Heartbleed Vulnerability – What to Do and How

A critical vulnerability nicknamed “Heartbleed” was discovered in OpenSSL, the most popular SSL module used on Linux / cPanel servers. This exploit allows a third party to steal information that would otherwise be secured and encrypted with the SSL/TLS protocol, and to steal the private keys from the certificate pair itself.

Here’s a great site where you can learn more about the vulnerability: http://heartbleed.com/.

We’ve implemented updates in all areas where our systems were using affected versions of OpenSSL, and we are following best practices. We have also re-keyed all certificates on our web servers.

Important Facts

  1. This is not a vulnerability with SSL/TLS or Namecheap.
  2. SSL/TLS is not broken, nor are the digital certificates issued by the Certificate Authority through Namecheap.
  3. Users of OpenSSL versions 1.0.1 through 1.0.1f with the heartbeat extension enabled are affected.
  4. OpenSSL version 1.0.1g addresses the vulnerability, as well as OpenSSL instances compiled without the heartbeat extension.

How does this impact Namecheap customers?

As a precaution to protect your data, we highly recommend that all Namecheap users change their account passwords. The rest depends on the type of services you have with Namecheap:

Hosting-only customers

We have already taken care of the OpenSSL update on all of our managed servers. Unmanaged / self-managed customers who have a VPS or a Dedicated Server with Namecheap will need to do the following to secure their server. We recommend you perform these steps immediately.

For customers with cPanel/WHM:
  1. Login to WebHostManager;
  2. Go to cPanel in the left hand menu;
  3. Click Upgrade to Latest Version;
  4. Follow upgrade instructions;
  5. Go to Software in the left hand menu;
  6. Click Update System Software;
  7. Follow upgrade instructions.
For customers with the CentOS operating system (except CentOS 5, since it is not affected by the exploit):
  1. SSH in as root;
  2. Run the command ‘yum update’ from the command line;
  3. Yum will update the at-risk packages
For customers using the Ubuntu or Debian operating system:
  1. SSH in as root;
  2. Run the command ‘apt-get update && apt-get upgrade’.

SSL Certificate customers

First of all, if you are not using OpenSSL on your servers (or are not hosted on one of our Shared hosting plans), you are not affected.

If you do use OpenSSL, we strongly advise the following:

  1. Identify which servers are running OpenSSL (versions 1.0.1 through 1.0.1f are affected).
  2. Update to the latest patched version of the software (1.0.1g), or recompile OpenSSL without the heartbeat extension, if applicable.
  3. Reissue any SSL certificates on affected web servers after moving to a patched version of OpenSSL.
  4. Test your SSL installations.
  5. Revoke any certificates that were replaced. Please revoke AFTER the reissue has been completed and you have successfully installed it on your web server.
  6. Consider resetting end-user passwords that may have been visible in a compromised server memory.
  7. Always refer back to this KB Article for more information.

How to Reissue and Revoke Certificates with Namecheap

Reissue Procedure

Reissuance is done from within your Namecheap account and is free of charge. More information on how to reissue an SSL certificate can be found in this guide.

Revocation Procedure

Once the certificate is reissued and successfully installed, the original certificate (the one that could be stolen) must be revoked, so that attackers can’t use it to impersonate you.

In order to revoke your certificate go to to your Namecheap account panel and locate “Domain list” section. Then find the domain the certificate is issued for and press on the “V” button which you can see on the screenshot below.


Locate your certificate and press on “Manage” button.


On the next page find all certificates with status “Replaced”. Click on the arrow near “See details” button and select “Revoke”.


You will see the warning message that certificate will be revoked and cannot be used anymore; you need to click on “Yes” to proceed.


Once your certificate is revoked you will see the message in your account.


Note: Comodo (now Sectigo) certificates are revoked instantly.


Once it is done your certificate will be revoked.



We welcome your comments, questions, corrections and additional information relating to this article. Your comments may take some time to appear. Please be aware that off-topic comments will be deleted.

If you need specific help with your account, feel free to contact our Support Team. Thank you.

Need help? We're always here for you.

× Close