April 25th, 2019
A vulnerability, CVE-2018-5743 was found in 3rd party software running on our DNS/DHCP appliance.
A defect in BIND's handling the number of TCP clients could allow an attacker to grow the number of simultaneous connections beyond the limit, which would result in unexpected and unreliable behavior.
For more information, see https://kb.isc.org/docs/cve-2018-5743.
We recommend that all Men & Mice DNS/DHCP Appliances are upgraded to the latest version, either 9.1.11 or 9.2.2.
The appliances can be easily upgraded using the Automatic Updates feature of the Men & Mice Suite.
For details on how to update the Men & Mice Suite, see
For more information regarding the upgrade, contact Men & Mice Support using the link below
September 20th, 2018
This is an critical operational announcement from Men & Mice.