03-12-2025 09:46 PM
We are experiencing a vulnerability in the CUCM environment where this URL “https://cucm ip /cucm-uds/users” provides access to all directory user information details, which is a significant security breach.
I would like to find a way to block access to this without impacting Cisco Jabber functionality, as Jabber users should still be able to access UDS.
Any other advice to secure without impacting other functions
03-13-2025 12:48 AM
Not sure if you can do that, but if you could do it in some external system, like an IDS or Firewall in-between the clients and the CM system the UDS discovery that is done during the service discovery for Jabber and Webex is using this url https://<CM FQDN>/cucm-uds/clusterUser?username=<USER NAME>. So if you can manage to block just https://<CM FQDN>/cucm-uds/user then it could be possible. I guess you'd just need to try it and see if it works or not as very likely this has not been a topic discussed here before.
03-13-2025 02:58 PM - edited 03-13-2025 10:09 PM
.
03-13-2025 10:29 PM
Thank you @Roger Kallberg
03-14-2025 03:51 PM
See Contact Search Authentication in the CUCM Security Guide. It's not enabled by default because older IP Phones don't support it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide