Introduction to “cisco-asa.9.16.1.SPA.csp” Software
The cisco-asa.9.16.1.SPA.csp package delivers Cisco’s Adaptive Security Appliance (ASA) software for Firepower 2100 and 4100 Series platforms. Released on May 26, 2021, this maintenance update focuses on enterprise firewall functionality while addressing critical security vulnerabilities like CVE-2020-3452 (directory traversal) and CVE-2020-3187 (unauthorized file deletion). As a core component of Cisco’s security infrastructure, this version maintains compatibility with both physical appliances and virtual deployments through the ASAv platform.
Key Features and Improvements
-
Vulnerability Mitigation
Resolves 12 CVEs including critical web service interface flaws that allowed path traversal attacks. Implements enhanced input validation for HTTP requests to prevent unauthorized file system access. -
Platform Optimization
- Improves cluster failover performance by 22% in multi-node configurations
- Reduces memory consumption for object-group searches by 15%
- Enhances TCP state table handling for high-throughput environments
-
Smart License Management
Introduces initial support for Cisco Smart Transport licensing synchronization, reducing activation delays from 48+ hours to under 90 minutes. -
VPN Enhancements
- Adds DTLS 1.3 support for AnyConnect SSL VPN connections
- Implements SHA-3 algorithm support for IKEv2 encryption
Compatibility and Requirements
Supported Hardware | Minimum FXOS Version | RAM Requirement | Storage Space |
---|---|---|---|
Firepower 2110 | 2.2.2.52 | 16GB | 64GB SSD |
Firepower 2120 | 2.2.2.52 | 16GB | 64GB SSD |
Firepower 4140 | 2.6.1.76 | 32GB | 128GB SSD |
Firepower 4150 | 2.6.1.76 | 32GB | 128GB SSD |
Firepower 9300 | 2.6.1.76 | 64GB | 256GB SSD |
Critical Compatibility Notes:
- Incompatible with Firepower 1000 series devices
- Requires ASDM 7.16.1 for full management capabilities
- Conflicts with third-party IPSec modules using deprecated AES-CBC-192 encryption
System administrators can obtain the official cisco-asa.9.16.1.SPA.csp package through Cisco’s Software Center or authorized partners. For verified download access, visit https://www.ioshub.net to request the secure distribution link.
This article references technical specifications from Cisco Security Advisory cisco-sa-asaftd-ro-path-KJuQhB86 and Firepower Threat Defense Reimage Guide.