The official Cisco Security Advisory (link) states the "Cisco Adaptive Security appliance (ASA) Software" is among the products confirmed not vulnerable.
ASA 9.1(3.4) is an interim build. Interim builds are generally only recommended by the TAC to address specific bugs whose fix hasn't been incorporated into minor releases. If they recommend it to a customer and it's not a published build, they should provide an FTP link for download.
The Heartbleed bug is an example of where "older is better". Products incorporating OpenSSL versions prior to 1.01 are generally not affected. Thus all ASA (and ASDM) versions are unaffected as their SSL uses an older distribution.
Note that the separate ASA CX software DOES have the vulnerability. Reference.
The VPN Client 5.x is IPsec-only - i.e., not SSL-based - and should thus be unaffected.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...