IBM Support

Security Bulletin: Vulnerability in Network Time Protocol (NTP) affects IBM Virtualization Engine TS7700 (CVE-2020-11868)

Security Bulletin


Summary

There is a vulnerability in the Network Time Protocol (NTP) implementation embedded within the IBM Virtualization Engine TS7700.

Vulnerability Details

CVEID:   CVE-2020-11868
DESCRIPTION:   NTP is vulnerable to a denial of service, caused by a flaw in ntpd. By sending a server mode packet with a spoofed source IP address, a remote attacker could exploit this vulnerability to block unauthenticated synchronization resulting in a denial of service condition.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/180011 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

All versions of microcode for the IBM Virtualization Engine TS7700 (3957-VEC and 3957-VED) prior to and including the following are affected:

Machine TypeModelVersion
3957VEC8.51.0.63
3957VED8.51.0.63

Remediation/Fixes

Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of VTD_EXEC.279 as needed. Minimum microcode versions are shown below:

Machine TypeModelFix
3957VEC

Upgrade to 8.42.2.12 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.134 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.140 + VTD_EXEC.279

- OR -

Upgrade to 8.50.1.25 + VTD_EXEC.279

- OR -

Upgrade to 8.50.2.6 + VTD_EXEC.279

- OR -

Upgrade to 8.51.0.63 + VTD_EXEC.279

3957VED

Upgrade to 8.50.0.134 + VTD_EXEC.279

- OR -

Upgrade to 8.50.0.140 + VTD_EXEC.279

- OR -

Upgrade to 8.50.1.25 + VTD_EXEC.279

- OR -

Upgrade to 8.50.2.6 + VTD_EXEC.279

- OR -

Upgrade to 8.51.0.63 + VTD_EXEC.279

 

The minimum VTD_EXEC version is shown below:

VTD_EXEC PackageVersion
VTD_EXEC.279v1.10

 

Workarounds and Mitigations

Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.

Get Notified about Future Security Bulletins

References

Off

Change History

26 Oct 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU054","label":"Systems w\/TPS"},"Product":{"code":"STFS69","label":"TS7700"},"Component":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"N\/A","Edition":"","Line of Business":{"code":"LOB26","label":"Storage"}}]

Document Information

Modified date:
26 October 2020

UID

ibm16353443