A critical vulnerability nicknamed “Heartbleed” was discovered in OpenSSL, the most popular SSL module used on Linux / cPanel servers. This exploit allows a third party to steal information that would otherwise be secured and encrypted with the SSL/TLS protocol, and to steal the private keys from the certificate pair itself.
Here’s a great site where you can learn more about the vulnerability: heartbleed.com
We’ve implemented updates in all areas where our systems were using affected versions of OpenSSL, and we are following best practices. We have also re-keyed all certificates on our web servers.
- This is not a vulnerability with SSL/TLS or SSLs.com.
- SSL/TLS is not broken, nor are the digital certificates issued by Comodo (now Sectigo) through SSLs.com.
- Users of OpenSSL versions 1.0.1 through 1.0.1f with the heartbeat extension enabled are affected.
- OpenSSL version 1.0.1g addresses the vulnerability, as well as OpenSSL instances compiled without the heartbeat extension.
How does this impact SSLs.com customers?
SSL Certificate customers
First of all, if you are not using OpenSSL on your servers, you are not affected.
If you do use OpenSSL, we strongly advise the following:
- Identify which servers are running OpenSSL (versions 1.0.1 through 1.0.1f are affected).
- Update to the latest patched version of the software (1.0.1g), or recompile OpenSSL without the heartbeat extension, if applicable.
- Reissue any SSL certificates on affected web servers after moving to a patched version of OpenSSL.
- Test your SSL installations.
- Revoke any certificates that were replaced. Please revoke AFTER the reissue has been completed and you have successfully installed it on your web server.
- Consider resetting end-user passwords that may have been visible in a compromised server memory.
- Always refer back to this KB Article for more information.
How to Reissue and Revoke Certificates with SSLs.com
Once the certificate is reissued and successfully installed, the original certificate (the one that could be stolen) must be revoked, so that attackers can’t use it to impersonate you.
In order to have any Comodo (now Sectigo) certificate reissued, please submit a ticket with revocation request to our “SSLs.com - Support” team, here: https://support.cheapssl.com/index.php?/cheapssl/Tickets/Submit.
(Note: We performed manual revocation of all certificates reissued between April 7-10, 2015. After April 10, we perform revocations based on ticket support requests only.)