Lucene search

K
ibmIBM74E497C52EEB8AD45FB3C1BCF26BE85AF9228F556103D174A27BE7A01D9231D1
HistoryJun 25, 2021 - 4:46 p.m.

Security Bulletin: Vulnerability in RC4 stream cipher affects GPFS V3.5 for Windows (CVE-2015-2808) / Enabling weak cipher suites for IBM General Parallel File System is NOT recommended

2021-06-2516:46:35
www.ibm.com
40

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.1%

Summary

The RC4 “Bar Mitzvah” Attack for SSL/TLS affects OpenSSH for GPFS V3.5 for Windows. Additionally, with the recent attention to RC4 “Bar Mitzvah” Attack for SSL/TLS, this is a reminder to NOT enable weak or export-level cipher suites for IBM General Parallel File System (GPFS).

Vulnerability Details

CVEID: CVE-2015-2808
DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. This vulnerability is commonly referred to as “Bar Mitzvah Attack”.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/101851&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

OpenSSH for GPFS V3.5 for Windows

Remediation/Fixes

In GPFS V3.5.0.24 dated April 2015, IBM upgraded OpenSSH for GPFS on Windows to remove RC4 ciphers to address this vulnerability. System administrators should update their systems to GPFS V3.5.0.24 by following the steps below.

1. Download the GPFS 3.5.0.24 update package dated April 2015 into any directory on your system. From IBM at http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Cluster%2Bsoftware&product=ibm/power/IBM+General+Parallel+File+System&release=3.5.0&platform=Windows&function=all

2. Extract the contents of the ZIP archive so that the .msi file it includes is directly accessible to your system.

3. Follow the instructions in the README included in the update package in order to install the OpenSSH msi package. This updated OpenSSH msi package is built to disable RC4 ciphers.

If GPFS multiclustering is configured on Windows nodes, upgrade all OpenSSL packages that may have been installed. The following can be done on a small group of nodes at each time (ensuring that quorum is maintained) to maintain file system availability:

a. Stop GPFS on the node
b. Install the version of OpenSSL
c. Restart GPFS on the node

You should verify applying this fix does not cause any compatibility issues. The fix removes RC4 stream cipher in the OpenSSH binaries. As such, RC4 cipher cannot be enabled. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.

Workarounds and Mitigations

If you enabled the RC4 stream cipher you are exposed to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.

IBM GPFS V4.1 Advanced Edition, when encrypting data at rest, by default disables RC4 stream cipher.

IBM GPFS V4.1 (all Editions), when GPFS operates in NIST 800-131A mode the system is not vulnerable.

In all versions of GPFS, the cipherList configuration parameter to enable transport-level security and authentication should be set to avoid using weak ciphers. In particular, EXP-RC2-CBC-MD5, EXP-RC4-MD5, RC4-MD5 and RC4-SHA should be avoided.

Note: Customers who use AUTHONLY as cipherList are not affected.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.1%

Related for 74E497C52EEB8AD45FB3C1BCF26BE85AF9228F556103D174A27BE7A01D9231D1