3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in Rational Change.
| Subscribe to My Notifications to be notified of important product support alerts like this.
CVE-ID: CVE-2014-3566
Description: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3 **CVSS Temporal Score: **See <https://exchange.xforce.ibmcloud.com/vulnerabilities/97013>_ _for the current score *CVSS Environmental Score:**Undefined **CVSS Vector: **(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Rational Change: 5.2, 5.3, 5.3.1
Product
| VRMF|APAR|Remediation/First Fix
—|—|—|—
Rational Change| 5.2| None| Upgrade to Rational Change Interim Fix 6 for 5.2.0.8 and see workaround for mitigation steps.
Rational Change| 5.3| None| See workaround
Rational Change| 5.3.1| None| See workaround
Mitigation is to disable SSLv3 protocol following steps below.
Change 5.2:
Once https is configured, add additional argument <Set name="SSLProtocol">TLS</Set>
just after the line <Set name="KeyPassword"></Set>
in jetty\etc\change.xml
file.
Change 5.3:
Once https is configured, add additional argument <Set name="SSLProtocol">TLS</Set>
just after the line <Set name="KeyPassword"></Set>
in jetty\etc\jetty.xml
file.
Change 5.3.1:
Once https is configured, add additional argument <Set name="protocol">TLS</Set>
just after the line <Set name="TrustStorePassword"></Set>
in jetty\etc\jetty.xml
file.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.
CPE | Name | Operator | Version |
---|---|---|---|
rational change | eq | 5.2.0.8 | |
rational change | eq | 5.3.0.6 | |
rational change | eq | 5.3.1.1 |
3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N