On May 3rd, the OpenSSL published a security advisory detailing a number of vulnerabilities in OpenSSL mostly related to input validation. At least two of them, if aligned properly can lead to third party controlled code execution.
Some versions of ACOS include vulnerable version the OpenSSL library. The vulnerabilities affecting it and which are addressed by this software update are: CVE-2016-2108, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109 and CVE-2016-2176).
The most notable is CVE-2016-2108 which is ranked “high severity” and could potentially expose the device to an underflow and crash, when verifying and re-encoding certificates.
Workarounds and Mitigations
Currently there is no way to mitigate the impact of those.
Software updates resolving this vulnerability will be published at the following URL when available: click here
The following table summarizes update versions resolving all of the above CVEs.
Affected Platforms: ADC, CGN
Affected Software Versions: 4.0.x, 2.7.x, 2.8.x
1. OpenSSL Security Advisory – 2016-05-03: