Dear valued Sippy Customer, A recent exploit listed as CVE-2021-44228 was made public less than a week ago from the date of this topic. This exploit impacts Apache Log4j versions 2.0-beta9 to 184.108.40.206. This security vulnerability has some serious implications because it is easy to trigger and can be used to perform remote code execution in vulnerable systems allowing an attacker to gain full control of them. This utility is also very commonly used in a wide range of applications and of great concern to system administrators.
Dear valued Sippy Customer, A security vulnerability was reported in a third party module used in our Softswitch. SER is used to handle SIP signalling and has been fixed by their maintainers. This Fix is now incorporated in all our production versions. This security vulnerability leave Switch Operators vulnerable to SIP header injection attacks. In their worst case scenarios the vulnerability could allow for toll fraud, caller-id spoofing and authentication bypass.