Heartbleed bug and Acronis Software
This article applies to:
- Acronis Software
- Heartbleed bug discovered in the open-source cryptography library OpenSSL
Acronis Products not affected by the Heartbleed bug
- Acronis Backup 11.5 (Acronis Backup & Recovery 11.5) uses OpenSSL toolkit v.1.0.0d, which is not vulnerable.
- Acronis True Image 2014 uses OpenSSL toolkit v.1.0.0c, which is not vulnerable.
- Acronis Snap Deploy uses OpenSSL toolkit v.1.0.0d, which is not vulnerable.
- Acronis Cloud Storage uses uses OpenSSL toolkit v.1.0.1g, which is not vulnerable.
- MassTransit uses OpenSSL 0.9.8q, which is not affected by the exploit.
- ExtremeZ-IP does not use any OpenSSL code related to SSL certificates.
- Other Acronis products do not use any OpenSSL code and are unaffected by the vulnerability.
- Acronis Access – 6.0.0 and 6.0.1 versions
- mobilEcho – 5.0.X and 5.1.X versions
- activEcho – 2.X and 3.X versions
Solution: Acronis has released Acronis Access 6.0.2 which includes a fix for the Heartbleed security bug. All later versions will also have the fix included.
For general information on the Heartbleed issue, see http://heartbleed.com/