Guest

Preview Tool

Cisco Bug: CSCvu52724 - CIAM: openssl CVEs in M4/M5 blade firmware

Last Modified

Oct 06, 2020

Products (1)

  • Cisco Firepower 9300 Series

Known Affected Releases

r291

Description (partial)

Symptom:
This product includes Third-party Software that is affected by the
vulnerabilities identified by the following Common Vulnerability and
Exposures (CVE) IDs:

CVE-2016-2177 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177
CVE-2016-2178 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178
CVE-2016-2179 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179
CVE-2016-2180 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180
CVE-2016-2181 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181
CVE-2016-2182 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182
CVE-2016-2183 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
CVE-2016-6302 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302
CVE-2016-6303 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303
CVE-2016-6304 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304
CVE-2016-6306 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306
CVE-2016-7055 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
CVE-2016-8610 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
CVE-2017-3731 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
CVE-2017-3732 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732
CVE-2017-3735 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735
CVE-2017-3736 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736
CVE-2017-3737 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737
CVE-2017-3738 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738
CVE-2018-0732 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732
CVE-2018-0734 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734
CVE-2018-0737 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737
CVE-2018-0739 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739
CVE-2018-5407 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407
CVE-2019-1547 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
CVE-2019-1551 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
CVE-2019-1552 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1552
CVE-2019-1559 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559
CVE-2019-1563 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563


After analysis, Cisco has decided against performing additional actions on this product due to one of the 
following reasons: 

- The product is no longer maintained, having reached End of Software Maintenance.  
- The product is still being maintained, but a business decision was made not to upgrade the vulnerable product.  
- The product uses the affected third-party component in such a way as to not be affected by these vulnerabilities.

Conditions:
Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.