Lucene search

K
ibmIBM3CA859EBF8BCF3A4B3213DE2269D57C7107B791A6068854FB3FA0849F01DF648
HistoryJan 31, 2019 - 1:55 a.m.

Security Bulletin: Vulnerability in RC4 stream cipher affects Integrated Management Module 2 (IMM2) (CVE-2015-2808)

2019-01-3101:55:01
www.ibm.com
4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Summary

The RC4 “Bar Mitzvah” Attack for SSL/TLS affects Integrated Management Module 2 (IMM2).

Vulnerability Details

Summary

The RC4 “Bar Mitzvah” Attack for SSL/TLS affects Integrated Management Module 2 (IMM2).

Vulnerability Details

CVE-ID: CVE-2015-2808

Description: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to obtain sensitive information.

CVSS Base Score: 5
CVSS Temporal Score: See <http://exchange.xforce.ibmcloud.com/vulnerabilities/101851&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected products and versions

All IMM2 firmware releases prior to v4.90 for these systems:

  • System x3100 M4, type 2582
  • System x3100 M5, type 5457
  • System x3250 M4, type 2583
  • System x3250 M5, type 5458
  • System x3300 M4, type 7382
  • System x3500 M4, type 7383
  • System x3530 M4, type 7160
  • System x3550 M4, type 7914
  • System x3630 M4, type 7158
  • System x3650 M4 BD, type 5466
  • System x3650 M4 HD, type 5460
  • System x3650 M4, type 7915
  • System x3750 M4, types 8752, 8718
  • System x3750 M4, types 8722, 8733
  • System x3850 X6, Type 3837
  • System x3950 X6, Type 3837
  • iDataPlex dx360 M4, types 7912, 7913
  • iDataPlex dx360 M4 Water Cooled, types 7918, 7919
  • NeXtScale nx360 M4, type 5455
  • Flex System x220 Compute Node, types 7906, 2585
  • Flex System x222 Compute Node, type 7916
  • Flex System x240 Compute Node, types 8737, 8738, 7863, 8956
  • Flex System x440 Compute Node, type 7917
  • Flex System x880 Compute Node, types 4259,7903
  • Flex System Manager Node, types 8731, 8734, 7955

Remediation/Fixes

Firmware updates are available at IBM Fix Central: <http://www.ibm.com/support/fixcentral/&gt;.

It is recommended to update the following affected systems to Integrated Management Module 2 v4.97 (1AOO66M) or above:

  • System x3100 M4, type 2582
  • System x3100 M5, type 5457
  • System x3250 M4, type 2583
  • System x3250 M5, type 5458
  • System x3300 M4, type 7382
  • System x3500 M4, type 7383
  • System x3530 M4, type 7160
  • System x3550 M4, type 7914
  • System x3630 M4, type 7158
  • System x3650 M4 BD, type 5466
  • System x3650 M4 HD, type 5460
  • System x3650 M4, type 7915
  • System x3750 M4, types 8752, 8718
  • System x3750 M4, types 8722, 8733
  • System x3850 X6, Type 3837
  • System x3950 X6, Type 3837
  • iDataPlex dx360 M4, types 7912, 7913
  • iDataPlex dx360 M4 Water Cooled, types 7918, 7919
  • NeXtScale nx360 M4, type 5455

It is recommended to update the following affected systems to Integrated Management Module 2 v4.90 (1AOO66O) or above:

  • Flex System x220 Compute Node, types 7906, 2585
  • Flex System x222 Compute Node, type 7916
  • Flex System x240 Compute Node, types 8737, 8738, 7863, 8956
  • Flex System x440 Compute Node, type 7917
  • Flex System x880 Compute Node, types 4259,7903
  • Flex System Manager Node, types 8731, 8734, 7955

You should verify applying this fix does not cause any compatibility issues. The fix disables RC4 stream cipher by default. If you change the default setting after applying the fix, you will expose yourself to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.

Workarounds and Mitigations

Place the IMM2 into NIST-131A cryptomode to disable all RC4-based ciphers.

For standalone systems, the IMM2 can be put in the NIST131A mode using the CLI or Web:

  1. IMM CLI:
    system> cryptomode -set NIST
  2. IMM Web: Navigate to “IMM Management” -> “Security” -> “Cryptography Management” and then choose “NIST SP 800-131A Compliance Mode” and click applying

For Flex systems NIST-131A mode is configured in the CMM.

You should verify applying this configuration change does not cause any compatibility issues. Not disabling the RC4 stream cipher will expose yourself to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.

Reference

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None.

Change History
17 April 2015: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Related for 3CA859EBF8BCF3A4B3213DE2269D57C7107B791A6068854FB3FA0849F01DF648