About this Document


This document provides installation instructions for Unified CCE 12.6(2) ES7. It also contains a list of Unified CCE issues resolved by this engineering special. Review all installation information before installing the product. Failure to install this engineering special as described can result in inconsistent Unified CCE behaviour.

This document contains these sections:

Sign Up for Email Notification of New Field Notices


In the Product Alert Tool, you can set up profiles to receive email notification of new Field Notices, Product Alerts, or End of Sale information for your selected products.

The Product Alert Tool is available at https://www.cisco.com/cisco/support/notifications.html.

About Cisco Unified CCE (and Unified CCE Engineering Specials)


Unified CCE 12.6(2) ES7 resolves the following security vulnerabilities.

·        Vulnerabilities related to Azul JRE used by AppDynamics Machine Agent packaged with CCE - CVE-2023-21939, CVE-2022-39399, CVE-2023-21830, CVE-2022-21626, CVE-2023-21835, CVE-2023-21937, CVE-2023-21967, CVE-2023-21843, CVE-2023-21930, CVE-2023-21938, CVE-2023-21968, CVE-2023-21954, CVE-2022-21618, CVE-2022-21619, CVE-2022-21628, CVE-2022-21624.

·        Vulnerability observed in Apache Tomcat version used by CCE - CVE-2020-1938.

·        Vulnerabilities observed in the OpenLogic OpenJDK JRE used by CCE - CVE-2021-20264, CVE-2022-21248, CVE-2022-21282, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21296, CVE-2022-21299, CVE-2022-21305, CVE-2022-21340, CVE-2022-21341, CVE-2022-21349, CVE-2022-21360, CVE-2022-21365, CVE-2022-21426, CVE-2022-21434, CVE-2022-21443, CVE-2022-21476, CVE-2022-21496, CVE-2022-21540, CVE-2022-21541, CVE-2022-34169, CVE-2023-21968.

CCE 12.6(2) ES7 need to be applied on CCE deployment irrespective of AppDynamics is enabled or not.

Note (Applies only if AppDynamics performance monitoring is enabled) :
Before installing Unified CCE 12.6(2) ES7 on the Distributor node, disable AppDynamics performance monitoring on 12.6(2) and re-enable it after installing the ES7. If AppDynamics performance monitoring is not disabled before ES7 is installed on the Distributor node, then post ES7 installation restart the Distributor node.

Unified CCE Compatibility and Support Specifications


Unified CCE Version Support

Unified CCE Component Support

This section lists the Unified CCE components on which you can and cannot install this engineering special.

Supported Unified CCE Components

You can install Unified CCE 12.6(2) ES7 on these Unified CCE components:

Unsupported Unified CCE Components

Do not install this engineering special on any components other than the following:

Unified CCE Engineering Special Installation Planning


Planning for maintenance window and downtime

The installation or uninstallation of this patch requires a planned maintenance window with some expected downtime of a few seconds / minutes: No

Installing Unified CCE 12.6(2) ES7


Installation of this patch requires that all Unified CCE services be shut down during the entire period of installation.

Note: Anti-virus software have known to cause issues during the installation of Unified CCE 12.6(2) ES7. So, please disable the anti-virus services on the CCE machine before installing this ES.

If the Unified CCE Services are set to manual, using the Unified CCE Service Control, start all the Unified CCE Services.

Uninstall Directions for Unified CCE 12.6(2) ES7


Note: Remove patches in the reverse order of their installation. For example, if you installed patches 3, then 5, then 10 for a product, you must uninstall patches 10, 5, and 3, in that order, to remove the patches from that product.

Resolved Caveats in this Engineering Special


This section provides a list of significant Unified CCE defects resolved by this engineering special. It contains these subsections:


Note: You can view more information on and track individual Unified CCE defects using the Cisco Bug Search tool, located at: https://bst.cloudapps.cisco.com/bugsearch/search?null.


Resolved Caveats in Unified CCE 12.6(2) ES7

This section lists caveats specifically resolved by Unified CCE 12.6(2) ES7.

Index of Resolved Caveats

Caveats in this section are ordered by UNIFIED CCE component, severity, and then identifier.

Identifier

Severity

Component

Headline

CSCwf65121

2

appd

Vulnerabilities for AppD Client JDK on UCCE/PCCE

CSCwf76535

2

security

Critical CVE in component tomcat. Upgrade to latest version.

CSCwf84197

7

security

Vulnerabilities in openjdk 1.8.0

Detailed list of Resolved Caveats in This Engineering Special

Caveats are ordered by severity then defect number.


