3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in the IBM System Networking products identified below in the Affected Products and Versions section of thisbulletin.
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in the IBM System Networking products identified below in the Affected Products and Versions section of this bulletin.
Vulnerability Details:
CVE-ID: CVE-2014-3566
Description: Networking devices could allow a remote attacker to obtain sensitive information caused by a design error when using the SSLv3 protocol. A remote user could conduct a man-in-the-middle attack and exploit the POODLE vulnerability to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97013> for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
For all the System Networking Products listed below, all firmware versions prior to the versions listed below are affected by this vulnerability.
Systems running older versions of the code need to upgrade to latest firmware versions or take the steps outlined in remediation to remove this vulnerability.
Affected Product | Affected Versions |
---|---|
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch | Prior to 7.8.5.0 |
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch | Prior to 7.8.5.0 |
IBM Flex System Fabric SI4093 System Interconnect Module | Prior to 7.8.5.0 |
IBM 10G Virtual Flex System Module for Bladecenter | Prior to 7.8.1.0 |
IBM Flex System EN2092 1Gb Ethernet Scalable Switch | Prior to 7.8.5.0 |
IBM Flex System Interconnect Fabric | Prior to 7.8.5.0 |
IBM System Networking RackSwitch G8052 | Prior to 7.8.1.0 |
IBM System Networking RackSwitch G8124 | Prior to 7.9.1.0 |
IBM System Networking RackSwitch G8124-E | Prior to 7.9.1.0 |
IBM System Networking RackSwitch G8124-ER | Prior to 7.9.1.0 |
IBM System Networking RackSwitch G8264 | Prior to 7.8.1.0 |
IBM System Networking RackSwitch G8316 | Prior to 7.8.1.0 |
IBM System Networking RackSwitch G8264CS | Prior to 7.8.1.0 |
IBM System Networking RackSwitch G8264-T | Prior to 7.8.1.0 |
IBM System Networking RackSwitch G8332 | Prior to 7.8.1.0 |
If you are running any firmware version of these products that is affected, you should update firmware to the version of firmware for your product that has the fix as listed below.
Affected Product | Fix |
---|---|
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch | 7.8.5.0 |
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch | 7.8.5.0 |
IBM Flex System Fabric SI4093 System Interconnect Module | 7.8.5.0 |
IBM 10G Virtual Flex System Module for Bladecenter | 7.8.1.0 |
IBM Flex System EN2092 1Gb Ethernet Scalable Switch | 7.8.5.0 |
IBM Flex System Interconnect Fabric | 7.8.5.0 |
IBM System Networking RackSwitch G8052 | 7.8.1.0 |
IBM System Networking RackSwitch G8124 | 7.9.1.0 |
IBM System Networking RackSwitch G8124-E | 7.9.1.0 |
IBM System Networking RackSwitch G8124-ER | 7.9.1.0 |
IBM System Networking RackSwitch G8264 | 7.8.1.0 |
IBM System Networking RackSwitch G8316 | 7.8.1.0 |
IBM System Networking RackSwitch G8264CS | 7.8.1.0 |
IBM System Networking RackSwitch G8264-T | 7.8.1.0 |
IBM System Networking RackSwitch G8332 | 7.8.1.0 |
SSL has been disabled in all of the versions with the fix listed immediately above.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3. You should verify that disabling SSLv3 does not cause any compatibility issues.
For certain older versions of products listed in the table below, a cli command is available to set a minimum version of SSL, thus providing the option to disable the SSLv3 version on the server side. Details on the products and firmware versions for which this mitigation is available in the table below, with instructions on disabling SSLv3 in these versions below the table:
Product | FW Version |
---|---|
IBM Flex System Fabric EN4093/EN4093R 10Gb Scalable Switch | 7.7.8.0 |
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch | 7.7.8.0 |
IBM Flex System Fabric SI4093 System Interconnect Module | 7.7.8.0 |
IBM Flex System EN2092 1Gb Ethernet Scalable Switch | 7.7.8.0 |
IBM System Networking RackSwitch G8052 | 7.7.8.0 |
IBM System Networking RackSwitch G8264 | 7.7.8.0 |
IBM System Networking RackSwitch G8264CS | 7.7.8.0 |
IBM System Networking RackSwitch G8332 | 7.7.13.0 |
ssl minimum-version <ssl3 | tls10 | tls11 | tls12>
Router(config)#ssl minimum-version ?
ssl3 SSLv3
tls10 TLS 1.0
tls11 TLS 1.1
tls12 TLS 1.2
Setting the minimum SSL version to any value other than SSLv3 disables SSL 3.0 (and any other protocol version older than the version specified when the command is run).
Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Subscribe to Security Bulletins
Acknowledgement
None
Change History
12 November 2014: Original Copy Published
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
3.4 Low
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N