IBM Support

Security Bulletin: The IBM FlashSystem 840 product is affected by a vulnerability in OpenSSL (CVE-2014-0224 = SSL/TLS MITM vulnerability)

Security Bulletin


Summary

Security vulnerability has been discovered in OpenSSL

Vulnerability Details

CVE-ID: CVE-2014-0224

DESCRIPTION: FlashSystem 840 uses OpenSSL to protect connection from external management applications which use SMI-S to its CIM client.

Affected versions of OpenSSL do not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, a.k.a. the "CCS Injection" vulnerability.

An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.

The attack can only be performed between a vulnerable client *and* a vulnerable server. However, as of when this CVE was posted, all OpenSSL clients were vulnerable (i.e. in all versions of OpenSSL). And in code levels before 1.1.2.0, the FlashSystem 840 has a vulnerable OpenSSL server.

CVSS v2 Base Score: 6.8
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/93586
CVSS Vector: (AV:N/AC:M/AU:N/C:P/I:P/A:P)

Affected Products and Versions

FlashSystem 840 including machine type models (all available code levels)
9840-AE1 & 9843-AE1

Remediation/Fixes

Products

VRMFAPARRemediation/First Fix
9840-AE1,
9843-AE1,
A code fix is now available, the VRMF of this code level is 1.1.2.2N/AThe recommended remediation is to apply this code fix for this OpenSSL vulnerability.

Workarounds and Mitigations

A user could potentially restrict his network so that there is no opportunity for an attacker to insert himself as man-in-the-middle.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

30 Jun 2014 Original Copy Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"STKMQB","label":"IBM FlashSystem 900"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Component":"Security Bulletin","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"Version Independent","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
17 February 2023

UID

ssg1S1004744