FireMon Asset Manager 5.5
Release Date: 19 September 2025
Summary
FireMon is pleased to provide this overview of the new features and enhancements made for this Asset Manager 5.5 release, which is recommended for all users.
FireMon Asset Manager version 5.4
The upgrade file is now available in FireMon User Center > Downloads.
The supported upgrade path to Command Center 5.5 is from the 5.3 and 5.4 versions.
For the upgrade procedure, see Upgrading Asset Manager.
We recommend upgrading your Scouts whenever you upgrade your Command Center. However, Scouts 5.3.x and 5.4.x are compatible with Command Center version 5.5.
Highlights
-
Expanded Cloud Discovery.Eliminate security risk by viewing Security Rules open to all IPs or Vulnerable Ports. Limit exposure and save costs by viewing reports on Public IPs (assigned and unassigned). FireMon will be rolling out more Cloud Discovery features over the subsequent releases. Please see the User Center for the Dashboard DDL.
-
New FortiNet Integration. Connect to you FortiManager Device to collect FortiGate and FortiSwitch managed devices and interfaces and bring them into your Asset Manager Device Inventory.
-
New Assessment Dashboard Available. A new Assessment Dashboard is now available for download from usercenter.firemon.com. Once installed, the dashboard provides a quick, consolidated view of your device and network security posture, making it easier to assess and track overall security health.
-
View Valuable Network Information such as:
-
Unknown Devices and Routes: As your single source of truth, FireMon Asset Manager prides itself in finding the unknown. Inventory the Unknown networks and devices discovered by FAM and take appropriate action to secure your network.
-
Cipher Strength and Expiration Status of Certificates: Expired and weak certificates can be exploited and used to impersonate websites. Asset Manager categorizes certificates into; Secure and Not Expired, Weak and Not Expired, Secure and Expired, Weak and Expired.
-
Open Malware Ports Summary: Only necessary ports should be open in your organization, quickly view devices speaking on known malware ports.
-
SSL and TLS Security Summary: A brief overview of the protocols in use. All devices using TLS 1.1 or lower should be updated to use TLS 1.2 or higher.
-
-
To install the downloaded DDL, navigate to the top right corner of the UI. Under your username, you will see a settings option that will direct you to the DDL metadata import.
-
New Security Manager Dashboard. Following the Integration Dashboard layout introduced in 5.3, get immediate views of devices not being handled by Security Manager.
-
Option to Push Devices to Infoblox. With 5.5 Asset Manager will no longer automatically create records on your Infoblox IPAM. The Integration now has an option to Enable Global Push.
Noteworthy Resolved Issues
-
Integration with Security Manager now supports NSPM versions 2025.2.2 and later
-
Added ability to Export only user defined ddl elements
-
Netflow Ingestion Improvements
-
Parent Child relation of devices updated to maintain the original First Observed Time
-
Visual improvements to existing widgets and reports
-
Fixed issue with last observed not updating for mac-only devices
-
Better handling of adding device attributes that already exist as zone attributes and vice versa
-
Added Enhancement to Push Assets to Connect by Zone
Database Schema
The database schema provides a visual representation of the database. You can request the 5.5 database schema from Asset Manager Support.
CLI Commands
The Asset Manager CLI is a powerful hierarchical menu-driven interface that provides virtually all administrative functionality in the browser interface.
To administer your system using the command-line interface, see System Administration via CLI.
Security Updates & STIG
5.5 resolves Common Vulnerabilities & Exposures (CVEs) and incorporates a variety of security-related (and non-security-related) enhancements.
Spring Framework Security Assessment: CVE-2024-38819
We reviewed the recently disclosed Spring Framework vulnerability CVE-2024-38819, which involves a potential path traversal risk when using RouterFunctions with FileSystemResource for serving static content.
Asset Manager is running Spring WebMVC 5.3.39 and does not use WebFlux or RouterFunctions. Based on this, our application is not susceptible to this vulnerability. No further action is required at this time.
Your vulnerability scanner may flag Asset Manager for the above CVE. An application is vulnerable when both of the following are true:
-
The web application uses RouterFunctions to serve static resources
-
Resource handling is explicitly configured with a FileSystemResource location
Why Asset Manager is not susceptible
-
Does not use WebFlux.
-
Webmvc version is spring-webmvc-5.3.39.
-
Does not use RouterFunction to serve static resources.
