About two weeks ago, independent research teams identified a vulnerability in OpenSSL― the technology that powers encryption across much of the Internet. The news of this vulnerability, popularly referred to as the “Heartbleed bug,” has spread rapidly from tech blogs to the mainstream media.
Akamai, our Content Delivery Network provider, assured us last week that Replicon was not affected by this vulnerability. We learned today, however, that an independent security researcher contacted Akamai this past weekend about defects in the software they used to protect their SSL keys. A bug, in fact, was present, and neither the data nor the keys were fully protected.
Since Replicon uses Akamai services for edge caching and application acceleration for our Cloud platform, this may have exposed Replicon user names and passwords from August 2012 through April 4, 2014. Consequently, we are in the process of updating our certificates within the next 24 hours to eliminate any exposure to the Heartbleed bug.
For customers using SAML (for Single Sign-On), exposure to the bug would be dependent on their organization’s use of affected versions of OpenSSL and their SAML provider.
Replicon will be forcing a password change at the application level once the certificates are updated. At that time, end users will see a prompt to change their password on the log in page.
Read more details from Akamai here: https://blogs.akamai.com/2014/04/heartbleed-update-v3.html
The integrity and safety of our customers’ data is paramount. We are reacting quickly to address and resolve the issue. Customers with queries can contact our Technical Support Team at 1-877-662-2519 (North America) and +800 6622 5192 (Outside North America).