4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
The “FREAK: Factoring Attack on RSA-EXPORT keys" TLS/SSL client and server vulnerability affects IBM embedded WebSphere Application Server that is used by Tivoli Workload Scheduler.
CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers.
This vulnerability is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: See http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Tivoli Workload Scheduler is potentially impacted by the listed vulnerabilities since they potentially affect secure communications between eWAS and subcomponents through Java exposures.
The issues have been fixed updating Java inside eWAS installed with the latest fixpack version of TWS.
The affected versions are:
Tivoli Workload Scheduler Distributed 8.4.0
Tivoli Dynamic Workload Console 8.4.0
Tivoli Workload Scheduler Distributed 8.5.0
Tivoli Dynamic Workload Console 8.5.0
Tivoli Workload Scheduler z/OS Connector 8.5.0
Tivoli Workload Scheduler Distributed 8.5.1
Tivoli Dynamic Workload Console 8.5.1
Tivoli Workload Scheduler z/OS Connector 8.5.1
Tivoli Workload Scheduler Distributed 8.6.0
Tivoli Dynamic Workload Console 8.6.0
Tivoli Workload Scheduler z/OS Connector 8.6.0
For Tivoli Workload Scheduler Distributed 9.1 and 9.2 the only change needed is the one that refers to localopts.
Since TWS 9.1 and 9.2 did not include WebSphere Application Server refer to
http://www-01.ibm.com/support/docview.wss?uid=swg21698613 to patch this product.
IBM has provided patches for all affected versions. Follow the installation instructions in the README files included with the patch.
After patch has been installed, before restarting the product, it is necessary to perform the following step for Master Domain Managers, Backup Master Domain Manager and classic FTA (no changes for Dynamic Agent or zCentric):
Locate in the the localopts file the line
#CLI SSL chiper = MD5
and change it in
CLI SSL cipher = HIGH
(notice that original string “chiper” was incorrect so please change it to “cipher”)
Apar IV71618 has been opened for the issues.
For TWS 8.4.0, 8.5.0, 8.5.1 it is mandatory to install the Limited Availability fixes IV61280 and IV70762 before applying Limited Availability fix IV71618. For TWS 8.6.0, it is mandatory to install the Limited Availability fix IV70762 before applying IV71618.
The following interim fixes for IV71618 will be available for download on FixCentral:
8.4.0-TIV-TWS-FP0007- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.4.0 FP07
8.5.0-TIV-TWS-FP0005- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.5.0 FP05
8.5.1-TIV-TWS-FP0005- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.5.1 FP05
8.6.0-TIV-TWS-FP0003- IV71618
to be applied on top of Tivoli Workload Scheduler Distributed 8.6.0 FP03
and officially included in next fixpacks for the affected TWS versions.
Further information about WebSphere configuration and fix can be found here
http://www-01.ibm.com/support/docview.wss?uid=swg21698613
You should verify applying this fix does not cause any compatibility issues.
For unsupported releases IBM recommends upgrading to a fixed, supported version/release/platform of the product.
You should verify applying this configuration change does not cause any compatibility issues.