-
Does use @Controller and @RequestMapping
Change Log
Improvements
Key: Summary
LUM-5440: Cloud Scanner: Azure for table azure_public_ip_address can we add fields for "Associate to" and "Virtual machine"
LUM-5437: Create Device from FortiManager
LUM-5429: Create Warehouse Tables for newly created AWS and Azure Psql Tables for Security Groups and Elastic IPs
LUM-5426: MSSP license validation testing
LUM-5424: New Security Manager Dashboard
LUM-5417: Devicify FortiNet Integration Devices
LUM-5416: RHEL 9 - Must Generate Audit Records for All Account Creations, Modifications, Disabling, and Termination Events That Affect /etc/sudoers and /etc/sudoers.d/ and /var/log/faillock
LUM-5415: RHEL 9 - Must Prevent Files With the setuid and setgid Bit Set From Being Executed on the /boot Directory
LUM-5413: SPIKE: FortiNet Integration
LUM-5412: Add FortiNet API results to existing Management Station Devices Report
LUM-5410: Process device responses for devices created by FortiNet Integration
LUM-5407: Process results from FortiNet devices call and create Asset Manager devices
LUM-5406: Use the FortiNet API capability to retrieve device information from the management station
LUM-5374: Meraki: Customer Key is in Plain Text. Add functionality to hide key with tool tip to use previously entered key
LUM-5373: Carbon Black EDR: Customer Key is in Plain Text. Add functionality to hide key with tool tip to use previously entered key
LUM-5319: Build out a Performance System for Development
LUM-5281: Cloud Scanner: Pull in Azure Public IPs and find database home for non-device information
LUM-5280: Cloud Scanner: Pull in Azure Network Security Groups and find database home for non-device information
LUM-5279: Cloud Scanner: Pull in AWS Elastic IPs and find database home for non-device information
LUM-5278: Cloud Scanner: Pull in AWS Security Groups and find database home for non-device information
LUM-5207: Create Azure Identity Sources for Security Groups
LUM-5203: Cloud Scanner: Pull in more Network information for Azure Instance
LUM-4997: V-257794 CAT II - Must Clear SLUB/SLAB Objects To Prevent Use-After-Free Attacks
LUM-4996: V-257793 CAT II - Must Clear The Page Allocator To Prevent Use-After-Free Attacks
LUM-4995: V-257792 CAT II - Must Disable Virtual System Calls
LUM-4876: FR: Infoblox integration tab should have an optional 'push' option
LUM-4229: UI | Widgets | Clean up the Select Checkbox seen on first column on table widgets
LUM-4168: Feature Request: Export only user defined .ddl elements relating to custom dashboards/reports/queries
LUM-3770: PKI | User Certificates | Clean up login and logout workflows
Resolved Issues
Key: Summary
LUM-5459: User Updated Notifications are not being created
LUM-5450: Tables aws_rule has fromport and toport comma formatted
LUM-5441: Cloud Scanner: Azure table azure_security_rule missing the Port field in the NSG
LUM-5439: Cloud Scanner. Azure bring in Subscription ID and Resource Group for table azure_public_ip_address
LUM-5021: Well-defined (always on) network devices appearing in the 'All Devices Discovered in the last 24 Hours' report
LUM-4068: WMI Responders Dashboard. "Logged in Users" column expanding outside screen
LUM-3990: Cleaner error message instead of Foreign Key Constraint Error when adding Device Custom Attribute that already exists as Zone Custom Attribute.
LUM-3591: Host discovery initial configuration is hard coded in the GUI
LUM-3004: maclastobserved and lastobserved is not updated for mac only layer-2 hosts
LUM-2920: Users | Edit | When editing a user, "API key does not exist for user" error message occurs
LUM-2813: lastobserved is not updated for devices of interfaces in snmpDetails that has and ip and no mac
LUM-2770: Supply Error Message when User attempts to add attribute (zone or device) that equals a system attribute
LUM-2610: Widget Self-Signed Certificates by Issuer: Issuer Names extend outside Widget.
LUM-2254: Notifications | Issues observed with Subscription, Notifications, and CEF
LUM-1350: Cannot create username with special characters in a certain sequence
LUM-1304: RADIUS Authentication Enable/Disable success message should change
LUM-1216: PKI=>Upload Server Certs: Error message should be corrected when user is trying to upload server certs with invalid password