Lucene search

K
ibmIBM5F329F46D75CD809F439AED5AFC067E5151421A68B52D22D3D95682EC9B47398
HistorySep 26, 2022 - 4:23 a.m.

Security Bulletin: IBM TS2900 Tape Library update for security vulnerabilities in OpenSSL (CVE-2012-2333)

2022-09-2604:23:14
www.ibm.com
58

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Abstract

Download an update to the TS2900 Tape Library, which contains a newer version of OpenSSL that fixes certain security vulnerabilities that were present in older versions of OpenSSL.

Content

DESCRIPTION:
OpenSSL versions prior to 1.0.0 do not follow best security practices and need to be upgraded. For a complete list of OpenSSL Vulnerabilities by version, please refer to: <http://www.openssl.org/news/vulnerabilities.html&gt;

The IBM TS2900 tape library firmware has been updated to contain a newer version of OpenSSL.

CVEID: CVE-2012-2333
CVSS Base Score: 5
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/75525&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

AFFECTED PRODUCTS AND VERSIONS:
All TS2900 tape libraries with firmware versions lower than 0025.

REMEDIATION:
The recommended solution is to apply the fix, which is contained in firmware version 0025 and above. The fix remediates the vulnerability by updating OpenSSL to version 1.0.1c.

FIX:
Apply firmware version 0025 or later, available from IBM Fix Central <http://www-933.ibm.com/support/fixcentral/&gt;

WORKAROUND(S):
None

MITIGATION(S):
Connect the library directly to a workstation or private network that is trusted (i.e., access to the workstation or network is controlled or limited to persons that would all have administrator privileges or persons that can be trusted not to attempt to hack into the library).

REFERENCES

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT:
None

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSTCAPQJโ€,โ€œlabelโ€:โ€œTS2900 Tape Autoloader (3572)โ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU054โ€,โ€œlabelโ€:โ€œSystems w/TPSโ€},โ€œComponentโ€:โ€œNot Applicableโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œNot Applicableโ€,โ€œEditionโ€:โ€œN/Aโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œโ€,โ€œlabelโ€:โ€œโ€}}]

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P