Lucene search

K
ibmIBM2A5BEDF7CAB534804997E7DC02AD9CA99A20E53D7F0533207ADE10679212887A
HistoryMay 01, 2024 - 9:19 p.m.

Security Bulletin: Vulnerability in FOS firmware used by IBM b-type SAN directors and switches.

2024-05-0121:19:39
www.ibm.com
6
fos firmware
ibm b-type san
openssl issue
remote attacker
security bypass
vulnerability
patch version

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.5%

Summary

The b-type products are vulnerable due to an OpenSSL issue in the FOS firmware. The vulnerability has been addressed and can be resolved by applying the FOS code level listed below.

Vulnerability Details

CVEID:CVE-2023-0466
**DESCRIPTION:**OpenSSL could allow a remote attacker to bypass security restrictions, caused by a flaw in the X509_VERIFY_PARAM_add0_policy function. By using invalid certificate policies, an attacker could exploit this vulnerability to bypass certificate verification.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251307 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2023-0465
**DESCRIPTION:**OpenSSL could allow a remote attacker to bypass security restrictions, caused by a flaw when using a non-default option to verify certificates. By using invalid certificate policies in leaf certificates, an attacker could exploit this vulnerability to bypass policy checking.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251293 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
FOS 9.X

Remediation/Fixes

Fixed Product Version(s)
FOS 9.1.1d, 9.2.0b, 9.2.1

Workarounds and Mitigations

CPENameOperatorVersion
foseq9.X