VPN Routers Deemed Safe From Heartbleed
Sabai Technology developers have determined that the Sabai OS’s VPN client is not at risk to the Heartbleed vulnerability.
Simpsonville, SC (PRWEB) April 29, 2014
Sabai Technology developers have determined that the Sabai OS’s VPN client is not at risk to the Heartbleed vulnerability. Sabai OS remains a popular alternative to traditional router firmware for its ability to broadcast VPN wirelessly. This feature allows users to tunnel device traffic that isn’t capable of running a VPN client itself, such as a Roku or Xbox over an IP location of the users choice.
However, while the firmware itself is not a point of attack, the company can not make any guarantees regarding third party VPN providers. Customers are encouraged to contact their VPN service directly for more information regarding possible vulnerabilities.
Those who connect to their Sabai VPN Router’s web interface through HTTPs, either remotely or through an unsecured wireless network, are encouraged to contact Sabai Technology Technical Support. There is an update available which will increase the security of the wireless network. Users can determine if they use HTTPS by visiting the Admin Access panel on their router interface.
To further guarantee customers security, the Sabai development team is currently preparing a firmware update for all customers which will be released in the coming weeks. The firmware update includes new model support, better port forwarding, and better quality of service along with more secure OpenVPN standards.
Sabai Technology takes the security of their customers very seriously and encourages customers to be careful to change passwords only after explicit instruction to do so. Changing passwords vulnerable to the exploit before a provider has had time to implement security updates will only exacerbate the issue. Additionally, customers who use possibly compromised passwords for their Sabai VPN Router should consider changing their wireless password immediately.
For the original version on PRWeb visit: http://www.prweb.com/releases/2014/04/prweb11798950.htm