Tuesday, April 22, 2014, 03:54 pm PT (06:54 pm ET)
Apple patches Heartbleed vulnerability in latest AirPort Extreme, Time Capsule updateIn response to the Heartbleed kerfuffle, Apple on Tuesday rolled out a firmware update for all 2013 AirPort Extreme and AirPort Time Capsule models that protects affected units from the OpenSSL vulnerability.
As noted by MacWorld, the firmware update that went live earlier today is specifically designed for Apple's latest AirPort products launched in June 2013.
In a statement provided to the publication, Apple said:
The firmware update provides a fix for the recent OpenSSL vulnerability for the latest generation of 802.11ac enabled AirPort Extreme and AirPort Time Capsule base stations (June 2013). This vulnerability only impacts recent Airport devices that have the Back to My Mac feature enabled. Customers with previous generation AirPort Extreme and AirPort Time Capsules do not need to update their base stations.
With Back to My Mac enabled, Heartbleed could allow a nefarious user to intercept data packages between a user and an AirPort base station, though Apple IDs and passwords would not be revealed.
Earlier this month, Apple announced iOS, OS X and key Web services were not affected by Heartbleed as the products did not incorporate the flawed software.
On Topic: Current Hardware
- Apple reissues MacBook Air EFI update after resolving install, crashing bug
- How to get the lowest prices on Apple's mid-2014 MacBook Pros with instant coupons
- Apple's new MacBook Pro with Retina display models unboxed, SSDs speed tested
- Apple's focus on value in 2014 has sent Mac sales surging
- Apple's legacy MacBook Pro with CD/DVD SuperDrive lives on with $100 price cut