KB Article #177707
Is Transfer CFT vulnerable to POODLE (CVE-2014-3566)?
Problem
Is Transfer CFT vulnerable to POODLE ?
CVE-2014-3566
Resolution
Background:
The OpenSSL POODLE allows an attacker to downgrade the “to be established” cipher suite, for example, from TLS 1.x to SSL 3.0.
To execute the attack, an adversary must take control of the victim’s Internet connection (which triggers a connection failure) and have the ability to run some JavaScript inside the victim’s browser.
The USG CVE rating for the CVE-2014-3566 (aka POODLE) attack is 4.3.
Solution:
Transfer CFT and its GUI Copilot can be set to prohibit the usage of SSL V3
Check the documentation for the below UCONF variables:
cft.ssl.version_min AND copilot.ssl.version_min
Note: Even if SSL V3 is not prohibited for the transfer flows, none of the CFT established sessions can be used to remotely execute a JavaScript.