• We’re here to help

    Our friendly and approachable team of StingRay specialists are always on hand to answer your questions. Please don't hesitate to give us a call or email us.
  • open panel

StingRay and POODLE SSLv3 Vulnerability

On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed. This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker to read information encrypted with this version of the protocol in plain text using a man-in-the-middle attack.

By default StingRay has the SSLv3 protocol enabled but the vulnerability is only applicable if the StingRay’s external web interface is enabled and is set to use https functionality.

If your StingRay is effected please contact technical support and provide the external URL effected via the email address below, so an engineer can book a convenient time to make changes to your server…

The Pro2col support email address is support@pro2colgroup.com. For any further information or queries please contact Pro2col sales team here.

© 2012 Hermstedt StingRay
Powered by Pro2col Ltd