Lucene search

K
ibmIBM7CF405F3B27D94D69557645C8F0C3B55B3AC9AED50EFFD66F1265E467213394E
HistoryJan 19, 2023 - 8:15 p.m.

Security Bulletin: PowerSC is vulnerable to information disclosure due to Bouncy Castle (CVE-2020-15522)

2023-01-1920:15:06
www.ibm.com
15

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

47.1%

Summary

A vulnerability in Bouncy Castle could allow a remote attacker to obtain sensitive information, which could be exploited to obtain private key information (CVE-2020-15522). PowerSC uses Bouncy Castle for cryptography.

Vulnerability Details

CVEID:CVE-2020-15522
**DESCRIPTION:**Bouncy Castle BC Java, BC C# .NET, BC-FJA, BC-FNA could allow a remote attacker to obtain sensitive information, caused by a timing issue within the EC math library. By utilize cryptographic attack techniques, an attacker could exploit this vulnerability to obtain the private key information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/202188 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
PowerSC All

The vulnerabilities in the following filesets are being addressed:

Fileset Lower Level Upper Level
powerscStd.tnc_pm 1.3.0.4 2.1.0.3

Note: To find out whether the affected PowerSC filesets are installed on your systems, refer to the lslpp command found in AIX user’s guide.

Example: lslpp -l | grep powerscStd

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Recommended remediation is to update to PowerSC 2.1.0.4 or later:

[PowerSC Fix Central](<https://www.ibm.com/support/fixcentral/swg/selectFixes?parent=Virtualiza tion%20software&product=ibm/power/IBM+PowerSC&release=All&platform=All&function= all> “PowerSC Fix Central” )

Workarounds and Mitigations

None

CPENameOperatorVersion
powersc standard editioneq2.1

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

47.1%