Firepower devices might let attackers through
A URL sanitisation bug has Cisco pushing a patch for its Firepower system software. As the advisory for CVE-2016-1345 explains, the software doesn't properly validate fields in HTTP headers. A crafted HTTP request can bypass malicious file detection, or could block policies configured on the system. Sysadmins can check whether they've configured file actions in software in the system dashboard: the Malware and File menu displays file action policies in place, with the rules and actions in place....