Incorrect TLS padding could be accepted when terminating TLS 1.x CBC cipher connections. F5 has fetched CVE-2014-8730 for this issue.
This issue does not affect the management interface, only th...
Jeff - we currently use the following cipher settings:
RC4-SHA:HIGH:MEDIUM:!SSLv2:!SSLv3:!ADH
However according to https://www.ssllabs.com/ssltest/ we are still showing as vulerable.
Any ideas why this woudl be?