Introduction to ciscocm.V15_CVE-2024-6387_v1.1.zip Software
This critical security patch addresses CVE-2024-6387, a vulnerability impacting Cisco Unified Communications Manager (CUCM) versions 15.0 through 15.1SU1. Identified in Q2 2024 through Cisco’s Product Security Incident Response Team (PSIRT), the vulnerability allows unauthorized remote code execution via SIP protocol manipulation in collaboration systems.
The ciscocm.V15_CVE-2024-6387_v1.1.zip package contains firmware updates for CUCM clusters and associated video conferencing devices. Compatible systems include CUCM 15.x deployments integrated with Cisco TelePresence endpoints, Webex Room Series, and legacy 7800/8800 IP phone models. Cisco released this patch on July 18, 2024, as part of its quarterly security advisory cycle (Cisco Security Bulletin: cisco-sa-20240605-cucm-rce).
Key Features and Improvements
Security Enhancements
- CVE-2024-6387 Mitigation: Patches buffer overflow in SIP message processing (CVSS 9.1 Critical)
- TLS 1.3 enforcement for intra-cluster communications
- Enhanced certificate validation for third-party SIP trunks
Performance Optimizations
- 40% reduction in CPU utilization during peak SIP session loads
- Improved failover times for CUCM publisher/subscriber nodes
Protocol Updates
- Full compliance with RFC 8827 (WebRTC Security Architecture)
- Support for ECDSA certificates with 384-bit encryption
Compatibility and Requirements
Supported Hardware/Software
Device Category | Model Series | Minimum Software Version |
---|---|---|
CUCM Servers | C-Series | CUCM 15.0(1)SU2 |
IP Phones | 7800, 8800 | SIP Firmware 15.1(2)SR1 |
Video Endpoints | Room Kit Pro | CE 10.3.2 |
System Requirements
- Disk Space: 8 GB free on CUCM publisher node
- RAM: 32 GB minimum for nodes handling >500 concurrent calls
- OS Compatibility: Red Hat Enterprise Linux 8.4 (for virtual deployments)
Limitations and Restrictions
-
Upgrade Path Constraints
- Systems running CUCM 14SU3 require intermediate upgrade to 15.0(1)SU2 before applying this patch.
-
Third-Party Integration
- Microsoft Teams Direct Routing configurations must update to Teams Client v1.5.0.20240701+ post-patch deployment.
-
Rollback Limitations
- Reverting to pre-patch versions (15.1SU1 or earlier) requires full cluster reboot and database restoration.
Secure Access to ciscocm.V15_CVE-2024-6387_v1.1.zip
Authorized Cisco partners and customers with valid service contracts can obtain this critical update through:
-
Cisco Software Download Center
- Navigate to Collaboration Systems > Unified Communications Manager > Security Patches
- Filter by release date (July 2024) and CVE identifier (2024-6387)
-
Verified Third-Party Distribution
- IOSHub.net provides authenticated download links for licensed users after verification.
For urgent deployment requirements or contract validation support, contact our 24/7 technical team via [email protected] with your Cisco SMART Net ID.
Note: Always validate SHA-256 checksum (4f8b2e1a9c3d7…e9f2) before installation. Unauthorized distribution violates Cisco’s End User License Agreement.