Cisco Cisco AnyConnect Secure Mobility Client v3.x
4
Release Notes for Cisco AnyConnect Secure Mobility Client 3.0.x, for Apple iOS
New Features in AnyConnect 3.0.12119
Cisco recommends that you upgrade to this latest release of AnyConnect and also upgrade to iOS 8.1 to get the latest VPN
updates in iOS. Review the current
updates in iOS. Review the current
to be aware of operational considerations.
New Features in AnyConnect 3.0.12119
AnyConnect 3.0.12119 now supports Apple iOS 8 and also contains the following changes:
•
This update resolves CSCuq31511: Multiple vulnerabilities in OpenSSL - August 2014
•
The AnyConnect user interface has been updated with a focus on iOS 7.x and later devices
•
Apple iOS compatibility fixes (including iOS 8 support)
Cisco recommends that you upgrade to this latest release of AnyConnect.
, for specific bugs fixed in this release.
Review the current
to be aware of operational considerations.
New Features in AnyConnect 3.0.09440
AnyConnect 3.0.09440 resolves CSCup22547: Multiple Vulnerabilities in OpenSSL - June 2014 (CVE-2014-3470,
CVE-2014-0221, CVE-2014-0224, CVE-2014-0195, CVE-2014-0076). For details see advisory ID:
CVE-2014-0221, CVE-2014-0224, CVE-2014-0195, CVE-2014-0076). For details see advisory ID:
. Cisco recommends that you upgrade to this latest release of AnyConnect.
Review the current
to be aware of operational considerations.
New Features in AnyConnect 3.0.09353
AnyConnect 3.0.09353 resolves CSCuo17488: AnyConnect for iOS is vulnerable to CVE-2014-0160 - Heartbleed. Cisco
recommends that you upgrade to this latest release of AnyConnect.
recommends that you upgrade to this latest release of AnyConnect.
Review the current
to be aware of operational considerations.
New Features in AnyConnect 3.0.09266
AnyConnect 3.0.09266 contains the following new restrictions when FIPS mode is enabled:
•
The minimum key size for server certificates accepted by the client will be 2048 bits. Server certificates with smaller key
sizes (< 2048) will be rejected and the explicit reason will be logged and displayed to the user. This applies to all
certificates in the chain.
sizes (< 2048) will be rejected and the explicit reason will be logged and displayed to the user. This applies to all
certificates in the chain.
•
SHA-1 shall not be used for digital signatures. Only SHA256 or greater is now supported in FIPS mode.
•
There is no change in client certificate processing.
When FIPS mode is disabled there is no change in behavior for server certificates with smaller key sizes (< 2048) or the use of
SHA-1.
SHA-1.
, for additional fixes in this release. Cisco recommends that you
upgrade to this latest release of AnyConnect.