<div dir="ltr">Hi,<div><i><font face="monospace"><br></font></i></div><div><span style="color:rgb(51,51,51)"><i style=""><font face="monospace" style="">Check Point researchers have discovered a vulnerability in the ITU T.30 fax protocol that could be hacked to launch a cyberattack and gain access to a network.</font></i></span><br></div><div><br></div><div><a href="https://www.healthcareitnews.com/news/fax-machines-can-be-hacked-breach-network-using-only-its-number">https://www.healthcareitnews.com/news/fax-machines-can-be-hacked-breach-network-using-only-its-number</a><br></div><div><br></div><div><div>The phrase above indicates a flaw in the T.30 protocol itself and not in particular implementations.</div><div></div></div><div>This is from 2018. </div><div>I don't remember reading anything about this in the fs mailing list.</div><div><br></div><div>Was freeswitch/spandsp audited to ensure application rxfax is safe?</div><div><br></div><div><a href="https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/">https://blog.checkpoint.com/2018/08/12/faxploit-hp-printer-fax-exploit/</a><br></div><div><br></div><div><br></div></div>