- NG Firewall
Solutions by Industry
Solutions by Issue
The good news (for Untangle users at least) is that just like Heartbleed, NG Firewall is not vulnerable to this attack. That is because we do not use CGI or any other exposed interfaces (ex: ForceCommand feature in OpenSSH, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, etc…) that leverage Bash. Although unnecessary since it is not accessible or a vulnerability in Untangle, the Bash will still be patched in our v11 release.
And what about those other servers and devices in your network that are vulnerable to Shellshock? To test your level of exposure, RedHat has posted a guide. In the end, the best solution is to patch the Bash directly, or if necessary disable a vulnerable Bash until a patch is available and switch to another shell.