You can test for this yourself, nothing here the bad guys don't already have:
TCP Filter data needed to spot heartbleed:
Detect successful #heartbleed attacks with tshark:
tshark -i eth0 -R "ssl.record.content_type eq 24 and not ssl.heartbeat_message.type"
SNORT rules necessary to spot heartbleed:
NMAP NSE Script/Thread for mass scanning/detecting:
Metasploit Module for it:
Manual tool for validating:
Python based mass scanning tool:
Thanks for that variety of tools, jayh! We used the NMAP script to confirm that vWLAN ver 184.108.40.206 is vulnerable. AOS-based products appear to be fine. Just checked my email alert subscription for Bluesocket firmware updates! I'm not sure about UC/voice products or any other of ADTRAN's many lines.
Perhaps it would be safest to block TCP 443 from the outside if you run vWLAN until it's patched. Management would be isolated to administrators local to the controller to mitigate the issue in the short term.