<div dir="ltr"><div>Pls check out section 1.2.1 on page 8:<br><a href="https://www.isecpartners.com/media/11979/isec_dwivedi_lackey_voip_bh07.pdf">https://www.isecpartners.com/media/11979/isec_dwivedi_lackey_voip_bh07.pdf</a><br>
<br></div>Is asterisk currently vulnerable to this type of attack?<br></div>