This document provides installation instructions for Unified CCE 11.5(1) ES40. It also contains a list of Unified CCE issues resolved by this engineering special. Review all installation information before installing the product. Failure to install this engineering special as described can result in inconsistent Unified CCE behavior.
This document contains these sections:
In the Product
Alert Tool, you can set up profiles to receive email notification of new
Field Notices, Product Alerts, or End of Sale information for your selected
products.
The Product
Alert Tool is available at https://www.cisco.com/cisco/support/notifications.html.
CCE 11.5(1)
This patch is compatible with and should be installed on all
CCE servers including admin client machines. CCE 11.5(1) ES40 addresses
security vulnerabilities in the websetup application
by upgrading the following component:
ICM Websetup (setup.war)
Installation
of this patch requires the all ICM services to be shut-down during the entire
period of installation on machine where this patch is being applied. It is
always recommended to install this ES during a scheduled downtime.
Note: Remove patches in the reverse order of their installation. For example, if you installed patches 3, then 5, then 10 for a product, you must uninstall patches 10, 5, and 3, in that order, to remove the patches from that product.
This section provides a list of significant Unified CCE defects resolved by this engineering special. It contains these subsections:
Note: You can view more information on and track individual Unified CCE defects using the Cisco Bug Search tool, located at: https://bst.cloudapps.cisco.com/bugsearch/search?null.
Caveats in this section are ordered by Unified CCE component, severity, and then identifier.
Identifier |
Severity |
Component |
Headline |
CSCvm13986 |
2 |
web.setup |
Evaluation
of icm for Struts remote code execution
vulnerability August 2018 |
Defect Number: CSCvm13986
Component: web.setup
Severity: 2
Headline: Evaluation of icm for Struts remote code execution vulnerability August 2018
Symptom: The
product Cisco Unified Contact Center Enterprise;Cisco Unified Intelligent Contact Management
Enterprise includes a version of Struts that is affected by the vulnerability
identified by the following Common Vulnerability and Exposures (CVE) IDs:
CVE-2018-11776 - Apache Struts Namespace Remote Code Execution Vulnerability
Cisco has reviewed this product and concluded that it is affected by this
vulnerability. More information about this vulnerability may be found on the
advisory published at: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180823-apache-struts
Conditions:
Workaround: Not currently available.
Further Problem Description: Additional details about the vulnerabilities
listed above can be found at http://cve.mitre.org/cve/cve.html PSIRT
Evaluation: The Cisco PSIRT has assigned this bug the following CVSS
version 3 score. The Base CVSS scores as of the time of evaluation are 9.8:
https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
The Cisco PSIRT has assigned this score based on information obtained from
multiple sources. This includes the CVSS score assigned by the third-party
vendor when available. The CVSS score assigned may not reflect the actual
impact on the Cisco Product. CVE ID CVE-2018-11776 has been assigned to
document this issue. Additional information on Cisco's security vulnerability
policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
You can access current Cisco documentation on the Support pages at the following sites:
To provide comments about this document, send an email message to the following address:
contactcenterproducts_docfeedback@cisco.com
We appreciate your comments.
Cisco.com is a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC site.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. You can also resolve technical issues with online technical support and download software packages. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
The Cisco TAC site is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to https://www.cisco.com/c/en/us/support/index.html.
P3 and P4 level problems are defined as follows:
In each of the above cases, use the Cisco TAC site to quickly find answers to your questions.
If you cannot resolve your technical issue by using the TAC online resources, Cisco.com registered users can open a case online by using the TAC Case Open tool at the following site: https://mycase.cloudapps.cisco.com/create/start/
If you have a priority level 1(P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to the following sites:
P1 and P2 level problems are defined as follows: