This is even happening on new software releases, as these attacks are happening using the H323 protocol, nothing on the codec can be done to prevent the attacks without breaking H323. Just like any other time, people are adapting, and trying different methods to exploit organizations networks, this is a prime example, first it was using SIP UDP, now it's using H323 TCP. Best solution is to prevent all incoming IPs from accessing the codec, and only allow specific IPs that you choose.
Btw, a search of the forums would have turned up several discussions on this, each with the same answers as above. Below are just a few of those discussions started within the last two weeks.
I'm not able to access my old voice mail messages all of a sudden. The recording says something like 'the message is currently not available'. This has never happened before in all the years I have been using this system. I have t...
If you have 2 ISR routers, one acting as Failover, do we need to have both the same number of SRST licenses on the 2 routers?
No. You will only need the SRST licenses on the primary router. Because this feature...