My security have found this vulnerability for CUCM:
TFTP file detection (Cisco CallManager)
The remote host has a TFTP server installed that is serving one or more Cisco CallManager files.
These files do not themselves include any sensitive information, but do identify the TFTP server as being part of a Cisco CallManager environment. The CCM TFTP server is an essential part of providing VOIP handset functionality, so should not be exposed to unnecessary scrutiny.
Solution: If it is not required, disable or uninstall the TFTP server.
Otherwise restrict access to trusted sources only.
Are you getting this error “Installer User Interface Mode Not Supported. The installer cannot run in this UI mode. To specify the interface mode, use the -i command-line option, followed by the UI mode identifier. The value UI mode identifiers...
The below trick might come handy when you have to add a new node to a cluster but you don't have or is unsure of the security password for the publisher. This procedure has been around for ages.
1) Login into the CLI of the Publisher.