This vulnerability has been reported to impact the following OpenSSH versions and configurations:
- OpenSSH versions 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2
- In addition, only applications that directly call the SSL_select_next_proto function with 8 length list of supported client protocols are affected.
Trend Micro Products/Services Potentially Affected
Trend Micro is currently doing an inventory/investigation to see if any Trend Micro products and/or services may be affected by this vulnerability.
Below is the confirmed list of unaffected products. Products not listed may still be under investigation, and any additional information will be added here as necessary.
In our analysis, Trend Micro takes into account the entire scenario necessary to exploit a particular vulnerability in making a determination of whether or not a particular product may be vulnerable to a specific vulnerability. In this case, any flagging by a 3rd party vulnerability scanner on one of the mentioned products that are marked "Not Affected" should be treated as a False Positive.
Trend Micro Product/Service | Status |
---|---|
Cloud One - Endpoint Workload Security (Deep Security Agent) | Not Affected |
Deep Security Agent | Not Affected |