Lucene search

K
ibmIBMB7A5B80DBCEDEEF8D9B6D11CFA1411694B3C84634BDFBD0916EF78B6CD9B8C10
HistorySep 22, 2022 - 3:20 p.m.

Security Bulletin: IBM Common Cryptographic Architecture (CCA) is vulnerable to denial of service (CVE-2022-22423)

2022-09-2215:20:36
www.ibm.com
41

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.3%

Summary

Insufficient input validation in IBM Common Cryptographic Architecture (CCA) may affect Hardware Security Module (HSM) availability. An affected IBM 4767 or IBM 4769 HSM may be forced into a check-stop condition by specially-crafted requests from HSM users. Recovery from a check-stop condition requires manual intervention.

Vulnerability Details

CVEID:CVE-2022-22423
**DESCRIPTION:**IBM Common Cryptographic Architecture (CCA) could allow a local user to cause a denial of service due to improper input validation.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223596 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Platform(s) Version(s)
CCA 5.x MTM for 4767

IBM AIX, IBM i, Linux (Intel x86 platforms)

| 5.0.0 - 5.7.11
CCA 7.x MTM for 4769|

IBM AIX, IBM i, IBM PowerLinux, Linux (Intel x86 platforms)

| 7.0.0 - 7.3.43

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading:

Product(s) Fixed Version(s)
CCA 5.x MTM for 4767 5.7.12 or later
CCA 7.x MTM for 4769 7.3.44 or later

Platform-specific upgrade information:

IBM AIX

For CCA 5.x for 4767, please download version 5.7.12 or later from the CCA Software Download Page.

For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.

IBM i

The vulnerability can be fixed by applying a PTF to IBM i. Releases 7.5, 7.4, 7.3, and 7.2 of IBM i will be fixed. Each PTF bundles updates to CCA 5.x MTM for 4767 and CCA 7.x MTM for 4769, bringing their respective firmware levels to 5.7.12 and 7.3.44 or later, respectively.

The PTF numbers containing the fix for this vulnerability are in the following table:

IBM i release|

**5733-CY3 IBM Cryptographic Device Manager for i PTF Number **

—|—
7.5| SI79698
7.4| SI79699
7.3| SI79700
7.2 (4767 Only)| SI79701

IBM PowerLinux

For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.

**Linux on Intel x86 **

For CCA 5.x for 4767, please download version 5.7.12 or later from the CCA Software Download Page.

For CCA 7.x for 4769, please download version 7.3.44 or later from the CCA Software Download Page.

Workarounds and Mitigations

None

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

1.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:N/A:P

0.0004 Low

EPSS

Percentile

5.3%

Related for B7A5B80DBCEDEEF8D9B6D11CFA1411694B3C84634BDFBD0916EF78B6CD9B8C10