Lucene search

K
ibmIBM704A27B09B6FB5098F652786D364B644E9882F4EE04CDB06E5460ABBA2D2037C
HistoryOct 27, 2020 - 3:12 a.m.

Security Bulletin: Vulnerability in Network Time Protocol (NTP) affects IBM Virtualization Engine TS7700 (CVE-2020-11868)

2020-10-2703:12:38
www.ibm.com
8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Summary

There is a vulnerability in the Network Time Protocol (NTP) implementation embedded within the IBM Virtualization Engine TS7700.

Vulnerability Details

CVEID:CVE-2020-11868
**DESCRIPTION:**NTP is vulnerable to a denial of service, caused by a flaw in ntpd. By sending a server mode packet with a spoofed source IP address, a remote attacker could exploit this vulnerability to block unauthenticated synchronization resulting in a denial of service condition.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/180011 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

All versions of microcode for the IBM Virtualization Engine TS7700 (3957-VEC and 3957-VED) prior to and including the following are affected:

Machine Type Model Version
3957 VEC 8.51.0.63
3957 VED 8.51.0.63

Remediation/Fixes

Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of VTD_EXEC.279 as needed. Minimum microcode versions are shown below:

Machine Type Model Fix
3957 VEC

Upgrade to 8.42.2.12 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.134 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.140 + VTD_EXEC.279

- OR -

Upgrade to 8.50.1.25 + VTD_EXEC.279

- OR -

Upgrade to 8.50.2.6 + VTD_EXEC.279

- OR -

Upgrade to 8.51.0.63 + VTD_EXEC.279

3957| VED|

Upgrade to 8.50.0.134 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.140 + VTD_EXEC.279

- OR -

Upgrade to 8.50.1.25 + VTD_EXEC.279

- OR -

Upgrade to 8.50.2.6 + VTD_EXEC.279

- OR -

Upgrade to 8.51.0.63 + VTD_EXEC.279

The minimum VTD_EXEC version is shown below:

VTD_EXEC Package Version
VTD_EXEC.279 v1.10

Workarounds and Mitigations

Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P