CAPKI r4.3.4 has been signed off and the builds are available for use in embedded installer components.
EEM via CA Directory R12 all versions prior to SP14.
Any existing CA Directory r12 host (prior to SP14) can apply this CAPKI patch independently.
Issues/Vulnerabilities addressed as part of this release:
Description of the Issue/Vulnerability
SSL/TLS MITM vulnerability
DTLS recursion flaw
Anonymous ECDH denial of service
Recovering OpenSSL ECDSA Nonces
EEM Development will be applying the latest CA Directory R12 SP14 to their install packages during the next development cycle.
If you require this patch immediately, please open a case with CA Support with a business impact and justification.