Lucene search

K
ibmIBM797752D98760F52C0614736E2D3266F40F89CA1F4C846A396E545A41E2E90560
HistoryJul 30, 2024 - 4:16 p.m.

Security Bulletin: TSSC/IMC is vulnerable to a Prefix truncation attack on Binary Packet Protocol

2024-07-3016:16:32
www.ibm.com
9
openssh
prefix truncation attack
binary packet protocol
total storage service console
ts4500 imc
cve-2023-48795
cve-2023-51385
upgrade
download patch
execute
machine-in-the-middle attack
extension negotiation
arbitrary commands

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

8.6

Confidence

Low

EPSS

0.965

Percentile

99.6%

Summary

TSSC/IMC is vulnerable to a Prefix truncation attack on Binary Packet Protocold. A patch has been provided that updates the systemd library. CVE-2023-48795, CVE-2023-51385

Vulnerability Details

CVEID:CVE-2023-48795
**DESCRIPTION:**OpenSSH is vulnerable to a machine-in-the-middle attack, caused by a flaw in the extension negotiation process in the SSH transport protocol when used with certain OpenSSH extensions. A remote attacker could exploit this vulnerability to launch a machine-in-the-middle attack and strip an arbitrary number of messages after the initial key exchange, breaking SSH extension negotiation and downgrading the client connection security.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/275282 for the current score.
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVEID:CVE-2023-51385
**DESCRIPTION:**OpenSSH could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of shell metacharacters. By sending a specially crafted request using expansion tokens, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/275402 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
Total Storage Service Console (TSSC) / TS4500 IMC 9.2.11 - 9.5.8

Remediation/Fixes

Affected Product(s) Version(s) Remediation/Fix/Instructions
Total Storage Service Console (TSSC) / TS4500 IMC 9.4.14

Upgrade to 9.4.26/9.5.8

Download patch and execute on TSSC/IMC system

Total Storage Service Console (TSSC) / TS4500 IMC| 9.4.21|

Upgrade to 9.4.26/9.5.8

Download patch and execute on TSSC/IMC system

Total Storage Service Console (TSSC) / TS4500 IMC| 9.4.26| Download patch and execute on TSSC/IMC system
Total Storage Service Console (TSSC) / TS4500 IMC| 9.5.8| Download patch and execute on TSSC/IMC system

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmts7700Match9.4.14
OR
ibmts7700Match9.4.21
OR
ibmts7700Match9.4.26
OR
ibmts7700Match9.5.8
VendorProductVersionCPE
ibmts77009.4.14cpe:2.3:h:ibm:ts7700:9.4.14:*:*:*:*:*:*:*
ibmts77009.4.21cpe:2.3:h:ibm:ts7700:9.4.21:*:*:*:*:*:*:*
ibmts77009.4.26cpe:2.3:h:ibm:ts7700:9.4.26:*:*:*:*:*:*:*
ibmts77009.5.8cpe:2.3:h:ibm:ts7700:9.5.8:*:*:*:*:*:*:*

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

AI Score

8.6

Confidence

Low

EPSS

0.965

Percentile

99.6%