Release Notes for Cisco Small Business SPA30X and SPA50X IP Phone Firmware Version 7.5.7s
First Published: April 10, 2015
These Release Notes describe the updates and fixes in version 7.5.7s of the Cisco Small Business SPA30X and SPA50X IP Phone firmware.
As with any firmware release, read these release notes before you upgrade the firmware. Cisco also recommends that you back up the configuration before you perform any firmware upgrade.
Before You Upgrade
When you upgrade a Cisco SPA50X or Cisco SPA30X IP Phone, if you have installed a firmware version prior to 7.5.2b, you must first upgrade to 7.5.2b before you upgrade to release 7.5.3 or to a later release. See the following table for more information.
Firmware Release Installed on Your Phone
Special Instructions for Upgrading to Release 7.5.3 or Later
Upgrade to 7.5.2b first, then upgrade to 7.5.3 or later.
Use the following sections to obtain related information.
A new parameter, Cisco XML EXE Enable, is added to enable or disable the Cisco XML exe feature. The default value is No. If this feature is disabled, the phone will not execute the http://ip/CGI/Execute URL.
The default value of the parameter, Cisco XML EXE Auth Mode, changes from Trusted to Local Credential.
This release contains no Installation information.
The SPA 30x/50x phone do not support font size 12, for Hebrew language.
For SPA phones, a “+” sign is missing for the numeric inputs of PAB number entry.
The SPA phones do not support Xuser and Xpassword.
The SPA5x5 phone, displays the CFWD softkey for other call states (dialing), even if the CFWD service is disabled.
For SPA5x5/51x phone, the string, “Blind transfer number” is missing in XML Dictionary.
The following caveat is resolved in release 7.5.7s.
SPA300 and SPA500 IP Phones Unauthenticated Remote Dial Vulnerability
Behavior During Times of Network Congestion
Anything that degrades network performance can affect voice and video quality, and in some cases, can cause a call to drop. Sources of network degradation can include, but are not limited to, the following activities:
Administrative tasks, such as an internal port scan or security scan
Attacks that occur on your network, such as a Denial of Service attack
To reduce or eliminate any adverse effects to the devices, schedule administrative network tasks during a time when the devices are not being used or exclude the devices from testing.
Documentation, Service Requests, and Additional Information
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and delivers content directly to your desktop using a reader application. The RSS feeds are a free service.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.