Array Networks unaffected by OpenSSL Heartbleed vulnerability | Array Networks unaffected by OpenSSL Heartbleed vulnerability -
array

Array Networks unaffected by OpenSSL Heartbleed vulnerability

: Tuesday, July 01 - 2014 @ 10:59

Array Networks Inc., a global leader in application delivery networking, announced that Array Networks products are not exposed to the OpenSSL Heartbleed vulnerability. Unlike hardware and software vendors who have integrated OpenSSL into their core product and service offerings, Array is unaffected because the company uses a proprietary SSL stack to process SSL, TLS and DTLS service traffic.

As described on the Common Vulnerabilities and Exposures Website, the TLS and DTLS implementations in OpenSSL 1.0.1, before 1.0.1g, do not properly handle Heartbeat Extension packets which allow remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Array products – including APV, vAPV, AG, vxAG and EOS products (TMX, SPX) – use the company’s proprietary SSL stack to process all SSL, TLS and DTLS service traffic. Therefore, service traffic on Array products is not affected by this OpenSSL Heartbleed vulnerability.

In addition, Array products only have limited usage of OpenSSL for WebUI and SSH management. The versions of OpenSSL used by Array products are not affected by the OpenSSL Heartbleed vulnerability so management traffic on Array products is not affected by the vulnerability either.

Not only is Array’s proprietary SSL implementation less vulnerable to exposure, it also delivers additional significant advantages to customers. For businesses requiring 2048-bit or 4096-bit SSL acceleration, Array supports industry-leading scalability and performance on every entry-level, mid-range and high-end appliance. Moreover, every Array appliance delivers the lowest cost $/SSL TPS on the market, bar none, and provides an unmatched set of high-performance SSL and certificate handling features.

“As a leader in SSL acceleration and SSL VPN, we are happy to report that Array is not affected by this recent OpenSSL vulnerability.” said S.Vege, Regional Manager – ME & SEA, Array Networks. “Enterprises and government in the Middle East have greatly been impacted by the HeartBleed bug. The time and attention we pay to creating our own implementations not only deliver superior performance, scalability and economics for customers that transact business on the Web, it also ensures that customers are not exposed to vulnerabilities that so often arise from use of open technologies.”

Press Contact:
PR Consultant – Array Networks, Middle East
T: +971 50 346 6098
E: [email protected]

Today's Top Stories

Posted by

Tuesday, July 1- 2014 @ 10:59 UAE local time (GMT+4) Replication or redistribution in whole or in part is expressly prohibited without the prior written consent of Mediaquest FZ LLC.

AME Info Services







Business DirectoryVIEW ALL

Search by name

Search by industry

Browse alphabetically





JobsVIEW ALL

Search for jobs

Latest Jobs