Anyone having to address the WanaCry vulnerability on CallPilot? We're patched current through Hotfix SECPEP018S. I see no recourse for correction on a CallPilot server short of unplugging from the CLAN. Anyone seen an official statement from Avaya?
So we have a big escalation on it, I have patched with KB4012598 on our Lab server and rebooted seems fine. I will be adding it to production servers tomorrow. I will come back if there are any issues, the patch from Microsoft wasn't put out until March so it would not be in SEC PEP 18. Like you say no mention on Avaya website for CP.
We have also patched all of our production servers including servers integrated with AACC and have had no issues. We were also instructed by our Data Security department to add a registry value of SMB1 and set it to disabled. The path for this value is:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters
Registry entry: SMB1
REG_DWORD: 0 = Disabled
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.