Lucene search

K
ibmIBM731FC1609741391D31EC34D19692971CCA22487017ECAB7CA5833DADB91D596C
HistoryJun 25, 2024 - 10:19 p.m.

Security Bulletin: IBM Virtualization Engine TS7700 is susceptible to multiple vulnerabilities in WebSphere Application Server Liberty

2024-06-2522:19:03
www.ibm.com
8
ibm virtualization engine
ts7700
websphere application server liberty
cve-2023-50312
cve-2023-46158
cve-2023-44487
cve-2024-25026
denial of service
security vulnerabilities

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.732 High

EPSS

Percentile

98.1%

Summary

IBM Virtualization Engine TS7700 is vulnerable to two potential denial of service conditions (CVE-2023-44487, CVE-2024-25026) and two instances of weaker than expected security (CVE-2023-50312, CVE-2023-46158) due to WebSphere Application Server Liberty. WebSphere Application Server Liberty is used by the TS7700 in the Management Interface. IBM Virtualization Engine TS7700 has addressed the applicable CVEs.

Vulnerability Details

CVEID:CVE-2023-50312
**DESCRIPTION:**IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.2 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration. IBM X-Force ID: 274711.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/274711 for the current score.
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:CVE-2023-46158
**DESCRIPTION:**IBM WebSphere Application Server Liberty 23.0.0.9 through 23.0.0.10 could provide weaker than expected security due to improper resource expiration handling. IBM X-Force ID: 268775.
CVSS Base score: 4.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268775 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)

CVEID:CVE-2023-44487
**DESCRIPTION:**Multiple vendors are vulnerable to a denial of service, caused by a flaw in handling multiplexed streams in the HTTP/2 protocol. By sending numerous HTTP/2 requests and RST_STREAM frames over multiple streams, a remote attacker could exploit this vulnerability to cause a denial of service due to server resource consumption.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268044 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2024-25026
**DESCRIPTION:**IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 are vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 281516.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/281516 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM System Storage Virtualization Engine TS7700 3957-VED
IBM System Storage Virtualization Engine TS7700 3948-VED

All versions of microcode for the IBM Virtualization Engine TS7700 (3957-VED, and 3948-VED) prior to and including the following are affected:

Machine Type Model Release Version
3957 VED R5.3 8.53.1.21
R5.4 8.54.1.27
3948 VED R5.3 8.53.1.21
R5.4 8.54.1.27

Note: End of Development (EoD) support was announced for 3957-VEC, effective 31 December 2023, after which time no more code fixes will be provided. Please see <https://www.ibm.com/docs/en/announcements/2023-hardware-maintenance-services-withdrawal&gt; for more information.

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by visiting <https://tape.ibmrcl.enterpriseappointments.com/v2/&gt; or contacting IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of the appropriate VTD_EXEC as needed. Minimum microcode versions are shown below:

Machine Type Model Release Fix
3957 VED R5.3 Upgrade to 8.53.1.21 + VTD_EXEC.903
R5.4 Upgrade to 8.54.1.27 + VTD_EXEC.904
3948 VED R5.3 Upgrade to 8.53.1.21 + VTD_EXEC.903
R5.4 Upgrade to 8.54.1.27 + VTD_EXEC.904

The minimum VTD_EXEC version is shown below:

VTD_EXEC Package Version
VTD_EXEC.903 v1.16
VTD_EXEC.904 v1.04

Workarounds and Mitigations

Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.

Affected configurations

Vulners
Node
ibmts7700Match3948
OR
ibmnoteMatch2023
OR
ibmsystem_storage_virtualization_engine_ts7700Match3957
OR
ibmsystem_storage_virtualization_engine_ts7700Match3948

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.732 High

EPSS

Percentile

98.1%