On Mai 3, 2016, OpenSSL announced the discovery of six vulnerabilities [1].
Airlock WAF is affected by CVE-2016-2107. A man-in-the-middle attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server supports AES-NI. According to TLS expert Filippo Valsorda, the bug allows to recover 16 bytes of cleartext traffic when sent repeatedly [2].
Details of the other vulnerabilities:
Hotfixes are available for Airlock WAF 5.2, 5.3.1 and 6.0 to update OpenSSL to version 1.0.1t and 1.0.2h (for version 6.0), respectively. The criticality of the hotfixes is medium.