On March 1, 2016, OpenSSL announced the discovery of 10 vulnerabilities [2].
Airlock WAF and all applications protected by Airlock WAF are not affected.
Details
CVE-2016-0800, CVE-2015-3197: SSLv2 can not be used with Airlock WAF.
CVE-2016-0705: DSA private keys can not be used in Airlock WAF.
CVE-2016-0798: The Secure Remote Password protocol (SRP) is not used in Airlock WAF.
CVE-2016-0797: Airlock WAF does not use the vulnerable OpenSSL function.
CVE-2016-0799: Airlock WAF is not affected because the vulnerable function (BIO_printf) is only used for OCSP in Apache httpd which is not supported prior to Airlock WAF 6.0.
CVE-2016-0702: A.k.a CacheBleed attack. Airlock WAF is not affected because it is not a general purpose multi user system.
CVE-2016-0704, CVE-2016-0703, CVE-2016-0701: Airlock WAF is not affected because this vulnerability is already fixed in OpenSSL 1.0.1q (HF0008).