SSL 3.0 Protocol Vulnerability and POODLE Attack

protocol vulnerability in SSL 3.0 has been discovered that allows an attacker to use Padding Oracle On Downgraded Legacy Encryption (POODLE) to steal “secure” HTTP cookies.  Vologon Productions, LLC Server's do not support the "downgrade dance" to SSL 3.0 and there for are not vulnerable to POODLE.


This can be verified by viewing one of our clients SSL report cards: SSL Report: pro-tectservices.com


If you would like to learn more about the SSL 3.0 Protocol Vulnerability and POODLE Attack (Alert TA14-290A), please fell free to check out the article located on the United States Computer Emergency Readiness Team website.


To help protect yourself from this attack on your local computer, you should disable SSL 3 in your browser.  This can be done by following these instructions for you browser client.


If you have any questions about POODLE and the SSL 3.0 vulnerability or need help disabling SSL 3 in your browser, please fell free to open a SUPPORT TICKET and we will be happy to answer any questions you may have.