THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
01-Mar-22 |
Initial Release |
Affected Product ID | Comments |
---|---|
CP-8831-3PCC-K9= |
|
CP-8831-BASE-3PCC |
|
CP-8831-BASE-3PCCR |
|
CP-8831-3PCC-R-K9= |
|
CP-8831-3PB-S-JP= |
Part Alternate |
CP-8831-3PB-S-LA |
|
CP-8831-3P-LA-K9= |
|
CP-8831-3PB-S-BR= |
Part Alternate |
CP-8831-3PD-EU-K9= |
|
CP-8831-3PB-S-TW |
|
CP-8831-3PB-S-EU= |
|
CP-8831-3P-J-K9= |
|
CP-8831-3PB-S-TW= |
|
CP-8831-3PD-TW-K9= |
|
CP-8831-3P-TW-K9= |
|
CP-8831-3PB-S-EU |
|
CP-8831-3PB-S-LA= |
Part Alternate |
CP-8831-3PB-S-JP |
|
CP-8831-3PD-J-K9= |
|
CP-8831-3PD-K9= |
|
CP-8831-3PB-S-BR |
|
CP-8831-3PB-S-JP= |
|
CP-8831-3P-BR-K9= |
Part Alternate |
CP-8831-3PD-LA-K9= |
|
CP-8831-3P-EU-K9= |
|
CP-8831-BASE-3PCC= |
|
CP-8831-3PD-BR-K9= |
|
CP-8831-3PB-S-JP |
Defect ID | Headline |
---|---|
CSCvx00523 | QuoVadis root CA decommission on 3pcc-beignet |
For affected versions of the CP-8831 series phone, some Secure Sockets Layer (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before March 31, 2021 cannot be renewed from this CA. Once those certificates expire on devices or are removed from the Cisco cloud servers, functions such as Session Initiation Protocol (SIP) and HTTPS connections will fail to establish.
The QuoVadis Root CA 2 Public Key Infrastructure (PKI) used by CP-8831 series phones to issue SSL certificates is subject to an industry-wide issue that affects revocation abilities. Due to this issue, no new QuoVadis Root CA 2 certificates will be issued or renewed by Cisco after March 31, 2021. This affects certificate renewals on devices, Cisco cloud servers, and third-party services.
Certificates issued before the QuoVadis Root CA 2 was decommissioned will continue to be valid. However, the certificates will not renew when they expire on either the device or the Cisco cloud server. This will cause functions such as SIP and HTTPS connections to fail to establish.
Expiration of the QuoVadis Root CA 2 certificates affects SIP or HTTPS communications and will cause handshakes to fail. Phones might not be provisioned and/or negotiate SIP security, and other security related features (not SIP related) might not work.
Cisco has migrated from the QuoVadis Root CA 2 to the IdenTrust Commercial Root CA 1 for SSL certificates.
Unfortunately there is no workaround and no software upgrade available due to the end of software support (see EOL notice 12400). Cisco recommends migration to a device that is supported. The Cisco account team or reseller can help to understand what kind of options are available.
Cisco has created a web page to provide customers and partners with additional information on this issue. Consult the QuoVadis Root CA 2 Decommission page for a full list of products affected, associated Field Notices, and frequently asked questions.
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
My Notifications—Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.
Unleash the Power of TAC's Virtual Assistance