{"id":9599,"date":"2022-06-10T09:55:59","date_gmt":"2022-06-10T08:55:59","guid":{"rendered":"https:\/\/www.jemmac.com\/?p=9599"},"modified":"2024-02-13T09:04:43","modified_gmt":"2024-02-13T09:04:43","slug":"opcfailover-v2-5-released","status":"publish","type":"post","link":"https:\/\/www.jemmac.com\/index.php\/products\/opcfailover-v2-5-released\/","title":{"rendered":"OPCFailover V2-5 released"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.jemmac.com\/wp-content\/uploads\/2019\/03\/opcfailover.png\" alt=\"OPCFailover Product Page\" class=\"wp-image-1196\" width=\"394\" height=\"122\" srcset=\"https:\/\/www.jemmac.com\/wp-content\/uploads\/2019\/03\/opcfailover.png 785w, https:\/\/www.jemmac.com\/wp-content\/uploads\/2019\/03\/opcfailover-300x93.png 300w, https:\/\/www.jemmac.com\/wp-content\/uploads\/2019\/03\/opcfailover-768x238.png 768w\" sizes=\"(max-width: 394px) 100vw, 394px\" \/><\/figure><\/div>\n\n\n\n<p>In response to Microsoft\u2019s plan to address Windows DCOM Server Security Feature Bypass (described <a rel=\"noreferrer noopener\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26414\" target=\"_blank\">here<\/a>) Jemmac have released <strong>OPCFailover 2.5.<\/strong><\/p>\n\n\n\n<p>OPCFailover 2.5 specifically uses RPC_C_AUTHN_LEVEL_PKT_INTEGRITY when using CoInitializeSecurity.<\/p>\n\n\n\n<p>If you plan to manually apply DCOM hardening before it is enforced by Microsoft (sometime after March 2023) you should upgrade to OPCFailover 2.5. You will need to be running OPCFailover 2.5 after applying the patch that will enforce DCOM hardening.<\/p>\n\n\n\n<p> For more information, contact:<\/p>\n\n\n\n<p><strong>Mark Fisher<\/strong><br>OPCFailover Product Manager<br>Jemmac Software Limited.<br>Tel : 01234 757251<br>Email :&nbsp;<a href=\"mailto:mark.fisher@jemmac.com\">mark.fisher@jemmac.com<\/a><\/p>\n\n\n\n<p>For more details about  OPCFailover, see the&nbsp;<a href=\"https:\/\/www.jemmac.com\/index.php\/opcfailover\/\" target=\"_blank\" rel=\"noreferrer noopener\">Product<\/a>&nbsp;page for it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In response to Microsoft\u2019s plan to address Windows DCOM Server Security Feature Bypass (described here) Jemmac have released OPCFailover 2.5.<\/p>\n","protected":false},"author":5,"featured_media":6526,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"_links":{"self":[{"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/posts\/9599"}],"collection":[{"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/comments?post=9599"}],"version-history":[{"count":11,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/posts\/9599\/revisions"}],"predecessor-version":[{"id":9612,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/posts\/9599\/revisions\/9612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/media\/6526"}],"wp:attachment":[{"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/media?parent=9599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/categories?post=9599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jemmac.com\/index.php\/wp-json\/wp\/v2\/tags?post=9599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}