IBM Support

Security Bulletin: Vulnerability in SSLv3 affects WebSphere DataPower XC10 Appliance versions 2.1 and 2.5 (CVE-2014-3566)

Created by Michael Stuy on
Published URL:
https://www.ibm.com/support/pages/node/519343
519343

Security Bulletin


Summary

SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in the WebSphere DataPower XC10 Appliance versions 2.1 and 2.5.

Vulnerability Details

CVE-ID: CVE-2014-3566

DESCRIPTION: The product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plain text of encrypted connections, if those connections traverse a network to which the attacker has access.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

WebSphere DataPower XC10 Appliance Version 2.1
WebSphere DataPower XC10 Appliance Version 2.5

Remediation/Fixes

For WebSphere DataPower XC10 Appliance Version 2.5, the required change is in configuration, and the required changes are described below.

For WebSphere DataPower XC10 Appliance Version 2.1, a firmware upgrade is necessary in order to disable SSLv3. Then follow the instructions in the mitigation section below. If this firmware upgrade is applied, and the configuration change to run as TLS only is made, then when upgrading to Version 2.5 firmware, one should apply the 2.5 firmware upgrade listed below or a later level, so that the TLS-only configuration setting is preserved.

<ProductVRMFAPARRemediation/First Fix
WebSphere DataPower XC10 ApplianceVersion 2.1 on appliance 9235-92XAPAR IT05134http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+DataPower+XC10+Appliance&release=2.1.0.3&platform=All&function=all
WebSphere DataPower XC10 Appliance Version 2.1 on appliance 7199-92XAPAR IT05134http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+DataPower+XC10+Appliance&release=2.1.0.3&platform=All&function=all
WebSphere DataPower XC10 ApplianceVersion 2.5 with older SSD drivers (see instructions)APAR IT05134http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+DataPower+XC10+Appliance&release=2.5.0.3&platform=All&function=all
WebSphere DataPower XC10 Appliance Version 2.5 with newer SSD drivers (see instructionsAPAR IT05134http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+DataPower+XC10+Appliance&release=2.5.0.3&platform=All&function=all
WebSphere DataPower XC10 Appliance Version 2.5 virtual image for developersAPAR IT05134http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/WebSphere/WebSphere+DataPower+XC10+Appliance&release=2.5.0.3&platform=All&function=all

Workarounds and Mitigations

IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3.

To disable SSLv3 for XC10 Version 2.5, take the following steps. From the administrative user interface, under Collective-->Settings-->Manage cryptography standard, specify any of the settings FIPS 140-2, SP800-131a transition, SP800-131a transition with TLSv1.2, or SP800-131a strict. Any of these settings will disable SSLv3. Appliance client applications must be configured so that they can support TLSv1, or TLSv1.2 if that is used. The SP800-131a strict configuration requires TLSv1.2. If the 2.5 firmware upgrade given above is applied, or a later level of firmware is used, it is also possible to use a TLSv1 setting, in addition to those already listed. Then click Apply changes now. This will restart the collective, and data in the cache at the time of the restart will be lost.

For Version 2.1, apply the firmware upgrade given above. If the appliance is in a collective, all the appliances in the collective should be upgraded before making the configuration change. Then, from the administrative user interface, under Appliance-->Settings-->Security-->Manage cryptography standard, specify TLSv1, and then click Submit TLS Settings. This operation will restart the collective, and data in the cache at the time of the restart will be lost.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support alerts like this one.

Get Notified about Future Security Bulletins

References

Off

Change History

<Day Month Year .. example 10 April 2014>:

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSS8GR","label":"WebSphere DataPower XC10 Appliance"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Not Applicable","Platform":[{"code":"PF009","label":"Firmware"}],"Version":"2.5;2.1","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
15 June 2018

UID

swg21690323