Security Bulletin
Summary
There are multiple vulnerabilities in Network Time Protocol(NTP) implementation that is used by WebSphere DataPower XC10 Appliance. These vulnerabilities addressed include the ability to disable the NTP client and bypass security restrictions to bypass the timestamp validation check.
Vulnerability Details
CVEID: CVE-2015-5300
DESCRIPTION: Network Time Protocol (NTP) could allow a remote attacker to bypass security restrictions, caused by the failure to correctly implement the threshold limitation for the '-g' option. An attacker could exploit this vulnerability using man-in-the-middle techniques to intercept NTP traffic and make multiple steps larger than the panic threshold.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107594 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
CVEID: CVE-2015-7704
DESCRIPTION: Network Time Protocol (NTP) is vulnerable to a denial of service, caused by an error in the rate-limiting mechanism. By sending spoofed Kiss-o'-Death packets, an attacker could exploit this vulnerability to disable NTP at a victim client.
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107446 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2015-8138
DESCRIPTION: NTP could allow a remote attacker to bypass security restrictions. By sending a specially crafted packet with an origin timestamp of zero, an attacker could exploit this vulnerability to bypass the timestamp validation check.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/110025 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
WebSphere DataPower XC10 Appliance Version 2.1
WebSphere DataPower XC10 Appliance Version 2.5
Remediation/Fixes
Apply an interim fix, according to the table below. Interim fixes are associated with the original APAR that is documented in the table. Because these APAR references might be updated to more recent APARs, see the links in the table for the most recent interim fix information.
This interim fix contains a new default SSL certificate, as the previous default SSL certificate, which was never intended for production use, has an MD5 signature and is no longer compatible with Java. The result is that installing this interim fix will make it incompatible with any WebSphere Datapower XC10 appliances that are running with an MD5 certificate, including the default SSL certificate that was shipped prior to this interim fix. If the appliance is configured with a custom keystore and certificate with an MD5 signature, it must be replaced prior to upgrading to this interim fix or the 'clear-tls-config' command must be run on the appliance before or after performing the upgrade. Failing to do so will result in the appliance failing to start. Note that changing the active certificate for an appliance collective does require that the cache be reloaded and client truststores must be configured to trust the new certificate.
Product | Version | APAR | Link to interim fix |
WebSphere DataPower XC10 Appliance V2.1 on appliance 9235-92X | 2.1 | IT14471 | Refer to the Version 2.1 table in Recommended fixes for WebSphere DataPower XC10 Appliance. |
WebSphere DataPower XC10 Appliance V2.1 on appliance 7199-92X | 2.1 | IT14471 | Refer to the Version 2.1 table in Recommended fixes for WebSphere DataPower XC10 Appliance. |
WebSphere DataPower XC10 Appliance V2.5 on appliance 7199-92X | Version 2.5 Important: See More information link and follow instructions to determine if you have an old or newer SSD driver on your appliance using the show ssd-version command. | IT14471 | Refer to the Version 2.5 table in Recommended fixes for WebSphere DataPower XC10 Appliance. |
WebSphere DataPower XC10 Appliance V2.5 virtual image | 2.5 | IT14471 | Refer to the Version 2.5 table in Recommended fixes for WebSphere DataPower XC10 Appliance. |
Workarounds and Mitigations
There is no workaround. The interim fix must be applied to correct the problem.
Get Notified about Future Security Bulletins
References
Change History
29 Apr 2016: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
15 June 2018
UID
swg21980676