Defect Number: CSCwf65121

Component: appd

Severity: 2

Headline: Vulnerabilities for AppD Client JDK on UCCE/PCCE


Symptom:
This product includes a version of Java that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2023-21939,CVE-2022-39399,CVE-2023-21830,CVE-2022-21626,CVE-2023-21835,CVE-2023-21937,CVE-2023-21967,CVE-2023-21843,CVE-2023-21930,CVE-2023-21938,CVE-2023-21968,CVE-2023-21954,CVE-2022-21618,CVE-2022-21619,CVE-2022-21628,CVE-2022-21624 This bug was opened to address the potential impact on this product.

Conditions:
Device with default configuration.

Workaround:
The below workaround is only applicable to the customers who are not using Appdynamics Performance monitoring feature. Step1: Copy script C:\icm\install\UninstallService.vbs to C:\Cisco\AppDynamics\MachineAgent\UninstallService.vbs Step2: From command prompt run -> C:\icm\install\MachineAgentService.bat UninstallService C:\Cisco\AppDynamics\MachineAgent Step3: Delete the folder C:\Cisco\AppDynamics\MachineAgent NOTE: Machine Agent ZIP folder will be there in C:\icm\install, if scan detects zip folder then that also can be deleted.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/. PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 3.1 score. The Base CVSS score as of the time of evaluation is: 7.4 https://sec.cloudapps.cisco.com/security/center/cvssCalculator.x?version=3.1&vector=CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVE ID CVE-2023-21939,CVE-2022-39399,CVE-2023-21830,CVE-2022-21626,CVE-2023-21835,CVE-2023-21937,CVE-2023-21967,CVE-2023-21843,CVE-2023-21930,CVE-2023-21938,CVE-2023-21968,CVE-2023-21954,CVE-2022-21618,CVE-2022-21619,CVE-2022-21628,CVE-2022-21624 have been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html


Defect Number: CSCwf76535

Component: security

Severity: 2

Headline: Critical CVE in component tomcat. Upgrade to latest version.

$$IGNORE-PSIRT
Symptom:
Tomcat Vulnerabilities are seen in CCE machines.

Conditions:
Vulnerabilities are seen in CCE machines where the installed Tomcat version is lesser than 9.0.76

Workaround:
Use the "Tomcat Upgrade Utility" to upgrade Apache Tomcat to 9.0.76

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/

 

Vulnerability observed - CVE-2020-1938


Defect Number: CSCwf84197

Component: security

Severity: 7

Headline: Vulnerabilities in openjdk 1.8.0

$$IGNORE-PSIRT
Symptom:
OpenJDK Vulnerabilities are seen in CCE machines.

Conditions:
Vulnerabilities are seen in CCE machines where CCE_JAVA_HOME environment variable points to a JRE version lesser than 8u372-b07

Workaround:
Upgrade to OpenLogic OpenJDK JRE 8u372-b07 (32 bit) manually.

Further Problem Description:
Additional details about the vulnerabilities listed above can be found at https://www.cve.org/

 

Vulnerabilities observed - CVE-2021-20264, CVE-2022-21248, CVE-2022-21282, CVE-2022-21283, CVE-2022-21293, CVE-2022-21294, CVE-2022-21296, CVE-2022-21299, CVE-2022-21305, CVE-2022-21340, CVE-2022-21341, CVE-2022-21349, CVE-2022-21360, CVE-2022-21365, CVE-2022-21426, CVE-2022-21434, CVE-2022-21443, CVE-2022-21476, CVE-2022-21496, CVE-2022-21540, CVE-2022-21541, CVE-2022-34169, CVE-2023-21968


Obtaining Documentation


You can access current Cisco documentation on the Support pages at the following sites:

Documentation Feedback

To provide comments about this document, send an email message to the following address:

contactcenterproducts_docfeedback@cisco.com

We appreciate your comments.

Obtaining Technical Assistance


Cisco.com is a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC site.

Cisco.com

Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. You can also resolve technical issues with online technical support and download software packages. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.

Technical Assistance Center

The Cisco TAC site is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.

Contacting TAC by Using the Cisco TAC Site

If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to https://www.cisco.com/c/en/us/support/index.html.

P3 and P4 level problems are defined as follows:

In each of the above cases, use the Cisco TAC site to quickly find answers to your questions.

If you cannot resolve your technical issue by using the TAC online resources, Cisco.com registered users can open a case online by using the TAC Case Open tool at the following site: https://mycase.cloudapps.cisco.com/create/start/

Contacting TAC by Telephone

If you have a priority level 1(P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to the following sites:

P1 and P2 level problems are defined as follows: