3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM eDiscovery Analyzer
CVE-ID: CVE-2014-3566
DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
IBM eDiscovery Analyzer Version 2.1
IBM InfoSphere eDiscovery Analyzer Version 2.1.1
IBM eDiscovery Analyzer Version 2.2
IBM eDiscovery Analyzer Version 2.2.1
IBM eDiscovery Analyzer Version 2.2.2
The recommended solution is to apply the fix to the affected version, 2.2.2.1 as soon as practical. If you need further assistance, please contact IBM Support.
Go to Fix Central site and install the fix applicable to the version.
2.2.2.2 stream:
2.2.1.1 streams:
If you are on a version other than Version 2.2.2.1, apply the workaround.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3
To disable SSLv3 in all versions of IBM eDiscovery Analyzer, perform the following steps.
Stop the IBM eDiscovery Analyzer server.
Make a copy of the jetty.xml file. This file is located in the config directory in the location where IBM eDiscovery Analyzer was installed (on Windows the file will be in C:\Program Files (x86)\IBM\eDiscoveryAnalyzer\config
by default, and on AIX it will be in /opt/IBM/eDiscoveryAnalyzer/config
by default.)
Open the original jetty.xml file (as located in the previous step) in a text editor.
In the file, locate the following line:
<New class="org.mortbay.jetty.security.SslSelectChannelConnector">
Then locate this line within the scope of the “New” node located in the step above:
<Set name="Protocol">SSLv3</Set>
Change this line to be:
<Set name="Protocol">``**TLSv1**``</Set>
Save the jetty.xml file and exit the text editor.
Start the IBM eDiscovery Analyzer server.
The steps above will disable SSLv3 and force the TLS protocol to be used in all HTTPS communications with IBM eDiscovery Analyzer.
CPE | Name | Operator | Version |
---|---|---|---|
ediscovery analyzer | eq | 2.2.2 | |
ediscovery analyzer | eq | 2.2.1 | |
ediscovery analyzer | eq | 2.2.0.0 | |
ediscovery analyzer | eq | 2.1.1 | |
ediscovery analyzer | eq | 2.1 |
3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N