You are here
Documentation
- InfinityOne Omnichannel (Beta)
- InfinityOne
- Infinity Video Server (Beta)
- InfinityOne Work at Home
- Galaxy Mini
- Galaxy Mini - Table of Contents
- Galaxy Mini - Overview
- Galaxy Mini - Server Hardware
- Galaxy Mini - Supported Phones and Devices
- Galaxy Mini - Front and Rear Panel Interfaces
- Galaxy Mini - FXO/FXS Module Installation
- Galaxy Mini - Connecting the Server to the Network
- Galaxy Mini - Activating and Licensing
- Galaxy Expand
- Galaxy Expand - Table of Contents
- Galaxy Expand - Platform and Hardware Overview
- Galaxy Expand - Initial Configuration
- Galaxy Expand - Module Installation
- Galaxy Expand - Reference Architecture
- Galaxy Expand - Common Configuration
- Galaxy Expand - Standalone UCX Server Configuration
- Galaxy Expand - High Availability UCX Configuration
- Galaxy Expand - Local Gateway (Expansion Chassis) Configuration
- Galaxy Expand - Remote Gateway Configuration
- Galaxy Expand - Survivable Remote Gateway Configuration
- Galaxy Express
- Galaxy Modular Hardware
- Servers and Gateways
- Introduction
- Planning
- Quick Start
- UCX Virtual Machine
- UCX Server
- UCX Web-based Configuration Utility
- System
- Fax
- PBX
- Reports
- Accessories
- My Extension
- Security
- Support
- Survivable Remote Gateway (SRG)
- High Availability (HARC)
- UCX Digital Station Module (DSM16)
- UCX M1/CS1000 Media Gateway
- Digital Gateway
- External Gateways and Devices
- SIP PSTN Trunks
- SIP Trunks
- How-To Guides
- UCX Applications
- UCX Features
- Answer DN Behavior
- Background Music
- Busy Lamp Field (BLF)
- Global BLF key label change
- Parking Lot Monitoring Solutions
- Call Transfer and Recall
- Call Monitoring
- Call Recording Options
- Dial System Fax
- Dictation Service
- Distinctive ring tones
- Fax to Email
- Group Pickup
- Hotline UCX Configuration
- Hotdesking
- Language prompts
- Long Tones
- Ring Again (Call back)
- Shared Call Appearances
- Set Based Configuration
- UCX MADN Emulation Solutions
- Unified Messaging for M1/CS1000 Users
- User Portal
- Voicemail and VmX Locater
- Voicemail Escalation
- Voicemail Message Indicator
- ZapBarge
- Telephones
- Installation Guides
- Product Specifications
- General Information
- Product Bulletins
- Product Notices
- InfinityOne Package Update Required
- UCX 6.0 End-of-Support
- UCX 7.0 and InfinityOne 4.0 General Availability
- VPN Security Update Required
- Email Relay Using Gmail Account Fails Due to Bad Credentials
- InfinityOne Release 2.x End-of-Life
- InfinityOne Android App General Availabililty
- E-MetroTel not affected by Log4j vulnerability
- Web-based GUI Security Enhancements
- User Portal Security Update
- Simplified UCX Configuration for Remote InfinityOne Softphones
- InfinityOne Release 3.0 Server General Availability
- Availability of Connection Sharing
- Availability of Automated Cleanup
- Availability of IP Block List Feature
- InfinityOne Release 2.0 Availability
- Digital Station Module (DSM16) Availability
- UCX Software Updates
- Quotations and Ordering
- Nortel Legacy
- Support and Troubleshooting
- Partner Onboarding
- E-MetroTel Business Practices
- Recurring Services Payment Policy
- Product Licensing
- Extension Provisioning Services
- Subscription Services
- E-MetroTel SIP Trunk E911 Registration
- Reseller Responsibilities
- Software Subscription and Warranty Transfer Request
- Return Material Authorization (RMA) Policy
- Acceptable Use Policy
- E-MetroTel Beta Trial Policy
- E-MetroTel Training Expectations
- 9-1-1 Services Agreement (Canada)
- References
OpenSSL HeartBeat Vulnerability on the UCx (CVE-2014-0160)
Overview
OpenSSL is a software package used on the UCx appliance to provide secure access to the Linux OS and the services running on it. The package is used to implement the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols, as well as providing a full-strength, general purpose cryptography library for use.
Recent news reports have identified a vulnerability in the Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) heartbeat functionality in OpenSSL which could allow an unauthenticated, remote attacker to access sensitive information. https://www.redhat.com/security/data/cve/CVE-2014-0160.html
OpenSSL versions 1.0.1 through 1.0.1f are vulnerable!
UCx Exposure
The version of OpenSSL that is currently installed and used on the UCx platform is version 0.98e-27. Due to that, this vulnerability DOES NOT impact UCx systems!
To check the version of OpenSSL on the UCx platform, you can perform the following steps:
- Login to the Web-based Configuration Utility
- Navigate to the System - Updates - Packages page
- Click the "Show Filter" button and enter the word "openssl" in the Name field
- Ensure that the option "Installed" is selected in the Status Drop down box and press the Search button