-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
Cisco Firepower 9000 Series Firepower 2-Port 100G Double-Width Network
Module Queue Wedge Denial of Service Vulnerability
21 February 2019
AusCERT Security Bulletin Summary
Product: Cisco Firepower 9000
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Denial of Service -- Remote/Unauthenticated
CVE Names: CVE-2019-1700
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Firepower 9000 Series Firepower 2-Port 100G Double-Width Network Module
Queue Wedge Denial of Service Vulnerability
Advisory ID: cisco-sa-20190220-firpwr-dos
FirstÂ Published: 2019Â FebruaryÂ 20Â 16:00Â GMT
VersionÂ 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvn57812
o A vulnerability in field-programmable gate array (FPGA) ingress buffer
management for the Cisco Firepower 9000 Series with the Cisco Firepower
2-port 100G double-width network module (PID: FPR9K-DNM-2X100G) could
allow an unauthenticated, adjacent attacker to cause a denial of service
(DoS) condition. Manual intervention may be required before a device will
resume normal operations.
The vulnerability is due to a logic error in the FPGA related to the
processing of different types of input packets. An attacker could exploit
this vulnerability by being on the adjacent subnet and sending a crafted
sequence of input packets to a specific interface on an affected device. A
successful exploit could allow the attacker to cause a queue wedge
condition on the interface. When a wedge occurs, the affected device will
stop processing any additional packets that are received on the wedged
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
o Vulnerable Products
This vulnerability is specific to the Cisco Firepower 9000 Series with the
Cisco Firepower 2-port 100G double-width network module installed, which
is PID FPR9K-DNM-2X100G. The fix for this vulnerability is not an FXOS
Software upgrade; it is an FPGA firmware upgrade.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following
Firepower 2100 Series
Firepower 4100 Series
Indicators of Compromise
o On devices where this vulnerability is exploited, the input discard or
overrrun interface counters will increase exponentially. The administrator
can check for this condition by using the show interface command at the
CLI. When one or both of these counters increment, this is an indication
that no traffic is being processed on the interface.
Fp9000(fxos)# show interface eth2/1
Ethernet2/1 is up
Hardware: 100000 Ethernet, address: 70db.9819.a7b4 (bia 70db.9819.a7b4)
Description: U: Uplink
0 unicast packets 425 multicast packets 0 broadcast packets
425 input packets 57370 bytes
0 jumbo packets 0 storm suppression bytes
0 runts 0 giants 0 CRC 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 425 input discard
0 Rx pause
The device may need to be rebooted to clear this condition. Contact the
Cisco Technical Assistance Center (TAC) for further assistance.
o There are no workarounds that address this vulnerability.
o This vulnerability is fixed by an upgrade to the FPGA firmware. Customers
are advised to follow the procedure outlined in the Firmware Upgrade
section of the Cisco Firepower 4100/9300 FXOS CLI Configuration Guide.
This procedure works for FXOS Software Releases 2.2.2 or later. A customer
on an earlier release should upgrade to Software Release 2.2.2 (or later)
or contact the Cisco TAC for assistance.
When considering software upgrades, customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories and Alerts page, to determine exposure and a
complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the
Cisco Technical Assistance Center (TAC) or their contracted maintenance
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
o This vulnerability was found during the resolution of a Cisco TAC support
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy. This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
Subscribe to Cisco Security Notifications
| Version | Description | Section | Status | Date |
| 1.0 | Initial public release. | -- | Final | 2019-February-20 |
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to email@example.com
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: firstname.lastname@example.org
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----