IBM Support

Security Bulletin: A vulnerability in Bouncy Castle affect IBM Watson Machine Learning Accelerator

Security Bulletin


Summary

A vulnerability exists in the Bouncy Castle version used by IBM Watson Machine Learning Accelerator. Bouncy Castle upgrade to version 1.69 which resolves these vulnerabilities, is available on IBM Fix Central.

Vulnerability Details

CVEID:   CVE-2020-15522
DESCRIPTION:   Bouncy Castle BC Java, BC C# .NET, BC-FJA, BC-FNA could allow a remote attacker to obtain sensitive information, caused by a timing issue within the EC math library. By utilize cryptographic attack techniques, an attacker could exploit this vulnerability to obtain the private key information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/202188 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Watson Machine Learning Accelerator1.2.1, 1.2.2, 1.2.3, 2.2.x, 2.3.0, 2.3.1


Remediation/Fixes

For 2.x.x version, Fixed in IBM Watson Machine Learning Accelerator 2.3.1, please reference the upgrade section in https://www.ibm.com/docs/en/cloud-paks/cp-data/3.5.0?topic=accelerator-upgrading-watson-machine-learning

For 1.x.x version, 

Download IBM interim fix dli-1.2.3-build600543-wmla from the following location http://www.ibm.com/eserver/support/fixes/.

Follow the instructions in the downloaded README file to apply the IBM interim fix dli-1.2.3-build600543-wmla to the IBM Watson Machine Learning Accelerator version 1.2.3.

Note: 

For IBM Watson Machine Learning Accelerator version 1.2.1 and 1.2.2, follow the IBM Docs https://www.ibm.com/docs/en/wmla to upgrade to version 1.2.3, then apply the IBM interim fix dli-1.2.3-build600543-wmla.


Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

31 Aug 2021: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU025","label":"IBM Cloud and Cognitive Software"},"Product":{"code":"SSFHA8","label":"IBM PowerAI Enterprise"},"Component":"","Platform":[{"code":"PF043","label":"Red Hat"},{"code":"PF016","label":"Linux"}],"Version":"1.2.1, 1.2.2, 1.2.3, 2.x.x","Edition":""}]

Document Information

Modified date:
14 September 2021

UID

ibm16485147