Just giving you a heads up: OpenSSL released a new version with several critical fix today. The most critical one (CVE-2014-0195) could lead to arbitrary code execution on the server in the context of the OpenSSL/OpenVPN process.
The flaw affects DTLS (i.e. mostly TLS over UDP) so, as far as I understand it, the impacted component should be the Cisco VPN client, possibly the Amazon VPC client and most likely all SSL S2S or end point that uses UDP instead of TCP.
You might want to consider limiting access to these services to known good network ranges until a patch is released.
This thread was automatically locked due to age.