Lucene search

K
ibmIBM4DC0A8334FA74CC72F7413D6B655F0E3EAACB5A860F1209C78A77DBEFC89B0BE
HistoryJun 15, 2018 - 7:02 a.m.

Security Bulletin: Vulnerability in IBM Java runtime affects IBM SOA Policy Gateway Pattern for AIX Server (CVE-2015-0138)

2018-06-1507:02:46
www.ibm.com
7

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Summary

The “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability may affect some configurations of WebSphere Application Server used by WebSphere Service Registry and Repository.

Vulnerability Details

CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.

This vulnerability is also known as the FREAK attack.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM SOA Policy Gateway Pattern for AIX Server 2.5 and 2.0

Remediation/Fixes

Please note that the default configuration of WebSphere Application Server and WebSphere Service Registry and Repository uses a “STRONG” or “HIGH” secure cipher list, which does not use RSA Export ciphers, so you would not be affected if you have not changed your ciphers.

For advice on mitigating FREAK on servers which deviate from this default configuration, please apply the mitigations indicated in the WebSphere Application Server bulletin at http://www.ibm.com/support/docview.wss?uid=swg21698613. You should verify applying this configuration change does not cause any compatibility issues.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

Related for 4DC0A8334FA74CC72F7413D6B655F0E3EAACB5A860F1209C78A77DBEFC89B0BE