Silver Tail/ Web Threat Detection Poodle vulnerability CVE-2014-3566
Originally Published: 2014-12-02
Article Number
Applies To
RSA Version/Condition: All versions prior to 5.0.1
CVE Identifier(s)
Article Summary
Link to Advisories
Alert Impact
Impacted - Apply RSA Remedy
Alert Impact Explanation
1. Open /var/opt/silvertail/etc/nginx-scoutproxy.conf and /var/opt/silvertail/etc/nginx-siteproxy.conf
2. Search for the following text in the file:
# Restrict ssl_protocols
ssl_protocols SSLv3 TLSv1;
3. Remove the SSLv3 from the ssl_protocols line. There could be multiple occurrences of the ssl_protocols line, make the below change to each occurrence. It should now look like this:
ssl_protocols TLSv1;
4. Save the files and restart each nginx instance. Not all hosts will be running SiteProxy. All hosts will be running ScoutProxy.
sudo /etc/init.d/st-ScoutProxy-<hostname> restart
sudo /etc/init.d/st-SiteProxy-0 restart
Disclaimer
Related Articles
SSLv3 POODLE Vulnerability (CVE-2014-3566) in RSA DCS products 446Number of Views How to remediate the impact of the POODLE vulnerability on RSA Endpoint 234Number of Views Silver Tail/Web Threat Detection How to recover system after disk fills 5Number of Views What are the user access levels in RSA Silver Tail and Web Threat Detection? 27Number of Views Silver Tail Web Threat Detection Download instructions. 43Number of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?