My ISP just reported that I have a POODLE vulnerability as uPnP has a Port Forwarding rule for Port 443.
I have MYCloud Firmware V04.05.00-237 which should have the Poodle Fix.
Do I need to do anything?
Advice would be appreciated
192.168.0.16 443 9444 TCP Automatically added by UPnP
In a nut-shell, you want to make sure anything and everything that communicates over SSL, does so using protocols newer then SSL3.
Sadly, doing that means you need a user init script, like wd_crack-- or abusing the cron tab. This is because, WD, in their INFINITE WISDOM (sarcasm) placed all the config files into a read only cramfs container, AND, the root filesystem of the unit is hosted by a ramdisk.
Your user init script needs to ensure that the lines:
SSLEngine On
SSLProtocol all -SSLv2 -SSLv3
appear inside the following conf files:
/usr/sbin/lightly_ssl
/usr/local/apache2/conf/mods-enabled/ssl.conf
/usr/local/apache2_dav/conf/extra/httpd-ssl.conf
then stop apache’s daemon, and restart it.
You can accomplish this by keeping persistent copies of these files on the data volume, then deleting those files at those locations, and then creating symbolic links at those locations that point toward your persistent edited copies of those files.
The CORRECT solution is for WD to release a new firmware that contains the revisions, but since this product line is End Of Life, I seriously doubt that is going to happen.