-2183 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
CVE-2016-6303 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
CVE-2018-0739 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
CVE-2018-5407 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
CVE-2019-13115 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
CVE-2019-1551 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
CVE-2019-17498 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498
CVE-2019-3855 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855
CVE-2019-3856 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856
CVE-2019-3857 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857
CVE-2019-3862 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862
CVE-2019-3863 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863


After analysis, Cisco has decided against performing additional actions on this product due to one of the 
following reasons: 

- The product is no longer maintained, having reached End of Software Maintenance.  
- The product is still being maintained, but a business decision was made not to upgrade the vulnerable product.  
- The product uses the affected third-party component in such a way as to not be affected by these vulnerabilities.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.