Lucene search

K
ibmIBMF7D773879F43058D6CF74C4E9F889BC8706F145A122F3DB23FF83845FF07C518
HistoryJan 31, 2019 - 1:30 a.m.

Security Bulletin: Vulnerability in SSLv3 affects certain IBM System Networking products running certain levels of firmware (CVE-2014-3566)

2019-01-3101:30:01
www.ibm.com
3

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in the IBM System Networking products identified below in the Affected Products and Versions section of thisbulletin.

Vulnerability Details

Abstract

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in the IBM System Networking products identified below in the Affected Products and Versions section of this bulletin.

Content

Vulnerability Details:

CVE-ID: CVE-2014-3566

Description: Networking devices could allow a remote attacker to obtain sensitive information caused by a design error when using the SSLv3 protocol. A remote user could conduct a man-in-the-middle attack and exploit the POODLE vulnerability to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97013&gt; for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected products and versions

For all the System Networking Products listed below, all firmware versions prior to the versions listed below are affected by this vulnerability.

Systems running older versions of the code need to upgrade to latest firmware versions or take the steps outlined in remediation to remove this vulnerability.

Affected Product Affected Versions
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch Prior to 7.8.5.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch Prior to 7.8.5.0
IBM Flex System Fabric SI4093 System Interconnect Module Prior to 7.8.5.0
IBM 10G Virtual Flex System Module for Bladecenter Prior to 7.8.1.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch Prior to 7.8.5.0
IBM Flex System Interconnect Fabric Prior to 7.8.5.0
IBM System Networking RackSwitch G8052 Prior to 7.8.1.0
IBM System Networking RackSwitch G8124 Prior to 7.9.1.0
IBM System Networking RackSwitch G8124-E Prior to 7.9.1.0
IBM System Networking RackSwitch G8124-ER Prior to 7.9.1.0
IBM System Networking RackSwitch G8264 Prior to 7.8.1.0
IBM System Networking RackSwitch G8316 Prior to 7.8.1.0
IBM System Networking RackSwitch G8264CS Prior to 7.8.1.0
IBM System Networking RackSwitch G8264-T Prior to 7.8.1.0
IBM System Networking RackSwitch G8332 Prior to 7.8.1.0

Remediation/Fixes:

If you are running any firmware version of these products that is affected, you should update firmware to the version of firmware for your product that has the fix as listed below.

Affected Product Fix
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch 7.8.5.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch 7.8.5.0
IBM Flex System Fabric SI4093 System Interconnect Module 7.8.5.0
IBM 10G Virtual Flex System Module for Bladecenter 7.8.1.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch 7.8.5.0
IBM Flex System Interconnect Fabric 7.8.5.0
IBM System Networking RackSwitch G8052 7.8.1.0
IBM System Networking RackSwitch G8124 7.9.1.0
IBM System Networking RackSwitch G8124-E 7.9.1.0
IBM System Networking RackSwitch G8124-ER 7.9.1.0
IBM System Networking RackSwitch G8264 7.8.1.0
IBM System Networking RackSwitch G8316 7.8.1.0
IBM System Networking RackSwitch G8264CS 7.8.1.0
IBM System Networking RackSwitch G8264-T 7.8.1.0
IBM System Networking RackSwitch G8332 7.8.1.0

SSL has been disabled in all of the versions with the fix listed immediately above.

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3. You should verify that disabling SSLv3 does not cause any compatibility issues.

Workaround(s) & Mitigation(s):

For certain older versions of products listed in the table below, a cli command is available to set a minimum version of SSL, thus providing the option to disable the SSLv3 version on the server side. Details on the products and firmware versions for which this mitigation is available in the table below, with instructions on disabling SSLv3 in these versions below the table:

Product FW Version
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch 7.7.8.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch 7.7.8.0
IBM Flex System Fabric SI4093 System Interconnect Module 7.7.8.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch 7.7.8.0
IBM System Networking RackSwitch G8052 7.7.8.0
IBM System Networking RackSwitch G8264 7.7.8.0
IBM System Networking RackSwitch G8264CS 7.7.8.0
IBM System Networking RackSwitch G8332 7.7.13.0

ssl minimum-version <ssl3 | tls10 | tls11 | tls12>
Router(config)#ssl minimum-version ?
ssl3 SSLv3
tls10 TLS 1.0
tls11 TLS 1.1
tls12 TLS 1.2

Setting the minimum SSL version to any value other than SSLv3 disables SSL 3.0 (and any other protocol version older than the version specified when the command is run).

References:

Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Subscribe to Security Bulletins

Acknowledgement

None

Change History
12 November 2014: Original Copy Published

  • The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

3.4 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N