Release Notes
Resolved issues
Cisco TelePresence Conductor Release Notes (XC2.3.1) Page 12 of 21
Identifier Description
CSCui21923 The Cisco TelePresence Conductor with Cisco Unified Communications Manager Deployment
Guide (XC2.1) detailed steps on how to upload a self-signed server certificate to TelePresence
Conductor. Because Unified CM may not support the default TelePresence Conductor server
certificate the recommendation has been changed to use an officially signed server certificate
instead.
CSCuh15866 MCU 4501 running 4.4(3.49) experienced high CPUload when connected to TelePresence
Conductor via HTTPS. There were no issues when connected via HTTP. This has been fixed in
XC2.2.
CSCug88040 When configuring TelePresence Conductor according to "Cisco TelePresence Conductor with
Cisco VCS (B2BUA) Deployment Guide", with the neighbor zone profile set to "Infrastructure
device" and with a TelePresence Conductor cluster, VCS still routed conference calls to any Out
Of Service TelePresence Conductors causing call failure. The deployment guide has been
modified to recommend a neighbor zone profile setting of "Custom" with "Automatically respond
to SIP searches" set to "On", which will avoid these issues.
CSCue71379 The TelePresence Conductor B2BUA deployment needed to pass through max-rcmd-nalu-size in
the SDP for H.264 in order to support the CTS 10bears codec as it advertised H.264 restricted
pack mode 1.This issue has been fixed in XC2.2.
Resolved in XC2.1
There are no issues that were resolved in XC2.1.
Resolved in XC2.0.3
The following issues were found in previous releases and were resolved in XC2.0.3:
Identifier Description
CSCuo20306 Symptom: Cisco Telepresence Conductor includes a version of openssl that is affected by the
vulnerability identified by the Common Vulnerability and Exposures (CVE) ID CVE-2014-0160.
This bug has been opened to address the potential impact on this product.
Conditions: Device with default configuration. The following Cisco Telepresence Conductor
versions are affected by this vulnerability: XC2.0 XC2.1 XC2.2 XC2.2.1
Workaround: Not currently available.
Further Problem Description: Additional details about this vulnerability can be found at
http://cve.mitre.org/cve/cve.html
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are 5/5:
https://intellishield.cisco.com/security/alertmanager/cvss?target=new&version=2.0&vector=
AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:C The Cisco PSIRT has assigned this score based on
information obtained from multiple sources. This includes the CVSS score assigned by the third-
party vendor when available. The CVSS score assigned may not reflect the actual impact on the
Cisco Product. CVE-2014-0160 has been assigned to document this issue. Additional
information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Resolved in XC2.0.2
The following issues were found in previous releases and were resolved in XC2.0.2: