Indeni’s response to the critical OpenSSL vulnerability

OpenSSL is one of the most widely used open-source libraries worldwide. On October 26th, the OpenSSL Project team announced a new critical vulnerability in versions 3.0 and above. It is likely to affect common configurations and be exploitable. 

Although OpenSSL v3 is the newer version, it is still significantly less prevalent than OpenSSL v1, which is not impacted by this vulnerability. The Indeni product is running the maintained Long Term Support version (the 1.1.1 series). This version is supported until September 11, 2023. 

Thankfully, that’s one less server you need to patch. If you have additional questions related to the OpenSSL vulnerability, please do not hesitate to contact us. 


An avatar of the author

Ulrica de Fort-Menares is the Vice President of Product Management for Infrastructure Assurance.

Related content

Get insight into your DDI environment with Live DDI Analytics

Enroll in our technology preview today to use the Live DDI Analytics tool to get real-time reports and analysis for your DDI environment.

Read more

Three business-focused reasons to embrace Unified DDI

Discover with BlueCat how cost optimization, risk reduction, and accelerated digital transformation offer three reasons to adopt Unified DDI.

Read more

Enhance RBAC for Microsoft DNS and DHCP servers with Micetro

Learn how easy it is to implement enhanced role-based access controls for Microsoft DNS and DHCP server environments with Micetro.

Read more

Micetro 11.1 boosts DHCP management for Cisco Meraki SD-WAN

Learn how BlueCat Micetro 11.1 can help you overcome the limitations of Cisco Meraki SD-WAN devices to manage your distributed DHCP architecture.

Read more