Security Bulletin
Summary
Apache CXF is shipped with IBM Tivoli Network Manager IP Edition. Information about a security vulnerability affecting Apache CXF has been published here.
Vulnerability Details
CVE-ID: CVE-2018-8039
Description: Apache CXF could allow a remote attacker to conduct a man-in-the-middle attack. The TLS hostname verification does not work correctly with com.sun.net.ssl interface. An attacker could exploit this vulnerability to launch a man-in-the-middle attack.
CVSS Base Score: 7.5
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/145516 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
Affected Products and Versions
IBM Tivoli Network Manager IP Edition v3.9, 4.1.1 & 4.2
Remediation/Fixes
Only customers using the MTOSISoap collector may be affected. Customers who are using the MTOSISoap Collector with the default HTTPS Protocol Handler are not affected.
Customers who have set the MTOSISoap collector's HTTPS Protocol Handler to the non-default com.sun.net.ssl implementation should remove this setting. Please see "Workarounds and Mitigations" below for more detailed instructions.
Please also note the end of support announcement from 12 September 2017 for selected Netcool product versions. You can find detailed information on whether the product version you have installed in your environment is affected by this end of service announcement by following the Netcool End of Support Knowledge Collection. If your product version is affected, IBM recommend to upgrade your product version to the latest supported version of your product. Please contact your IBM account manager for any question you might have or for any assistance you may require for upgrading an end of service announced offering.
Workarounds and Mitigations
Customers who use the MTOSISoap Collector should review the collector configuration which can be found at $NCHOME/precision/collectors/javaCollectors/MTOSISoap/MTOSISoapCollector.properties on the ITNM (discovery/core) server.
If there is no setting "HTTPSProtocolHandler" present, or the setting is not set to "com.sun.net.ssl.internal.www.protocol", then the customer is not affected. The default IBM implementation, which is not affected by this Apache CXF issue, is used.
If the setting "HTTPSProtocolHandler" is present and it is set to "com.sun.net.ssl.internal.www.protocol", then the customer may be affected. Such customers should remove, or comment out, this line of the properties file, and restart the ITNM (discovery/core) server.
Get Notified about Future Security Bulletins
References
Change History
24 September 2018: Original version published.
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Was this topic helpful?
Document Information
Modified date:
28 June 2023
UID
ibm10730835