5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.003 Low
EPSS
Percentile
65.1%
The RC4 “Bar Mitzvah” Attack for SSL/TLS affects OpenSSH for GPFS V3.5 for Windows. Additionally, with the recent attention to RC4 “Bar Mitzvah” Attack for SSL/TLS, this is a reminder to NOT enable weak or export-level cipher suites for IBM General Parallel File System (GPFS).
CVEID: CVE-2015-2808
DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. This vulnerability is commonly referred to as “Bar Mitzvah Attack”.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/101851> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
OpenSSH for GPFS V3.5 for Windows
In GPFS V3.5.0.24 dated April 2015, IBM upgraded OpenSSH for GPFS on Windows to remove RC4 ciphers to address this vulnerability. System administrators should update their systems to GPFS V3.5.0.24 by following the steps below.
1. Download the GPFS 3.5.0.24 update package dated April 2015 into any directory on your system. From IBM at http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Cluster%2Bsoftware&product=ibm/power/IBM+General+Parallel+File+System&release=3.5.0&platform=Windows&function=all
2. Extract the contents of the ZIP archive so that the .msi file it includes is directly accessible to your system.
3. Follow the instructions in the README included in the update package in order to install the OpenSSH msi package. This updated OpenSSH msi package is built to disable RC4 ciphers.
If GPFS multiclustering is configured on Windows nodes, upgrade all OpenSSL packages that may have been installed. The following can be done on a small group of nodes at each time (ensuring that quorum is maintained) to maintain file system availability:
a. Stop GPFS on the node
b. Install the version of OpenSSL
c. Restart GPFS on the node
You should verify applying this fix does not cause any compatibility issues. The fix removes RC4 stream cipher in the OpenSSH binaries. As such, RC4 cipher cannot be enabled. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.
If you enabled the RC4 stream cipher you are exposed to the attack described above. IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.
IBM GPFS V4.1 Advanced Edition, when encrypting data at rest, by default disables RC4 stream cipher.
IBM GPFS V4.1 (all Editions), when GPFS operates in NIST 800-131A mode the system is not vulnerable.
In all versions of GPFS, the cipherList configuration parameter to enable transport-level security and authentication should be set to avoid using weak ciphers. In particular, EXP-RC2-CBC-MD5, EXP-RC4-MD5, RC4-MD5 and RC4-SHA should be avoided.
Note: Customers who use AUTHONLY as cipherList are not affected.
CPE | Name | Operator | Version |
---|---|---|---|
general parallel file system | eq | 3.5.0 | |
general parallel file system | eq | 4.1.0 |