4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
0.009 Low
EPSS
Percentile
82.1%
Security Bulletin: IBM System x and Flex Systems Browser Exploit Against SSL/TLS (BEAST) Mitigations (CVE-2011-3389)
The SSL 3.0 and TLS 1.0 protocols when used with Cipher Block Chaining (CBC) mode with chained initialization vectors may allow man-in-the-middle attackers to obtain plaintext HTTP headers.
Vulnterability Details
Product | Affected Versions |
---|---|
IBM Flex System Integrated Management Module v2 (IMM2) | 1.00 to 2.00 |
IBM System x Integrated Management Module v2 (IMM2) | 1.00 to 2.50 |
IBM Flex System Chassis Management Module (CMM) | 1.00 to 1.40.2Q |
(2PET10A to 2PET10Q) | |
IBM Flex System Manager (FSM) | 1.0.0 to 1.3.0 |
IBM BladeCenter Advanced Management Module (AMM) | 1.00 to 3.64g |
(BPET64G) |
CVE ID: CVE-2011-3389
Description:
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a “BEAST” attack. (From the National Vulnerability Database)
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/70069> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
List the affected versions/releases/platforms, as best possible.
Browsers contain a mitigation for this issue, as described below under “Mitigation(s).” The following firmware versions also support TLS 1.2, which is not vulnerable to this issue. Firmware updates are available through IBM Fix Central.
Product | Recommended Version |
---|---|
IBM Flex System Integrated Management Module v2 (IMM2) | 3.50 (1AOO50B) or newer |
IBM System x Integrated Management Module v2 (IMM2) | 3.65 (1AOO50D) or newer |
IBM Flex System Chassis Management Module (CMM) | v1.50.1F (2PET12F) or newer |
IBM Flex System Manager (FSM) |
1.3.1 or newer
IBM BladeCenter Advanced Management Module (AMM) | v3.66B or newer
Many ports on the Integrated Management Module v2, Chassis Management Module, and Flex System Manager can be restricted to use only the TLS 1.2 version of the SSL/TLS protocol. For additional information please see the following document: http://pic.dhe.ibm.com/infocenter/flexsys/information/index.jsp?topic=%2Fcom.ibm.acc.8731.doc%2Fusing_tls12.html Please note that when using the firmware versions listed above configuring the Chassis Management Module automatically configures any Integrated Management Module v2 and Power Service Processor in the chassis. The instructions given for configuring the IMM2 are only required for IMM2 outside the IBM Flex Systems chassis.
None
Mozilla Firefox, Internet Explorer, Google Chrome, and Opera contain a browser-side mitigation for this issue. It is known as the 1/n-1 splitting mitigation. Communication between browsers and servers is protected as long as the system with the browser has an up-to-date version of Java and up to date version of Mozilla Firefox, Internet Explorer, Google Chrome, or Opera. If using Internet Explorer, it’s also important to have the appropriate Windows patch, as described here: <http://technet.microsoft.com/en-us/security/bulletin/ms12-006> In other words, if all users who access the system have up to date software, the connection to the system is not vulnerable to this attack. Consult Java and browser documentation for specific information regarding which patches should be applied or which version should be used.
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
None
10 September 2013: Original copy published
06 December 2013:Â Added information regarding additional affected products
10 January 2014: Added information regarding additional affected products and the feature to restrict to TLS 1.2.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.