NetworkingNews

ZyXEL Assures its Product Not at Risk From Heartbleed Bug

Says has communicated this to all the markets in 120 countries it’s present in

Taiwan based IT conglomerate ZyXEL has assured that its full range of products, from DSL CPEs to home routers and network storage and players are not at all affected by the Heartbleed Bug vulnerability.

The press release announced that it’s the first company to make such an announcement and further apprised that the billion dollar IT manufacturer has strongly communicated to its global consumer base that no ZyXEL product would ever allow a Heartbleed Bug penetration, unlike other IT manufacturers. ZyXEL has communicated this to all the markets in 120 countries it’s present in.

Bill Su, Technical AVP at ZyXEL Communications Corporation, apprised, “We have carried out extensive checks and confirmed that the OpenSSL versions used in ZyXEL products are not at risk.” He also maintained that ZyXEL’s business solutions including security appliances, Gateways, Switches and WLAN AP/ Controllers, use OpenSSL across the globe and none of them use the affected versions. By this, Su also means that all firewalls and firmware versions pose no threat by the Heardbleed Bug, which was found in OpenSSL versions 1.0.1f and 1.0.2-beta1.

Yogesh Singh, Senior Technical Officer in India enlightens about the threat, “Heartbleed vulnerability permits stealing of protected info by SSL/TLS encryption used for securing the internet. A Heartbleed Bug allows an intruder to read the memory of the systems protected by the vulnerable versions of the open SSL software.”

He further informed that ZyXEL DSL CPE, WiMAX, LTE, network storage and additional models that support HTTPs Remote Management, which are in the OpenSSL versions, are not affected by the Heartbleed Bug.

Related posts

Brocade ropes in Joe Poehls as Principal Systems Engineer

adminsmec

Cybersecurity Stalwart Kelly Bissell Joins Accenture

adminsmec

Greg Pelton Rejoins Avaya to Oversee Technology Strategy

adminsmec

Leave a Comment