Update released responding to Apache Tomcat Vulnerability

 

A critical vulnerability named Ghostcat was recently discovered that can allow hackers to take over unpatched systems.

Responding to this report, we updated our version software to address the matter. Please follow the instructions below to assess and address your vulnerability.
 
 
Users who may be impacted by Ghostcat:

• Server where Brekeke software installation can be accessed from outside local network
• AJP/13 connector port is set to open

 

Actions to take:

• Block any external access to the AJP/13 connector port; or
• Update web server by following instructions found at the link here:
https://docs.brekeke.com/sip/update-web-server

 

More details about Apache Tomcat for Ghostcat vulnerability:

https://nvd.nist.gov/vuln/detail/CVE-2020-1938

 

System requirements information for Brekeke SIP Server and Brekeke PBX:

https://docs.brekeke.com/sip/environments-brekeke-sip-server-runs-on
https://docs.brekeke.com/pbx/system-requirement

 

Additional updates for Windows users of v3.9.5.8

We now support AdoptOpenJDK Java besides Oracle’s Java. The AdoptOpenJDK support is added to our installer program for Windows OS, allowing easy installation.

Download the latest version>>

 

Question? Contact us now! >>