3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
The Logjam vulnerability in TLS connections using the Diffie-Hellman (DH) key exchange protocol affects some components of IBM Tivoli Monitoring (ITM).
CVEID: CVE-2015-4000**
DESCRIPTION:** The TLS protocol could allow a remote attacker to obtain sensitive information, caused by the failure to properly convey a DHE_EXPORT ciphersuite choice. An attacker could exploit this vulnerability using man-in-the-middle techniques to force a downgrade to 512-bit export-grade cipher. Successful exploitation could allow an attacker to recover the session key as well as modify the contents of the traffic. This vulnerability is commonly referred to as “Logjam”.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103294 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
The following components of IBM Tivoli Monitoring (ITM) are affected by the LogJam vulnerability:
- Tivoli Enterprise Portal Server (TEPS)
- embedded WebSphere Application Server – ITM versions 6.2.0 through 6.3.0 FP5
- Portal Server Communication with Portal Clients when configured to use SSL over IIOP protocol - ITM versions 6.2.0 through 6.3.0 FP5 - Java (CANDLEHOME) - ITM Java-based agents using JSSE. - ITM versions 6.2.0 through 6.3.0 FP5
**
**
**
**embedded WebSphere Application Server:
You should verify applying this fix does not cause any compatibility issues. Fix | VMRF | Remediation/First Fix |
---|---|---|
6.X.X-TIV-ITM_EWAS_ALL_20150731 | 6.3.0.x | http://www.ibm.com/support/docview.wss?uid=swg24040392 |
Patch to upgrade the embedded WebSphere Application Server (eWAS) shipped as part of the IBM Tivoli Monitoring portal server to version 8.0.0.10 plus additional Interim Fixes referred to as Interim Fix Block 2 | ||
Technote | 6.2.3.x | __<http://www.ibm.com/support/docview.wss?uid=swg21633720>__ |
Contains information about installing the embedded WebSphere Application Server (eWAS) patches for IBM Tivoli Monitoring 6.23. The link gives instructions to install** **eWAS 7.0 Fix Pack 37 (7.0.0.37) and Interim Fix block 1 | ||
Technote | 6.2.2.x | http://www.ibm.com/support/docview.wss?uid=swg21509259 |
Contains information about installing the embedded WebSphere Application Server (eWAS) patches for IBM Tivoli Monitoring 6.22. The link gives instructions are to install** **eWAS 6.1 Fix Pack 47 (6.1.0.47) and Interim Fix block 2. |
For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.
**
**Portal Server Communication with Portal Clients:
Portal Server Communication with Portal Clients when configured to use SSL over IIOP protocol. SSL over IIOP is being used if both conditions below are true:
- HTTPS is not being used
- applet.html file does not have the tep.connection.protocol=http or https AND
- tep.jnlp file does not have tep.connection.protocol=https - the KFW_INTERFACE_cnps_SSL is set to “Y” in the portal server environment file (Windows: kfwenv, UNIX/Linux: cq.config)
You should verify applying this fix does not cause any compatibility issues. Fix | VMRF | Remediation/First Fix |
---|---|---|
6.3.0-TIV-ITM-FP0005-IV74486 | 6.3.0 | http://www.ibm.com/support/docview.wss?uid=swg24040448 |
6.2.3-TIV-ITM-FP0005-IV74486 | 6.2.3 | http://www.ibm.com/support/docview.wss?uid=swg24040448 |
6.2.2-TIV-ITM-FP0009-IV74486 | 6.2.2 | http://www.ibm.com/support/docview.wss?uid=swg24040448 |
6.3.0-TIV-ITM-FP0006 | 6.3.0.x | __<http://www.ibm.com/support/docview.wss?uid=swg24040390>__ |
Check link for status on availability. |
For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.
You should verify applying this fix does not cause any compatibility issues.
**
**
The IBM Tivoli Monitoring servers and base agents (those shipped as part of IBM Tivoli Monitoring Fix Packs) are not affected by this vulnerability. Only Java-based agents utilizing Java Secure Socket Extension (JSSE) which rely on the JRE in the IBM Tivoli Monitoring installation directory (for example, CANDLEHOME) can be affected. Agents affected will publish separate security bulletins and reference this bulletin for the remediation.
For systems where the affected agents are installed, the patch below should be installed which will update the shared Tivoli Enterprise-supplied JRE (jr component on UNIX/Linux) or Embedded JVM (JVM component on Windows). The technote Upgrading Shared Components for IBM Tivoli Monitoring Agents provides information on how shared libraries are used.
You should verify applying this fix does not cause any compatibility issues. Fix | VMRF | Remediation/First Fix |
---|---|---|
6.X.X-TIV-ITM_JRE_CANDLEHOME-20150731 | 6.2.2 through 6.3.0 FP5 | __<http://www.ibm.com/support/docview.wss?uid=swg24040391>__ |
6.3.0-TIV-ITM-FP0006 | 6.3.0.x | __<http://www.ibm.com/support/docview.wss?uid=swg24040390>__ |
Check link for status on availability. |
For IBM Tivoli Monitoring 6.2.0 and 6.2.1, IBM recommends upgrading to a fixed, supported version/release of the product as listed above.
CPE | Name | Operator | Version |
---|---|---|---|
tivoli monitoring | eq | 6.3.0 | |
tivoli monitoring | eq | 6.2.3 | |
tivoli monitoring | eq | 6.2.2 | |
tivoli monitoring | eq | 6.2.1 | |
tivoli monitoring | eq | 6.2.0 |
3.7 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N