Views:

OpenSSL has provided a patch for CVE-2015-0204 in January. Apple is reportedly deploying a patch for both mobile devices and computers.

Trend Micro recommends Android users to refrain from using the default Android browser in their devices. Instead, customers are advised to use Google Chrome app as it is not affected by the bug. Furthermore, connections to the Google search site are not affected.

Trend Micro has some solutions that already provide protection against this vulnerability:

  • Trend Micro Deep Security protects users from this vulnerability through the following DPI rule:

    OpenSSL RSA Downgrade Vulnerability (CVE-2015-0204)

  • For Servers: Deep Packet Inspection (DPI) Rules 1006561 and 1006562
  • For Clients: Deep Packet Inspection (DPI) Rule 1006485
  • Deep Security rule DSRU15-008
  • Businesses running websites and other server applications using export grade ciphers should upgrade their systems and upgrade to the latest OpenSSL.

Trend Micro is currently investigating all products known to use this version of OpenSSL and will update the list of products affected as they become available. Customers and partners who may need additional information or have questions are encouraged to contact their authorized Trend Micro representatives.

Products that are not affected:

Products
Deep Discovery Analyzer
Deep Discovery Email Inspector
Deep Security
Interscan Messaging Security Virtual Appliance
Interscan Web Security Suite
Interscan Web Security Virtual Appliance
Trend Micro Mobile Security for Enterprise
Trend Micro Security for Mac
Trend Micro Smart Protection Server
Worry Free Business Security Services

Reference:

Trend Micro Security Intelligence Blog - FREAK Vulnerability Forces Weaker Encryption