Hi
I have been reading as much as I can on this. We use an ACE to terminate ssl and need a mitigation strategy for this exploit.
I have confirmed with cisco that since this exploits SSLV3 as well as TLS1 there is no upgrade path at this time. I don't actually use AnyConnect, but I would expect it too would be vulnerable.
My understanding is that this exploit can only happen during negotiation. Most likely attack vector would be connecting via a wireless network that an attacker is also connected to. Somewhat less likely would be connecting via an attacker proxy server.
If you hear anything, please let me know.
Darren
Sent from Cisco Technical Support iPad App