IBM Support

Security Bulletin: A security vulnerability has been identified in Apache CXF, which is shipped with IBM Tivoli Network Manager IP Edition (CVE-2018-8039)

Created by Anonymous (not verified) on
Published URL:
https://www.ibm.com/support/pages/node/730835
730835

Security Bulletin


Summary

Apache CXF is shipped with IBM Tivoli Network Manager IP Edition. Information about a security vulnerability affecting Apache CXF has been published here.

Vulnerability Details

CVE-ID: CVE-2018-8039
Description: Apache CXF could allow a remote attacker to conduct a man-in-the-middle attack. The TLS hostname verification does not work correctly with com.sun.net.ssl interface. An attacker could exploit this vulnerability to launch a man-in-the-middle attack.
CVSS Base Score: 7.5
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/145516 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

IBM Tivoli Network Manager IP Edition v3.9, 4.1.1 & 4.2

Remediation/Fixes

Only customers using the MTOSISoap collector may be affected. Customers who are using the MTOSISoap Collector with the default HTTPS Protocol Handler are not affected.

Customers who have set the MTOSISoap collector's HTTPS Protocol Handler to the non-default com.sun.net.ssl implementation should remove this setting. Please see "Workarounds and Mitigations" below for more detailed instructions.

Please also note the end of support announcement from 12 September 2017 for selected Netcool product versions. You can find detailed information on whether the product version you have installed in your environment is affected by this end of service announcement by following the Netcool End of Support Knowledge Collection. If your product version is affected, IBM recommend to upgrade your product version to the latest supported version of your product. Please contact your IBM account manager for any question you might have or for any assistance you may require for upgrading an end of service announced offering.

Workarounds and Mitigations

Customers who use the MTOSISoap Collector should review the collector configuration which can be found at $NCHOME/precision/collectors/javaCollectors/MTOSISoap/MTOSISoapCollector.properties on the ITNM (discovery/core) server.

If there is no setting "HTTPSProtocolHandler" present, or the setting is not set to "com.sun.net.ssl.internal.www.protocol", then the customer is not affected. The default IBM implementation, which is not affected by this Apache CXF issue, is used.

If the setting "HTTPSProtocolHandler" is present and it is set to "com.sun.net.ssl.internal.www.protocol", then the customer may be affected. Such customers should remove, or comment out, this line of the properties file, and restart the ITNM (discovery/core) server.

Get Notified about Future Security Bulletins

References

Off

Change History

24 September 2018: Original version published.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSSHRK","label":"Tivoli Network Manager IP Edition"},"Component":"Discovery (core) server.","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"3.9;4.1.1;4.2","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
28 June 2023

UID

ibm10730835