THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
01-Oct-20 |
Initial Release |
2.0 |
01-Oct-20 |
Updated workaround section to include table |
Affected OS Type | Affected Software Product | Affected Release | Affected Release Number | Comments |
---|---|---|---|---|
NON-IOS |
Unified Communications Manager Updates |
UCM |
12.0(1)SU1, 12.0(1)SU2, 12.0(1)SU3, 12.5(1), 12.5(1)SU1, 12.5(1)SU2 |
|
NON-IOS |
Unified Communications Manager / Cisco Unity Connection Updates |
UCM |
11.5(1), 11.5(1)SU1, 11.5(1)SU2, 11.5(1)SU3, 11.5(1)SU3a, 11.5(1)SU3b, 11.5(1)SU4, 11.5(1)SU5, 11.5(1)SU6, 11.5(1)SU7, 11.5(1)SU8, 12.0(1), 12.0(2) |
|
NON-IOS |
Unified Communications Manager / Cisco Unity Connection Updates |
UCM v11 |
11.0, 11.0(1), 11.0(1a), 11.0(1a)SU1, 11.0(1a)SU2, 11.0(1a)SU3, 11.0(1a)SU3a, 11.0(1a)SU4 |
|
NON-IOS |
Unified Communications Manager / Cisco Unity Connection Updates |
UCM v10 |
10.0(1), 10.0(1)SU1, 10.0(1)SU2, 10.5(1), 10.5(1)SU1, 10.5(1)SU1a, 10.5(2), 10.5(2)SU1, 10.5(2)SU10, 10.5(2)SU2, 10.5(2)SU2a, 10.5(2)SU3, 10.5(2)SU3a, 10.5(2)SU4, 10.5(2)SU4a, 10.5(2)SU5, 10.5(2)SU6, 10.5(2)SU6a, 10.5(2)SU7, 10.5(2)SU8, 10.5(2)SU9 |
Defect ID | Headline |
---|---|
CSCvv13565 | Secure endpoints may fail to register after a refresh upgrade to CUCM 12.5 |
Endpoints in secure mode might fail to register after a refresh upgrade to Cisco Unified Communications Manager (Unified CM) Version 12.5(1) (running in mixed mode) due to a mismatch in the signer of the Identity Trust List (ITL) and Certificate Trust List (CTL) files on the Unified CM server and on the endpoints. This applies to all customers who have already performed a refresh upgrade from or who plan to upgrade to Unified CM Version 12.5(1).
Note: Clusters that run in non-secure mode or use USB eTokens are not affected by this issue and no further action is needed. Though endpoints other than IP phones are not affected, it is strongly recommended to apply the workaround before an upgrade to Version 12.5(1)SU3.
The CTL file has two root anchors for trust verification: the ITLRecovery certificate and the CallManager certificate. Additionally, an update to the CTL file when certificates are regenerated can only be completed manually by an administrator. Since the ITLRecovery certificate is incorrectly regenerated during the refresh upgrade, when the server is switched to the new Unified CM version the CTL file will only have the CallManager certificate as a valid root anchor until it is updated with the new ITLRecovery certificate.
Note: If the CallManager certificate is also regenerated before the CTL file is updated with the new ITLRecovery certificate, the CTL file will no longer have any valid root anchors for trust verification. It will need to be manually deleted from the endpoint before a new CTL file will be accepted.
Endpoints in secure mode might not be able to register to Unified CM Version 12.5(1) that runs in mixed mode after a refresh upgrade.
Another symptom is that endpoints display authentication errors when trying to connect to secure URLs, such as Corporate Directory or Phone Services. These errors are a sign that there is a problem with the ITL file on the endpoint.
Workaround:
Customers who have upgraded from CUCM 11.X or 12.0.X to any CUCM 12.5 version prior to 12.5(1)SU3 should take the steps below to ensure that the CTLFile has the correct ITLRecovery certificate:
CAUTION: If you have upgraded from an earlier CUCM version to any CUCM 12.5(1) version prior to 12.5(1)SU3, do not regenerate the CallManager certificate until you have performed the workaround steps listed below.
NOTE: If a mixed-mode cluster has previously been upgraded from a pre-12.5 CUCM release to any 12.5(1) version lower than 12.5(1)SU3, upgrading to 12.5(1)SU3 will not correct this issue. The workaround must still be performed to ensure that the CTLFile has the correct ITLRecovery certificate
1. Update the ITLRecovery certificate in the CTLFile by running the following command from the admin cli on the Publisher (NOTE: After running this command, the CTLFile will be signed by the CallManager certificate instead of the ITLRecovery certificate):
utils ctl reset localkey
2. After the command completes, restart the Cisco CallManager and Cisco CTIManager services on all nodes. Once the services are back up, restart the endpoints to ensure that they get the new CTLFile.
3. Verify on an endpoint that the new CTLFile has been installed, by comparing the serial number on the endpoint (under Admin Settings – Security Setup – CTL) with the serial number returned from the “show ctl” CLI command on the TFTP server.
4. Update the CTLFile so that it will be signed by the new ITLRecovery certificate instead of the CallManager certificate (this is recommended as the ITLRecovery certificate has a 20 year expiration) by running the following command on the Publisher:
utils ctl update CTLFile
5. After the command completes, restart the Cisco CallManager and Cisco CTIManager services on all nodes. Once the services are back up, restart the endpoints to ensure that they get the new CTLFile.
6. Verify on an endpoint that the new CTLFile has been installed, by comparing the serial number on the endpoint (under Admin Settings – Security Setup – CTL) with the serial number returned from the “show ctl” CLI command on the TFTP server.
For more information about CTL files, see “Security Guide for Cisco Unified Communications Manager, Release 12.5(1)”
Solution:
CSCvv13565 is resolved in CUCM 12.5(1)SU3 (12.5.1.13900-152). The fix ensures that the ITLRecovery certificate is not regenerated during the refresh upgrade from versions prior to CUCM 12.5(x). Customers using CUCM clusters in mixed-mode and who wish to upgrade to CUCM 12.5 from CUCM 12.0 or earlier should upgrade directly to CUCM 12.5(1)SU3 or higher to avoid hitting this issue.
Table 1: Recommended Migration Path
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
My Notifications—Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.
Unleash the Power of TAC's Virtual Assistance