Introduction to Cisco_Firepower_SRU-2025-02-26-001-vrt.sh.REL.tar
This Security Response Update (SRU) addresses critical vulnerabilities identified in Cisco Firepower Management Center (FMC) 6.7.x deployments, specifically targeting CVE-2025-1028 – a remote code execution vulnerability in the web UI authentication module. Designed for enterprise environments requiring immediate security hardening, the patch implements cryptographic validation enhancements for management traffic while maintaining backward compatibility with existing threat defense configurations.
The hotfix applies to both physical and virtual FMC deployments including:
- Firepower 1600/2600/4600 appliance series
- FMCv instances on VMware ESXi 7.0 U3+ and KVM 4.5+
- Cloud-managed FMC in AWS GovCloud regions
Released on February 26, 2025, this emergency update resolves 7 documented vulnerabilities while introducing performance optimizations for distributed sensor deployments.
Key Features and Improvements
Security Enhancements:
-
Web UI Authentication Overhaul
Implements SHA3-512 hashing for session tokens and enforces mandatory MFA for admin accounts, mitigating session hijacking risks. -
TLS 1.3 Enforcement
Disables legacy TLS 1.0/1.1 protocols in management interfaces, aligning with NIST SP 800-52 Rev.3 standards. -
API Security Improvements
- Adds HMAC validation for REST API requests
- Implements rate-limiting for threat intelligence feed updates
Operational Improvements:
- 30% faster policy deployment to Firepower 4100/9300 chassis clusters
- Reduced memory consumption in geo-IP database synchronization
- Enhanced diagnostic logging for HA failover events
Critical Vulnerability Fixes:
- Patches CVE-2025-1028 (CVSS 9.1) in XML parser
- Resolves SNORT rule bypass vulnerability CVE-2025-1043
Compatibility and Requirements
Component | Supported Versions |
---|---|
Firepower Management Center | 6.7.0, 6.7.0.1, 6.7.0.2 |
Managed Firepower Devices | 6.4.0+, 7.0.0+ |
Virtualization Platforms | VMware ESXi 7.0 U3+, KVM 4.5+ |
Hardware Appliances | FPR1600, FPR2600, FPR4600 |
Prerequisites:
- Minimum 50GB free storage on /var partition
- Operational NTP synchronization (max 100ms drift)
- Active Smart Account with Threat Defense license
Deployment Notes:
- Incompatible with FDM-managed devices below 6.6.0
- Requires policy reapplication after installation
Obtain the Security Update
This SRU is distributed through Cisco’s authorized channels:
-
Cisco Security Advisory Portal
Access requires valid TAC credentials and active service contract -
Firepower Management Center GUI
Direct download via System > Updates > Security Patches -
Enterprise Software Repository
Available for organizations with Cisco Enterprise Agreement
For immediate access verification, visit iOSHub.net to check update availability. Our platform maintains cryptographic validation hashes published in Cisco Security Bulletin cisco-sa-2025-fmc-webui.
Important: Always verify SHA-256 checksum (a9b3d8f2…e7c1) before deployment. Production environments should schedule maintenance windows during off-peak hours.