OpenSSL has provided a patch for CVE-2015-0204 in January. Apple is reportedly deploying a patch for both mobile devices and computers.
Trend Micro recommends Android users to refrain from using the default Android browser in their devices. Instead, customers are advised to use Google Chrome app as it is not affected by the bug. Furthermore, connections to the Google search site are not affected.
Trend Micro has some solutions that already provide protection against this vulnerability:
- Trend Micro Deep Security protects users from this vulnerability through the following DPI rule:
OpenSSL RSA Downgrade Vulnerability (CVE-2015-0204)
- For Servers: Deep Packet Inspection (DPI) Rules 1006561 and 1006562
- For Clients: Deep Packet Inspection (DPI) Rule 1006485
- Deep Security rule DSRU15-008
- Businesses running websites and other server applications using export grade ciphers should upgrade their systems and upgrade to the latest OpenSSL.
Trend Micro is currently investigating all products known to use this version of OpenSSL and will update the list of products affected as they become available. Customers and partners who may need additional information or have questions are encouraged to contact their authorized Trend Micro representatives.
Products that are not affected:
| Products |
|---|
| Deep Discovery Analyzer |
| Deep Discovery Email Inspector |
| Deep Security |
| Interscan Messaging Security Virtual Appliance |
| Interscan Web Security Suite |
| Interscan Web Security Virtual Appliance |
| Trend Micro Mobile Security for Enterprise |
| Trend Micro Security for Mac |
| Trend Micro Smart Protection Server |
| Worry Free Business Security Services |
Reference:
Trend Micro Security Intelligence Blog - FREAK Vulnerability Forces Weaker Encryption
