Security Bulletin
Summary
There is a vulnerability in the Network Time Protocol (NTP) implementation embedded within the IBM Virtualization Engine TS7700.
Vulnerability Details
CVEID: CVE-2020-11868
DESCRIPTION: NTP is vulnerable to a denial of service, caused by a flaw in ntpd. By sending a server mode packet with a spoofed source IP address, a remote attacker could exploit this vulnerability to block unauthenticated synchronization resulting in a denial of service condition.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/180011 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Affected Products and Versions
All versions of microcode for the IBM Virtualization Engine TS7700 (3957-VEC and 3957-VED) prior to and including the following are affected:
| Machine Type | Model | Version |
| 3957 | VEC | 8.51.0.63 |
| 3957 | VED | 8.51.0.63 |
Remediation/Fixes
Contact IBM Service at 1-800-IBM-SERV to arrange an upgrade to the latest microcode version followed by the installation of VTD_EXEC.279 as needed. Minimum microcode versions are shown below:
| Machine Type | Model | Fix |
| 3957 | VEC |
Upgrade to 8.42.2.12 + VTD_EXEC.279 - OR - Upgrade to 8.50.0.134 + VTD_EXEC.279 - OR - Upgrade to 8.50.0.140 + VTD_EXEC.279 - OR - Upgrade to 8.50.1.25 + VTD_EXEC.279 - OR - Upgrade to 8.50.2.6 + VTD_EXEC.279 - OR - Upgrade to 8.51.0.63 + VTD_EXEC.279 |
| 3957 | VED |
Upgrade to 8.50.0.134 + VTD_EXEC.279 - OR - Upgrade to 8.50.0.140 + VTD_EXEC.279 - OR - Upgrade to 8.50.1.25 + VTD_EXEC.279 - OR - Upgrade to 8.50.2.6 + VTD_EXEC.279 - OR - Upgrade to 8.51.0.63 + VTD_EXEC.279 |
The minimum VTD_EXEC version is shown below:
| VTD_EXEC Package | Version |
| VTD_EXEC.279 | v1.10 |
Workarounds and Mitigations
Although IBM recommends that you upgrade to the fixes identified above, you can mitigate, but not eliminate the risk of these vulnerabilities by restricting physical and network access to the TS7700 to authorized users and IBM Service Personnel only.
Get Notified about Future Security Bulletins
References
Change History
26 Oct 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
26 October 2020
UID
ibm16353443