SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM Tivoli Composite Application Manager for Transactions.
CVE-ID: CVE-2014-3566
DESCRIPTION: Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/97013> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
IBM Tivoli Composite Application Manager (ITCAM) for Transactions is affected. ITCAM for Transactions contains multiple sub components (Agents).
The Internet Service Monitor (ISM – Agent code ‘IS’) is affected in versions 7.1, 7.2, 7.3 and 7.4.
The Application Management Console (AMC – Agent code ‘AMC’) is affected in versions 7.1, 7.2, 7.3, 7.4.
ISM:
Product | VRMF | APAR | Remediation/First Fix |
---|---|---|---|
7.4.0.0-TIV-CAMIS-IF0023 | 7.4.0.0 | None | http://www.ibm.com/support/docview.wss?uid=isg400001970 |
7.3.0.1-TIV-CAMIS-IF0032 | 7.3.0.1 | None | http://www.ibm.com/support/docview.wss?uid=isg400001982 |
7.2.0.3-TIV-CAMIS-IF0028 | 7.2.0.3 | None | http://www.ibm.com/support/docview.wss?uid=isg400001943 |
Will Not Fix | 7.1.0.0 | None | Upgrade to 7.4.0.0-TIV-CAMIS-IF0023 |
AMC: Product | VRMF | APAR | Remediation/First Fix |
---|---|---|---|
7.4.0.0-TIV-CAMRT-IF0024 | 7.4.0.0 | None | http://www.ibm.com/support/docview.wss?uid=isg400001980 |
7.3.0.1-TIV-CAMRT-IF0033 | 7.3.0.1 | None | http://www.ibm.com/support/docview.wss?uid=isg400001981 |
Will Not Fix | 7.2.0.0 | None | Upgrade to 7.4.0.0-TIV-CAMRT-IF0024 |
Will Not Fix | 7.1.0.0 | None | Upgrade to 7.4.0.0-TIV-CAMRT-IF0024 |
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.