skip to Main Content

New OpenSSL vulnerability: NoTouch is NOT affected (CVE-2015-1793)

Today, July 9th, 2015 an OpenSSL vulnerability was disclosed: CVE-2015-1793. NoTouch is not affected.

An error in the implementation of the alternative certificate chain logic could allow an attacker to cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and “issue” an invalid certificate. However, this bug was introduced in OpenSSL 1.0.1n, whereas both NoTouch OS as well as the Stratodesk Virtual Appliance use an improved version of 1.0.1f.

Thus, there is nothing to do and no update or patch is necessary.

New OpenSSL vulnerability: NoTouch is NOT affected (CVE-2015-1793)

Today, July 9th, 2015 an OpenSSL vulnerability was disclosed: CVE-2015-1793. NoTouch is not affected.

An error in the implementation of the alternative certificate chain logic could allow an attacker to cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and “issue” an invalid certificate. However, this bug was introduced in OpenSSL 1.0.1n, whereas both NoTouch OS as well as the Stratodesk Virtual Appliance use an improved version of 1.0.1f.

Thus, there is nothing to do and no update or patch is necessary.

Endpoint Security and Network Monitoring News for the Week of August 26; Updates from Contrast Security, Tanium, NordLayer, and More | #cybersecurity | #cyberattack

Stratodesk Achieves VMware Ready Status for 12 Consecutive Years Stratodesk, an endpoint security solutions provider,…

Read more

Subscribe to our newsletter:

Back To Top
X