IBM Support

Security Bulletin: This Power Hardware Management Console (HMC) update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754 (known as Spectre and Meltdown).

Security Bulletin


Summary

In response to recently reported security vulnerabilities, this Power HMC update is being released to address Common Vulnerabilities and Exposures issue numbers CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754.

Vulnerability Details

Please refer to this link for security bulletin of CVE-2018-12126CVE-2018-12127, CVE-2018-12130 and CVE-2019-11091 (known as MDS).

The Power HMC updates can be obtained from FixCentral by specifying the Product and fix level as described in the Remediation section below.

Workarounds and Mitigations

The most immediate action clients can take to protect themselves is to prevent execution of unauthorized software on any system that handles sensitive data, including adjacent virtual machines.
Remediation for the Virtual HMC

The following updates are available on IBM Fix Central at: http://www-933.ibm.com/support/fixcentral/

Product
VRMF
APAR
Remediation/Fix
Power Virtual HMC 5765-HMV
V8.8.5.0 SP3
MB04124
Power Virtual HMC 5765-HMV
V8.8.6.0 SP2
MB04127
Power Virtual HMC 5765-HMV
V8.8.7.1 x86
MB04133
Power Virtual HMC 5765-HMA
V8.8.7.1 ppc
MB04134

For vHMC on ppc, both the HMC and Power Firmware updates are required to mitigate the vulnerabilities.

For vHMC on x86, mitigation may require additional hypervisor and firmware updates; customers should consult their hypervisor and x86 system vendors for information.
The x86 HMC hardware appliance will not require HMC machine code updates to protect against these CVEs.

Products Addressed and Versions

Power HMC V8.8.5.0


Power HMC V8.8.6.0
Power HMC V8.8.7.0

Remediation for the 7063-CR1 Power-based Hardware Appliance

Customers with the 7063-CR1 Hardware Appliance, install FW MC825.30 (V2.30)


7042 x86 based Hardware Appliances

No remediation is required.

Get Notified about Future Security Bulletins

References

Off

Change History

Initial version : 29 Jan 2018
Updated workaround and mitigation section: 19 Mar 2018
Updated vulnerability details section: 27 May 2019

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SGW5F2","label":"HMC Firmware"},"Business Unit":{"code":"BU009","label":"Systems - Server"},"Component":"HMC","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"Version Independent","Edition":"Enterprise"},{"Product":{"code":"SGW5F2","label":"HMC Firmware"},"Business Unit":{"code":"BU009","label":"Systems - Server"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":""}]

Document Information

Modified date:
28 May 2019

UID

nas8N1022442