ā03-31-2009 02:04 AM - edited ā03-15-2019 05:11 PM
Hello
Here is post
http://www.vulnerabilityscanning.com/TFTP-file-detection-Cisco-CallManager--Test_19507.htm
My security says that this is risk vulnerability and I should minimize it. How I can minimize this vulnerability?
Thank you!
ā03-31-2009 06:08 AM
Can any body answer for this question?
Is this vulnerability high or this is OK frim security side?
ā12-24-2021 04:16 AM - edited ā12-24-2021 04:20 AM
Hello, all.
Have you finally found solution how to fix "Cisco CallManager tftp Accessible Vulnerability"? If yes, please share fix procedure. Thanks.
ā12-24-2021 06:20 AM
That forum post is jumbled nonsense on a page full of ads, I would not give it a lot of merit.
The UCM runs TFTP services for devices to obtain configurations, firmware, ringtones, and other support files.
I would refer to the security guide for the version of the product you're running, and the SRND/PA for overall architecture considerations with regard to system security.
The guide for 12.5SU5 linked below:
Basic principles apply. Don't run the services if you're not using them, and place appropriate access controls such as a firewall or other network boundary between the UCM and networks that do not require access.
ā02-03-2022 05:08 AM
Hi, Adam.
Thanks for info. I have CUCM 11.5 Unrestricted and based on security guide i have no options to enable TFTP secure for protect phone configuration xml.sgn files (no cryptography in Unrestricted releases + phones pull their configuration in unencrypted form, without authentication from a TFTP server).
Trying get alternate methods to allow Cisco phone download \store configurations from CUCM TFTP Server in secure methods ( Secure TFTP or etc).
There are a few articles describes that CUCM store phone configuration files as plain text xml.cfg files and any user inside network may check it and potentially change.
Need mitigate \close such Cisco Call Manager tftp Accessible Vulnerability risk.
ā02-03-2022 08:18 AM
ā12-01-2021 09:45 PM
These files do not themselves include any sensitive information, but do identify the TFTP server as being part of a Cisco CallManager environment. The CCM TFTP server is an essential part of providing VOIP handset functionality, so should not be exposed to unnecessary scrutiny.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide