Running CA Access Gateway (SPS), the following vulnerabilities have been found in the OpenSSL version the CA Access Gateway (SPS) runs:
The CA Access Gateway (SPS) 12.8SP8CR01 is not vulnerable to these 3 vulnerabilities.
About the vulnerability CVE-2024-5535, the CA Access Gateway (SPS) is not calling the function SSL_select_next_proto while establishment the SSL connection.
The CA Access Gateway (SPS) is also not using the http2 functionality. Thus, the CVE CVE-2024-5535 does not have impact on the module CA Access Gateway (SPS).
Finally, it's a low severity, and it doesn't affect OpenSSL version 3 (1).
The OpenSSL will be updated to 3.x.x in the 12.8SP9 release.
Regarding the vulnerabilities CVE-2024-0727 and CVE-2023-5678, the recommendation is to upgrade OpenSSL to version 1.0.2zj (2).
The CA Access Gateway (SPS) version 12.8SP8CR01 has already that version:
# /{home_SPS}/SSL/bin/openssl version
WARNING: can't open config file: /tmp/openssl-1.0.2zj/Release/ssl/openssl.cnf
OpenSSL 1.0.2zj-fips 30 Jan 2024
# cat /{home_SPS}/install_config_info/ca-sps-version.info
Product Name=Access Gateway
FullVersion=12.80.0801.3003
Version=12.80
Update=0801
Build Number=3003
Location=/opt/CA/secure-proxy
InstanceName=default
Upgrade the CA Access Gateway (SPS) to 12.8SP8CR01 to get the OpenSSL 1.0.2zj out of the box (3).