IBM Support

Security Bulletin: IBM RackSwitch firmware products are affected by vulnerabilities in OpenSSL

Security Bulletin


Summary

The following vulnerabilites in OpenSSL have been addressed by IBM RackSwitch firmware products.

Vulnerability Details

CVEID:   CVE-2020-1971
DESCRIPTION:   OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference. If the GENERAL_NAME_cmp function contain an EDIPARTYNAME, an attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/192748 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2021-23840
DESCRIPTION:   OpenSSL is vulnerable to a denial of service, caused by an integer overflow in CipherUpdate. By sending an overly long argument, an attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/196848 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2021-23841
DESCRIPTION:   OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in the X509_issuer_and_serial_hash() function. By parsing the issuer field, an attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/196847 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2021-3712
DESCRIPTION:   OpenSSL could allow a remote attacker to obtain sensitive information, caused by an out-of-bounds read when processing ASN.1 strings. By sending specially crafted data, an attacker could exploit this vulnerability to read contents of memory on the system or perform a denial of service attack.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/208073 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)

Affected Products and Versions

Affected ProductVersion
G70287.6
G83167.9
G80527.11
G82647.11
G83327.7
G8264T7.9
G8124/G8124E7.11
G8264CS_SI_Fabric_Image7.8
G8264CS7.8

 


Remediation/Fixes

Firmware fix versions are available on Fix Central: http://www.ibm.com/support/fixcentral/

ProductFix Version

IBM RackSwitch G7028

(G7028_Image_7.6.11.0)

7.6.11.0

IBM RackSwitch G8316

(G8316_Image_7.9.33.0)

7.9.33.0

IBM RackSwitch G8052

(G8052_Image_7.11.23.0)

7.11.23.0

IBM RackSwitch G8264

(G8264_Image_7.11.23.0)

7.11.23.0

IBM RackSwitch G8332

(G8332_Image_7.7.39.0)

7.7.39.0

IBM RackSwitch G8264T

(G8264T_Image_7.9.33.0)

7.9.33.0

IBM RackSwitch G8124/G8124E

(G8124_G8124E_Image_7.11.23.0)

7.11.23.0

G8264CS_SI_Fabric_Image - Bundle

(G8264CS_SI_Fabric_Image_7.8.31.0)

7.8.31.0

IBM RackSwitch G8264CS

(G8264CS_Image_7.8.31.0)

7.8.31.0

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

28 Feb 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU050","label":"BU NOT IDENTIFIED"},"Product":{"code":"SSWLYD","label":"PureFlex System \u0026 Flex System"},"Component":"","Platform":[{"code":"PF009","label":"Firmware"}],"Version":"All","Edition":""}]

Document Information

Modified date:
28 February 2022

Initial Publish date:
28 February 2022

UID

ibm16560154