Response to the OpenSSL Heartbleed Vulnerability - Directory - CA Technologies
{{search ? 'Close':'Search'}}

Response to the OpenSSL (Heartbleed) Vulnerability

Last Updated: April 11, 2014

The CA Technologies Product Vulnerability Response Team has reviewed our product portfolio and confirmed that this product does NOT utilize a vulnerable version of OpenSSL 1.0.1 ("Heartbleed").

No version of Directory uses a version of a cryptographic library that is vulnerable to CVS-2014-0160 (aka 'Heartbleed'). This includes running CA Directory in FIPs compliant mode which enables the RSA Bsafeā„¢ libraries.
CA Directory uses the CAPKI cryptographic library. The version of OpenSSL used is 0.9.8h and is not affected by this vulnerability.

Chat with CA

Just give us some brief information and we'll connect you to the right CA Expert.

Our hours of availability are 8AM - 5PM CST.

All Fields Required

connecting

We're matching your request.

Unfortunately, we can't connect you to an agent. If you are not automatically redirected please click here.

  • {{message.agentProfile.name}} will be helping you today.

    View Profile


  • Transfered to {{message.agentProfile.name}}

    {{message.agentProfile.name}} joined the conversation

    {{message.agentProfile.name}} left the conversation

  • Your chat with {{$storage.chatSession.messages[$index - 1].agentProfile.name}} has ended.
    Thank you for your interest in CA.


    How Did We Do?
    Let us know how we did so that we can maintain a quality experience.

    Take Our Survey >

    Rate Your Chat Experience.

    {{chat.statusMsg}}

agent is typing