Hello,
Our server does not consume any certificate from the client.
Client authentication or client certificate verification is disabled.
Server always has a valid ECC certificate.
If we consider ECDHE_ECDSA cipher based TLS handshake,
then it is possible that the client can send invalid public session key
to the server causing the vulnerability. Is this assumption correct ?
If
yes, then I think disabling ECC cipher suites should prevent the
vulnerability if we don't want to upgrade openssl considering there is no other cryptographic operation
except w.r.t. TLS.
Regards,
Vipul