Avaya has patches for critical internet facing components for Remote Worker including ASBCE 8.1.3, AADS 8.1.4.1 (new binary), and Session Manager 8.1.3 (although I've asked about proof on this one).
I would not run remote worker without the patches in place. I have been seeing hacking attempts from Russia, the Ukraine, and Germany(a redirect from Russia) over the past 2 weeks. I expect US based hosted solution provider attacks are also happening. I would also strongly suggest eliminating any outbound internet capability from AADS and Session Manager at this time.
Just making sure everybody saw that Avaya released a V2 of the log4j patches around 12/22. Looks like they may have missed something in their 1st attempt at a patch.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.