Update about High Impact OpenSSL-release
This liveblog contains information about the High Impact OpenSSL-release. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog.

T-Update
This liveblog contains information about the High Impact OpenSSL-release. As soon as we have an update, we’ll add it to this post. More information about possible risks and details can be found at the bottom of this blog.
Update March 25, 2021
16:00 | OpenSSL published today the patch for two critical vulnerabilities (CVE-2021-3450 and CVE-2021-3449). All OpenSSL services from version 1.1.1h must be patched. Without this patch, a denial-of-service (DoS) attack is possible. A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. It is quite easy to disrupt the systems behind your unpatched OpenSSL with a script. You solve this by patching.
Update March 22, 2021
18:00 | The OpenSSL Project Team has made a pre-announcement for a “high impact” vulnerability within OpenSSL. OpenSSL is used in encrypting network connections. High impact vulnerabilities within OpenSSL are rare, which is why Tesorion strongly advises to actively monitor these developments. The first information can be found here.
Background
Risk
Update March 25, 2021, Update available, see the OpenSSL website for the patch.
Update March 22, 2021, OpenSSL announced a new security release (version 1.1.1k), which will be made available on Thursday, March 25, 2021. This post explains that this release offers a solution for a high-impact vulnerability.
Advice
Sources
Sign up to receive T-Updates
Receive the latest vulnerabilities in your email every Wednesday
More than 1,000 organisations have already joined us.