SSLv3 POODLE Vulnerability (CVE-2014-3566) in RSA DCS products
Originally Published: 2014-12-29
Article Number
Applies To
RSA Registration Manager 6.9 build 557 and earlier builds (Windows only)
RSA Certificate Manager 6.8 build 522 and earlier builds (all platforms)
RSA Registration Manager 6.8 build 522 and earlier builds (all platforms)
RSA Validation Manager 3.2 build 200 and earlier builds (Windows only)
RSA Validation Manager 3.1 build 162 and earlier builds (Windows only)
CVE Identifier(s)
Article Summary
Link to Advisories
Alert Impact Explanation
| Product | Steps to disable SSLv3 | |
|---|---|---|
| A) | RSA Certificate Manager 6.9 build 557 and earlier builds (Windows only) | RSA Certificate Manager 6.9 build 557 and earlier, on Windows, allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. Open the following file: INSTALL_DIR/WebServer/conf/httpd.conf 2. Add the following line for virtual hosts of Administration, Enrollment and Renewal Server below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
3. Restart RSA Certificate Manager services NOTE: - SCEP and CRL Servers do not use SSL by default. CMP Enroll and REST Servers, if enabled, use TLSv1 by default. - RSA Certificate Manager 6.9 build 557 and earlier do not support TLS1.2 protocol. |
| B) | RSA Registration Manager 6.9 build 557 and earlier builds (on Windows) | RSA Registration Manager 6.9 build 557 and earlier, on Windows, allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. Open the following file: INSTALL_DIR/WebServer/conf/httpd.conf 2. Add the following line for virtual hosts of Administration, Enrollment and Renewal Server below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
3. Restart RSA Registration Manager services NOTE: - SCEP Server does not use SSL by default. - RSA Registration Manager 6.9 build 557 and earlier do not support TLS1.2 protocol. |
| C) | RSA Certificate Manager 6.8 build 522 and earlier builds (all platforms) | RSA Certificate Manager 6.8 build 522 and earlier allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0 or upgrade to RSA Certificate Manager 6.9 build 557 and update the configuration file to use TLSv1. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. Open the following file: INSTALL_DIR/WebServer/conf/httpd.conf 2. Add the following line for virtual hosts of Administration, Enrollment and Renewal Server below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
3. Restart RSA Certificate Manager services NOTE: - SCEP and CRL Servers do not use SSL by default. - RSA Certificate Manager 6.8 build 522 and earlier do not support TLS1.2 protocol. |
| D) | RSA Registration Manager 6.8 build 522 and earlier builds (all platforms) | RSA Registration Manager 6.8 build 522 and earlier allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0 or Upgrade to RSA Registration Manager 6.9 build 557 and change the configuration file to use TLSv1. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. Open the following file: INSTALL_DIR/WebServer/conf/httpd.conf 2. Add the following line for virtual hosts of Administration, Enrollment and Renewal Server below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
3. Restart RSA Registration Manager services NOTE: - SCEP Server does not use SSL by default. - RSA Registration Manager 6.8 build 522 and earlier do not support TLS1.2 protocol. |
| E) | RSA Validation Manager 3.2 build 200 and earlier builds (on Windows) | RSA Validation Manager v3.2 build 200 and earlier, on Windows, allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. If SSL is enabled for OCSP over HTTPS, open the following file: INSTALL_DIR/ValidationServer/conf/httpd.conf 2. Add the following line in the virtual host section below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
3. Open the following file: INSTALL_DIR/ValidationServer/conf/httpd-ssl 4. Add the following line right after all occurrences of the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3
5. Restart RSA Validation Manager services NOTE: - RSA Validation Manager v3.2 build 200 and earlier do not support TLS1.2 protocol. |
| F) | RSA Validation Manager 3.1 build 162 and earlier builds (on Windows) | RSA Validation Manager v3.1 build 162 and earlier, on Windows, allow the use of SSLv3 with a block cipher with CBC mode of operation. Update the configuration file httpd.conf to use TLSv1 protocol and disallow SSL3.0. The following are the steps to allow TLS1.0 and TLS1.1 protocols: 1. If SSL is enabled for OCSP over HTTPS, open the following file: INSTALL_DIR/ValidationServer/conf/httpd.conf 2. Add the following line in the virtual host section below to the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3 3. Open the following file: INSTALL_DIR/ValidationServer/conf/httpd-ssl 4. Add the following line right after all occurrences of the “SSLCipherSuite” directive: SSLProtocol all -SSLv2 -SSLv3 5. Restart RSA Validation Manager services NOTE: - RSA Validation Manager v3.1 build 162 and earlier do not support TLS1.2 protocol. |
Disclaimer
Related Articles
Administrative Role Settings 14Number of Views Authentication Manager Log Messages (20181-20244) 55Number of Views "The features parameter is not in a valid JSON format" error opening escalation workflow on RSA Governance & Lifecycle 21Number of Views Add a Custom RADIUS User Attribute Definition 41Number of Views RSA Announces the Availability of RSA Governance & Lifecycle 8.0 Patch 10 1Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?