Asterisk 1.8.28-cert2,, 11.6-cert7, 11.13.1, 12.6.1, 13.0.0-beta3 Now Available (Security Release)

The Asterisk Development Team has announced security releases for Certified Asterisk 1.8.28 and 11.6 and Asterisk 1.8, 11, 12, and 13. The available security releases are released as versions 1.8.28-cert2, 11.6-cert7,, 11.13.1, 12.6.1, and 13.0.0-beta3.

These releases are available for immediate download at

The release of these versions resolves the following security vulnerability:

  • AST-2014-011: Asterisk Susceptibility to POODLE Vulnerability
    Asterisk is susceptible to the POODLE vulnerability in two ways:

    1. The res_jabber and res_xmpp module both use SSLv3 exclusively for their encrypted connections.
    2. The core TLS handling in Asterisk, which is used by the chan_sip channel driver, Asterisk Manager Interface (AMI), and Asterisk HTTP Server, by default allow a TLS connection to fallback to SSLv3. This allows for a MITM to potentially force a connection to fallback to SSLv3, exposing it to the POODLE vulnerability.

These issues have been resolved in the versions released in conjunction with this security advisory. For more information about the details of this vulnerability, please read security advisory AST-2014-011, which was released at the same time as this announcement.

For a full list of changes in the current releases, please see the ChangeLogs:

The security advisory is available at:

Thank you for your continued support of Asterisk!

What can we help you find?