SSLv3 POODLE Vulnerability

Product Tech Tips Index

Problem:  What should you do to protect yourself against the POODLE vulnerability in SSLv3?

Background:
On October 15, 2014, the POODLE vulnerability in SSLv3 made industry news, as it could be exploited for stealing sensitive data.

Solution:

We are happy to say peace of mind is only one click away on our WebMux Network Traffic Manager products.

If you terminate your SSL/TLS traffic on WebMux, a single click on a check box on the “SSL termination management” screen disallows use of SSLv3 on server farms.

It’s that simple!

Our upcoming versions of WebMux firmware make this setting the default.

WebMux SSL Termination Management Screen:

sslv3_poodle