SSL HeartBleed Vulnerability Patched
As some of you already know, a major vulnerability in some versions of the OpenSSL software libraries was announced two days ago. It got the fancy name “HeartBleed” and in short, allows anyone on the Internet to read the server memory protected by the vulnerable versions of the OpenSSL software and hijack your SSL’s private key. The interesting information is that not all old versions of the software are affected and there are some older and some newer ones that have it.
As you should expect from SiteGround, we did not lose any time taking the proper actions under these circumstances and we immediately started patching the vulnerability. On the day the bug was announced, we reviewed how many and which of our servers were affected. Luckily, that weren’t so many servers. As of yesterday, the OpenSSL libraries on those servers are updated to the newest version, which was released with a patch for the HeartBleed vulnerability.
However, as we like to be extra cautious, we decided to take some extra steps to guarantee your comfort and security. It turns out that the updated OpenSSL software will not protect you if, for example, your certificate’s private key was already stolen by hackers. We are NOT aware of any such cases on our servers, however, as we take security very seriously, we decided to re-issue with new private keys all certificates that were installed on the servers with previously vulnerable OpenSSL libraries versions.
We waited for our SSL provider to confirm that they have also patched their software against the same vulnerability so we could begin the reissuance. That was confirmed today and we have now started reissuing the SSLs.
No actions are expected from our customers as the reissuance will be done automatically on a server level and will not affect your website in any way. We will send an email to all customers whose certificates were reissued once we complete the process.
Thank you for trusting us on this matter!
Comments ( 15 )
Thanks! Your comment will be held for moderation and will be shortly published, if it is related to this blog article. Comments for support inquiries or issues will not be published, if you have such please report it through
Reginald
Great to hear! Glad you guys took the extra step. Keep it up *from a happy customer* :D
lily
Great to hear new knowledge from you. Thanks!
Jayme
Thank you for this update. This news, and the transparency with which Siteground is working, is very much appreciated. It was also great to see you posting updates via your Twitter account.
Keith Davis
My host has just updated and good to see that you guys are on the ball. I wonder if all hosts are as quick as you guys!
Jonathan
So comforting to hear this
VA
Should we modify our CPanel, Siteground and application passwords? Info is around also about possibly stolen passwords. Waiting for reply, thanks!
Marina Siteground Team
Hello VA, Based on the information we have about the vulnerability, it is highly unlikely that it was ever exploited by hackers on our servers. It was responsibly disclosed and became public after a security patch was released for it. We patched few hours later, hardly giving time to anyone take advantage of the vulnerability. That is why we will not be forcing large scale password change. However, it’s always a good general recommendation to update your passwords frequently and you may use the case as a great motivation to do so. Regards!
Henry
Although it was responsibly disclosed, there were at least two teams that discovered it around the same time. There are also rampant rumors that there were leaks about the issue prior to the patch release. SiteGround's prompt response is worthy of kudos. Out of an abundance of caution, I would suggest that you regenerate new self-signed certificates on your servers, also. Ideally the old public key would be added to a certificate revocation list (CRL). Admittedly support for that is dodgy on the Internet.
Patti
I am SO glad to be hosting with you!! I knew you guys would be on top of this. My site is SSL so I was worried at first. Much appreciated!!
Andre Bellafronte
really good to hear. Transparency and honesty of Siteground! I hope not receive the email for you lol
Big Fan Yan
Great work guys! Its good to be in the loop even if I don't get all the jargon.
Marina Siteground Team
We have completed the reissuance of the SSL certificates that were installed on servers with previously vulnerable OpenSSL version. It took us longer than expected as due to a bug in the system of our SSL provider, we had to reissue the new private keys twice. All sites should function normally and no action is required from clients. An email is sent to all affected clients.
James Doolin
Thank you, confirms my well placed confidence in Siteground.
Bruce Wilson
Recently moved to SiteGround and this was so refreshing to see the quickness with attacking the problem and most important the transparency of what you were doing and letting us know immediately.
WP Valet - Heart Bleed Bug Security and Best Practices » WP Valet
[…] what WP Engine and SiteGround have to say about their responses to the Heart Bleed […]
Start discussion
Thanks! Your comment will be held for moderation and will be shortly published, if it is related to this blog article. Comments for support inquiries or issues will not be published, if you have such please report it through