Security Bulletin
Summary
Security vulnerability has been discovered in OpenSSL
Vulnerability Details
DESCRIPTION: FlashSystem 840 uses OpenSSL to protect connection from external management applications which use SMI-S to its CIM client.
Affected versions of OpenSSL do not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, a.k.a. the "CCS Injection" vulnerability.
An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
The attack can only be performed between a vulnerable client *and* a vulnerable server. However, as of when this CVE was posted, all OpenSSL clients were vulnerable (i.e. in all versions of OpenSSL). And in code levels before 1.1.2.0, the FlashSystem 840 has a vulnerable OpenSSL server.
CVSS v2 Base Score: 6.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93586
CVSS Vector: (AV:N/AC:M/AU:N/C:P/I:P/A:P)
Affected Products and Versions
FlashSystem 840 including machine type models (all available code levels)
9840-AE1 & 9843-AE1
Remediation/Fixes
Products | VRMF | APAR | Remediation/First Fix |
9840-AE1, 9843-AE1, | A code fix is now available, the VRMF of this code level is 1.1.2.2 | N/A | The recommended remediation is to apply this code fix for this OpenSSL vulnerability. |
Workarounds and Mitigations
A user could potentially restrict his network so that there is no opportunity for an attacker to insert himself as man-in-the-middle.
Get Notified about Future Security Bulletins
References
Acknowledgement
None
Change History
30 Jun 2014 Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 February 2023
UID
ssg1S1004744