Lucene search

K
ibmIBM174F1CB3220ED56F318FA688B5104CC5CCC2107DBECA87BE989ABF3A0091E073
HistorySep 23, 2021 - 1:45 a.m.

Security Bulletin: This Power Hardware Management Console (HMC) update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754 (known as Spectre and Meltdown).

2021-09-2301:45:02
www.ibm.com
26

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.975 High

EPSS

Percentile

100.0%

Summary

In response to recently reported security vulnerabilities, this Power HMC update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754.

Vulnerability Details

CVEID: CVE-2017-5715
CVEID: CVE-2017-5753
CVEID: CVE-2017-5754

Please refer to this link for security bulletin of CVE-2018-3639 and CVE-2018-3640.

Please refer to this link for security bulletin of CVE-2018-12126, CVE-2018-12127, CVE-2018-12130 and CVE-2019-11091 (known as MDS).

The Power HMC updates can be obtained from FixCentral by specifying the Product and fix level as described in the Remediation section below.

Workarounds and Mitigations

The most immediate action clients can take to protect themselves is to prevent execution of unauthorized software on any system that handles sensitive data, including adjacent virtual machines.
Remediation for the Virtual HMC

The following updates are available on IBM Fix Central at: http://www-933.ibm.com/support/fixcentral/

Product

|

VRMF

|

APAR

|

Remediation/Fix

—|—|—|—

Power Virtual HMC 5765-HMV

|

V8.8.5.0 SP3

|

MB04124

|

MH01746

Power Virtual HMC 5765-HMV

|

V8.8.6.0 SP2

|

MB04127

|

MH01747

Power Virtual HMC 5765-HMV

|

V8.8.7.1 x86

|

MB04133

|

MH01752

Power Virtual HMC 5765-HMA

|

V8.8.7.1 ppc

|

MB04134

|

MH01753

For vHMC on ppc, both the HMC and Power Firmware updates are required to mitigate the vulnerabilities.

For vHMC on x86, mitigation may require additional hypervisor and firmware updates; customers should consult their hypervisor and x86 system vendors for information.
The x86 HMC hardware appliance will not require HMC machine code updates to protect against these CVEs.

Products Addressed and Versions

Power HMC V8.8.5.0

Power HMC V8.8.6.0
Power HMC V8.8.7.0

Remediation for the 7063-CR1 Power-based Hardware Appliance

Customers with the 7063-CR1 Hardware Appliance, install FW MC825.30 (V2.30)

7042 x86 based Hardware Appliances

No remediation is required.

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.975 High

EPSS

Percentile

100.0%