The recently released LogJam Attack is essentially a man-in-the-middle attack that can be used to downgrade vulnerable TLS connections to use weak cryptography. This attack essentially exploits support of export-grade ciphersuites similar to the FREAK attack released in March 2015.
Soha Systems customers are NOT vulnerable to this issue, as we don’t support or use export-grade cryptography on any of our systems.
LogJam and FREAK family of attacks are essentially side effects of US export policy in 90s that only permitted weak cryptography to be exported out of US. Today, export-grade ciphersuites are never directly used for securing a connection. However, servers or clients that support these weak ciphersuites can be exploited by tricking them to downgrade connections to use these weak ciphersuites. It is considered best practice to disable export-grade cryptography in security sensitive deployments.