Lucene search

K
ibmIBM4F7D80D0E68015216182DCF5862AE3314F24842A412FD6BE39D0A2E70138ADD6
HistoryJun 15, 2018 - 7:02 a.m.

Security Bulletin: Current release of IBM® WebSphere Real Time is affected by CVE-2015-0138

2018-06-1507:02:42
www.ibm.com
8

EPSS

0.005

Percentile

76.0%

Summary

“FREAK: Factoring Attack on RSA-EXPORT keys” TLS/SSL client and server vulnerability.

Vulnerability Details

CVEID: CVE-2015-0138 DESCRIPTION: A vulnerability in various IBM SSL/TLS implementations could allow a remote attacker to downgrade the security of certain SSL/TLS connections. An IBM SSL/TLS client implementation could accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. This could allow a remote attacker using man-in-the-middle techniques to facilitate brute-force decryption of TLS/SSL traffic between vulnerable clients and servers. This vulnerability is also known as the FREAK attack.
CVSS Base Score: 4.3
CVSS Temporal Score: See <http://exchange.xforce.ibmcloud.com/#/vulnerabilities/100691&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

This vulnerability affects IBM WebSphere Real Time Version 3 Service Refresh 8 Fix Pack 10 and earlier releases

Remediation/Fixes

The fixes for these vulnerabilities are included in IBM WebSphere Real Time Version 3 Service Refresh 9.

In addition, an iFix release based on Service Refresh 8 Fix Pack 10 is available.

IBM customers should download WebSphere Real Time updates from Fix Central.

The APAR for this fix is IV70681.

EPSS

0.005

Percentile

76.0%

Related for 4F7D80D0E68015216182DCF5862AE3314F24842A412FD6BE39D0A2E70138ADD6