Lucene search

K
ibmIBM71FBF8555AAD422A6CFBD04F74CFE51CC1AEC38FBDA7E4AA1F81CFC3FCC15128
HistoryDec 25, 2023 - 10:30 a.m.

Security Bulletin: Multiple Multiple Vulnerabilities in Docker affect Cloud Pak System [CVE-2023-28840, CVE-2023-28841, CVE-2023-28842]

2023-12-2510:30:07
www.ibm.com
11
docker
cloud pak system
ibm
vulnerabilities
denial of service
sensitive information
interim fix

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

7.8 High

AI Score

Confidence

Low

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

0.003 Low

EPSS

Percentile

69.8%

Summary

Vulnerabilities were identified within Docker shipped as pattern type (pType) component with Cloud Pak System Software. IBM Cloud Pak System Software addressed these vulnerabilities [CVE-2023-28840, CVE-2023-28841, CVE-2023-28842].

Vulnerability Details

CVEID:CVE-2023-28840
**DESCRIPTION:**Moby is vulnerable to a denial of service, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request to inject arbitrary Ethernet frames into the encrypted overlay network, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251927 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L)

CVEID:CVE-2023-28841
**DESCRIPTION:**Moby could allow a remote attacker to obtain sensitive information, caused by the missing of encrypted sensitive data within the overlay network driver. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251928 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)

CVEID:CVE-2023-28842
**DESCRIPTION:**Moby could allow a remote attacker to bypass security restrictions, caused by an unprotected alternate channel within encrypted overlay networks. By sending a specially crafted request, an attacker could exploit this vulnerability to inject arbitrary Ethernet frames into the encrypted overlay network by encapsulating them in VXLAN datagrams.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/251929 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak System 2.3.3.0 - 2.3.3.6 (Intel)
IBM Cloud Pak System Software Suite 2.3.3.0 - 2.3.3.6 (Intel)

Remediation/Fixes

For earlier and unsupported versions of the products, IBM recommends upgrading to a fixed, supported version of the product.

The recommended solution is to apply the applicable IBM Cloud Pak System Interim Fix as soon as practical.

IBM Cloud Pak System V2.3.3.6 Interim Fix 1 provides pType docker v20.10.24.

For IBM Cloud Pak System V2.3.0.1 - V2.3.3.5,

- Upgrade to IBM Cloud Pak System V2.3.3.6

- apply Cloud Pak System v2.3.3.6 Interim Fix 1 at IBM Fix Central.

Information on upgrading here <https://www.ibm.com/support/pages/node/6959035&gt;

For IBM Cloud Pak System V2.3.3.6

- Upgrade to Cloud Pak System v2.3.3.6 Interim Fix 1 at IBM Fix Central.

Information on upgrading here <https://www.ibm.com/support/pages/node/7017280&gt;

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm cloud pak system softwareeq2.3.3

8.7 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H

7.8 High

AI Score

Confidence

Low

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:N/I:P/A:P

0.003 Low

EPSS

Percentile

69.8%