1
Mitel Software Applications / Re: AWC under attack
« on: February 21, 2022, 12:00:55 PM »
Hi Monkeytail,
I really appreciate this. I downloaded and applied the patches from the KMS articles. It was clear what Mitel did. The new binaries only listen on the loopback interface (127.0.0.1) and not on the LAN or WAN ones.
For example, before:
# netstat -aupn | grep 10070
udp 0 0 0.0.0.0:10070 0.0.0.0:* 22044/muxer
and after the patch:
# netstat -aupn | grep 10070
udp 0 0 127.0.0.1:10070 0.0.0.0:* 6108/muxer
Thanks!
I really appreciate this. I downloaded and applied the patches from the KMS articles. It was clear what Mitel did. The new binaries only listen on the loopback interface (127.0.0.1) and not on the LAN or WAN ones.
For example, before:
# netstat -aupn | grep 10070
udp 0 0 0.0.0.0:10070 0.0.0.0:* 22044/muxer
and after the patch:
# netstat -aupn | grep 10070
udp 0 0 127.0.0.1:10070 0.0.0.0:* 6108/muxer
Thanks!